IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
26 - 50 of 2104 Matches Previous Page  |  Next Page
A Computer Weekly buyer's guide to compliance, risk and governance
sponsored by ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 19 Nov 2019 | Published: 19 Nov 2019

ComputerWeekly.com

Foundation for Digital Transformation
sponsored by Infovista
ANALYST REPORT: In this EIQ report, gain an understanding of the impact of new consumer expectations on applications, digital transformation and networking systems initiatives within retail, manufacturing and banking/finance industries.
Posted: 19 Nov 2019 | Published: 19 Nov 2019

Infovista

Data Backup vs. Archiving: Knowing the Differences and When to Employ Them
sponsored by Comport Consulting
RESOURCE: The following blog post dissects the differences between, and compares, backup and archiving—with the goal of helping you strategically apply each in your organization. Read on for the key takeaways.
Posted: 19 Nov 2019 | Published: 19 Nov 2019

Comport Consulting

Modernize Your Data Center with Veeam Availability for Nutanix AHV
sponsored by Veeam Software
VIDEO: Tune into this video to get a first-hand look at the features and functionality of a backup tool that gives admins the ability to perform snapshot jobs, execute restores and recoveries, see job errors, and more for apps and data running on Nutanix AHV: Veeam Availability.
Posted: 18 Nov 2019 | Premiered: 31 Jul 2019

Veeam Software

Disaster Recovery as a Service: Tips and Best Practices
sponsored by Comport Consulting
RESOURCE: The following blog post introduces the benefits of leveraging Disaster Recovery as a Service (DRaaS) alongside your DR processes to enforce end-to-end data protection. Read on to view 4 main benefits of DRaaS and for tips on planning your next move as you evolve your DR processes to thwart emerging threats.
Posted: 18 Nov 2019 | Published: 21 Apr 2019

Comport Consulting

The State of Enterprise Data Resiliency and Disaster Recovery
sponsored by Datrium
ANALYST REPORT: This research report digs into the prevailing threats against DR, as well as shares several strategies for responding to this rapidly evolving threat landscape and factors that prevent companies from effectively responding to DR events. Download it now to ensure your DR processes are up to scale.
Posted: 18 Nov 2019 | Published: 18 Nov 2019

Datrium

How Barclays Improved IT Security with the Tanium Communications Architecture
sponsored by Tanium
CASE STUDY: Global banks face increasing regulatory pressure, and Barclays, with over 300,000 endpoints across 40 countries, is no exception. Barclays needed a way to unify these endpoints and speed up incident response time. In this case study, follow Barclays’ IT security journey.
Posted: 18 Nov 2019 | Published: 18 Nov 2019

Tanium

Veeam and AWS Avengers: Guardians of Recovery
sponsored by Veeam Software
WEBCAST: Join Veeam Technical Analyst Andrew Zhelezko and Marketing Manager Edward Watson in this webcast to learn key considerations for ensuring the portability of workloads to the cloud, executing successful workload recovery into AWS, and more.
Posted: 18 Nov 2019 | Premiered: Sep 30, 2019

Veeam Software

Modern Data Management and Protection Pave the Path to Digital Transformation
sponsored by Veeam Software
WHITE PAPER: This paper reveals a backup approach that not only gives your organization the flexibility to deploy and protect apps across physical, virtual, and cloud platforms; it also provides analytics and DevOps workloads with the real-time data access they demand. To take advantage of this approach, read on.
Posted: 18 Nov 2019 | Published: 31 Dec 2018

Veeam Software

How to Address Privacy Regulations and Keep Your Data Safe
sponsored by IBM
WHITE PAPER: This white paper will provide a high-level overview of key data privacy trends and regulations — both current and soon-to-be enacted — along with conceptual frameworks organizations can reference to begin addressing these changes
Posted: 15 Nov 2019 | Published: 15 Nov 2019

IBM

A CxO’s Guide to Successful Intelligent Data Management
sponsored by Veeam Software
WHITE PAPER: The following white paper outlines the 5 essential stages which you must traverse to achieve holistic, intelligent data management, and offers guidance and solutions that can help you along the way. Read on to learn how to bolster intelligent data management in your enterprise.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Veeam Software

State of GDPR in mainland Europe
sponsored by ComputerWeekly.com
EGUIDE: The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

ComputerWeekly.com

Tricks of the Storage Trade: How to Build an Effective Cyber Resilience Strategy
sponsored by IBM
EBOOK: Download this e-book for an insider look at today’s threat landscape, tactical instruction on how to establish a robust cyber resilience strategy, and to examine the critical role the storage infrastructure plays in this process.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

IBM

Understanding the Must-haves of Modern Data Protection
sponsored by IBM
EBOOK: This e-book outlines the key must-haves for modern data protection solutions and the business benefits they can provide. Read on to see what you should be looking for in a modern protection solution and to learn why simple backup can no longer cut it.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

IBM

State of the Firewall
sponsored by FireMon
WHITE PAPER: While firewalls are a critical part of a holistic security approach, enterprises remain challenged by the lack of automation, network security complexity, and lack of overall network visibility. Recently, FireMon conducted research into how organizations are managing security challenges. Read on to uncover the key themes and findings.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

FireMon

Future-Proofing Your Information Security Strategy
sponsored by InteliSecure
WHITE PAPER: In this guide, Jeremy Wittkop, Chief Technology Officer, explains why security leaders should start pivoting their security strategies to emphasize the 2 elements of security that are not likely to be diminished: people and data. Read on to learn more about what he thinks really matters in the future of security and what you can do about it now.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

InteliSecure

Client Insights on Data Protection with IBM Security Guardium
sponsored by IBM
ANALYST REPORT: How do organizations protect their data from persistent, sophisticated and well-funded attackers? Ponemon Institute's latest survey of current IBM Security Guardium clients shows how the Guardium platform has improved organizations' ability to protect their data. Download the report to explore key findings.
Posted: 13 Nov 2019 | Published: 31 Aug 2019

IBM

Protecting Data Capital in Your Organization
sponsored by Dell EMC
WHITE PAPER: With high volumes of business-critical data comes the necessity for innovative and modernized data protection strategies—read this white paper to learn how to keep your most valuable digital assets well protected and compliant.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Dell EMC

Effective Data Capital Creation Requires Scalable, Flexible Data Storage and Protection Infrastructure
sponsored by Dell EMC
WHITE PAPER: Efforts to drive new data capital growth requires proper conditions in data protection and storage infrastructures. Download this report to understand the key drivers of successful data capital development projects.
Posted: 13 Nov 2019 | Published: 13 Nov 2019

Dell EMC

Structuring an IAM program
sponsored by Hitachi ID
WEBCAST: With the increasing complexity of cyberattacks, managing access has become critical to the protection of data. IAM & PAM programs allow IT teams to monitor privileged accounts and defend against attacks.Watch this webinar to understand what goes into these programs, where it fits within your organization & how to justify the investment.
Posted: 13 Nov 2019 | Premiered: Oct 17, 2019

Hitachi ID

Is Your Data Safe in an IaaS Public Cloud?
sponsored by Veeam Software
ANALYST REPORT: This white paper discusses the intricacies of data protection in IaaS public cloud environments, including how common shared responsibility models impact DR and why relying on your cloud provider is not enough. Download now to learn 5 must-haves for IaaS protection and for strategies to ensure your security is airtight.
Posted: 13 Nov 2019 | Published: 31 Jul 2018

Veeam Software

Rise of the Machines: Transforming Cybersecurity Strategy for the Age of IoT
sponsored by Forescout
WHITE PAPER: Information technology (IT) & operational technology (OT) were, for a long time, regarded as two distinct areas within an organization. Now these two domains are interconnected, thanks to the Internet of Things (IoT) revolution.But what are these “things”, what do they have to say & are we listening? Read on to learn more.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Forescout

Modern Data Protection: Why Backup Alone Is Not Enough
sponsored by Comport Consulting
WEBCAST: This white paper introduces one method of unifying data protection across your on-prem and offsite environments: Disaster Recovery as a Service (DRaaS). Read on to view 10 tangible benefits of DRaaS and for guidance on properly protecting all your workloads.
Posted: 12 Nov 2019 | Premiered: Dec 31, 2017

Comport Consulting

Veeam Backup & Replication: A Comprehensive Overview
sponsored by Veeam Software
WHITE PAPER: This detailed document covers everything you need to know to protect your mission-critical environments with Veeam Backup & Replication and troubleshooting should an issue occur.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Veeam Software

How to Lock Down Git
sponsored by Perforce
WHITE PAPER: While Git allows for developers to collaborate, it can also contribute to loss of intellectual property & significant security issues. This white paper covers tactics designed to mitigate the risks of Git & discusses best practices for securing native Git. Download this report to get started.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

Perforce
26 - 50 of 2104 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement