IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
126 - 150 of 2623 Matches Previous Page  |  Next Page
The Importance of the Facilitated Password Process for Enterprise Password Management
sponsored by Fast Pass Corp
WHITE PAPER: According to the 2017 Verizon Data Breach Investigations Report, 81% of hacking related breaches leveraged stolen or weak passwords. Explore this password management white paper to gain insight into securing your passwords to protect your organization from hackers.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Fast Pass Corp

DTMF Masking for PCI DSS Compliance
sponsored by Semafone
WHITE PAPER: PCI DSS is made up of 12 requirements, including securing networks, protecting data, access control measures, information security practices, and monitoring and testing. This resource provides insight into becoming PCI DSS compliant by implementing dual-tone multi-frequency.
Posted: 04 Jan 2018 | Published: 04 Jan 2018

Semafone

Extending Security Technology to the Cloud: Threat Detection & Response
sponsored by RSA
WHITE PAPER: According to Gartner, spending on cloud system IaaS will grow from $34 billion in 2017 to $71 billion through 2020. This white paper offers strategies for improving threat detection and response within cloud technologies.
Posted: 03 Jan 2018 | Published: 03 Jan 2018

RSA

Essential guide to dealing with a data breach
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Computer Weekly's essential guide to dealing with a data breach looks at companies that have been affected and offers advice on how to respond to cyber security occurrences
Posted: 03 Jan 2018 | Published: 03 Jan 2018

ComputerWeekly.com

Password Management and GDPR Compliance
sponsored by Fast Pass Corp
RESEARCH CONTENT: This IDC Technology Spotlight introduces the identity and access implications of GDPR, and shows why password reset represents a potential risk factor that may compromise compliance. Find out how self-service password reset can lower this risk to help your organization follow GDPR guidelines.
Posted: 02 Jan 2018 | Published: 31 Jan 2017

Fast Pass Corp

Business-Driven Security and the GDPR
sponsored by RSA
WHITE PAPER: As the GDPR quickly approaches, privacy and data protection will no longer be "nice to have" benefits. Lacking them will become critical risks, both financial and reputational. Access this whitepaper for insight into data protection mandates in the GDPR and how your organization can get prepared.
Posted: 02 Jan 2018 | Published: 02 Jan 2018

RSA

Closing the Cloud Security Gap
sponsored by West UC
WHITE PAPER: According to the McAfee study, Building Trust in a Cloud Sky, cloud initiatives encompass 80% of all IT budgets, but only 23% of the organizations completely trust the cloud to keep their data secure. This white paper offers recommendations from Gartner to ensure security within the cloud.
Posted: 22 Dec 2017 | Published: 22 Dec 2017

West UC

Secure the Workplace Without Locking Down Your People
sponsored by Atos
RESOURCE: What if I told you that you could secure your workplace without taking away employees' flexbility? Read on to learn about the guidelines you need to follow to make this happen and the topics you will need to address for the future of your workplace security strategy.
Posted: 20 Dec 2017 | Published: 28 Nov 2017

Atos

A Data Privacy & Security Year in Review: Top 10 Trends and Predictions
sponsored by Delphix
WEBCAST: Learn about the top 10 data security trends that developed throughout 2017. Plus, uncover 5 predictions about the future of data privacy and learn about a platform that integrates data masking and delivery to simplify security.
Posted: 15 Dec 2017 | Premiered: Dec 6, 2017

Delphix

Splunk's Top Predictions for AI, Machine Learning, IoT, and More
sponsored by Splunk
WHITE PAPER: AI and machine learning, IoT, DevOps collaboration, security and more – how can you tell which factors will be a flash in the pan vs. trends that will have an everlasting effect on the shape of the data management landscape? Uncover Splunk's top predictions to find out what trends will help shape 2018.
Posted: 14 Dec 2017 | Published: 14 Dec 2017

Splunk

Data Defense Doesn't Win Championships
sponsored by Delphix
RESOURCE: Learn about the DataOps approach and how it could help businesses continuously deliver secure access to data throughout its lifecycle.
Posted: 13 Dec 2017 | Published: 13 Dec 2017

Delphix

Data Management Platforms for GDPR: Buyer's Checklist
sponsored by Delphix
RESOURCE: Get ready for the coming changes to compliance and data privacy being ushered in by GDPR, and use this handy checklist to help ensure your data management tools and techniques will be ready for the new regulations.
Posted: 12 Dec 2017 | Published: 31 Oct 2017

Delphix

Banking on Cybersecurity
sponsored by HyTrust
WHITE PAPER: According to PWC's Global Economic Crime Survey, cybercrime has jumped to the second-most reported economic crime and financial organizations are prime targets. This white paper offers best practices to strengthen data security and regulatory compliance in financial services.
Posted: 11 Dec 2017 | Published: 11 Dec 2017

HyTrust

DataOps for Data Privacy and Security
sponsored by Delphix
WHITE PAPER: Learn about a secure data management platform that facilitates collaboration between DBAs, information security pros, analysts, IT operations, and more. Plus, find out how you can drive digital transformation with a comprehensive DataOps approach.
Posted: 11 Dec 2017 | Published: 30 Nov 2017

Delphix

Report: IAM Leadership Compass
sponsored by Janrain
WHITE PAPER: This 53-page report provides an overview of the market for consumer IAM and provides you with a compass to help you find the IAM strategy that best meets your needs.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

Janrain

Effective Isolation and Workload Security in the Multi-Tenant Cloud
sponsored by HyTrust
RESOURCE: A major challenge for multi-tenant cloud environments is the lack of access control or infrastructure segmentation required for effective isolation of critical workloads. This product overview offers a cloud security strategy that will help you mitigate the challenges of effectively securing cloud environments.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

HyTrust

Security Solutions for Public Sector Virtual Infrastructure
sponsored by HyTrust
RESOURCE: Explore this product overview to evaluate if this cloud security strategy, which secures critical environments in the cloud, is right for your organization's needs.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

HyTrust

Customer IAM Analysis
sponsored by Janrain
WHITE PAPER: In this white paper, gain insight into customer IAM strategies and key capabilities to keep in mind when evaluating the right approach for your organization.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Janrain

Key Considerations in Selecting a Customer IAM Solution
sponsored by Janrain
WHITE PAPER: The rise of the social customer creates opportunities for organizations to develop deeper relationships with customers in support of business objectives. Explore this white paper to gain insight into selecting a customer IAM strategy that works best for your organization.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Janrain

GDPR Primer and Readiness Assessment
sponsored by Janrain
RESOURCE: This data sheet provides a GDPR readiness assessment to ensure your organization will achieve compliance by May 2018.
Posted: 07 Dec 2017 | Published: 07 Dec 2017

Janrain

Report: Customer Identity and Access Management
sponsored by Janrain
RESOURCE: In this Forrester report, explore a 20-criteria evaluation of customer IAM providers to help security pros make the right choice for their digital business.
Posted: 06 Dec 2017 | Published: 15 Jun 2017

Janrain

SmartProtect Program: Solution Brief
sponsored by Corero Network Security
RESOURCE: To avoid damage to reputation and brand, organizations are looking for DDoS mitigation techniques that have evolved to meet the changing threat landscape. Take a look at this technology overview to decide if this DDoS protection strategy is right for your organization's network security needs.
Posted: 06 Dec 2017 | Published: 06 Dec 2017

Corero Network Security

Compare enterprise file-sync-and-sharing software and deployment options
sponsored by Insight
EGUIDE: Download this e-guide to take a look at different EFSS technologies and cloud deployment models. You'll learn how different vendors stack up in terms of security, user experience, collaboration capabilities, file synchronization and more.
Posted: 12 Dec 2017 | Published: 08 Dec 2017

Insight

Compare the top enterprise file-sync-and-sharing vendors
sponsored by Insight
EGUIDE: Enterprise file sync-and-sharing allows for simpler file access and sharing on the consumer and business level, but with so many vendors in the market it can be difficult to compare options. Download this e-guide to learn about the different capabilities of various vendors and what they can do for your mobile EFSS needs.
Posted: 12 Dec 2017 | Published: 08 Dec 2017

Insight

Executing a Lockdown on Cybersecurity Threats
sponsored by Navex Global
EBOOK: Cybersecurity preparedness and keeping up with the latest developments in security is essential in protecting your organization. This e-book addresses tactics to mitigate risks of cybersecurity threats and offers strategies to take if your organization has been attacked.
Posted: 08 Dec 2017 | Published: 08 Dec 2017

Navex Global
126 - 150 of 2623 Matches Previous Page    4 5 6 7 8 9    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement