IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
26 - 50 of 1783 Matches Previous Page  |  Next Page
Compass®for Edge Computing
sponsored by Cobalt Iron
DATA SHEET: With Cobalt Iron Compass, you can eliminate the complexity and costs normally associated with edge computing backup processes. Download this datasheet to find out how and to discover the essential benefits of leveraging this solution for edge computing backup.
Posted: 23 Mar 2021 | Published: 23 Mar 2021

Cobalt Iron

COBALT IRON COMPASS®Data Protection for a Remote World
sponsored by Cobalt Iron
DATA SHEET: With Cobalt Iron Compass, customers can remotely manage, monitor, track, patch, and protect backup hardware and software—all from a single dashboard. Download the datasheet here to ensure your team can confidently keep your company’s data protection healthy, stable, and secure while working remote.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

Cobalt Iron

End-to-end Data Protection for the Modern Data Center with Cobalt Iron Compass
sponsored by Cobalt Iron
ANALYST REPORT: Cobalt Iron introduced their Compass platform to drive down cost and fully manage, configure, and maintain data protection processes for you. Access this ESG paper for an in-depth, 3rd party look at Cobalt Iron Compass and the benefits of its fully managed, immutable data and ransomware protection.
Posted: 22 Mar 2021 | Published: 30 Jun 2020

Cobalt Iron

Magic Quadrant for Master Data Management Solutions
sponsored by TIBCO
WHITE PAPER: Access this Gartner Magic Quadrant for Master Data Management (MDM) Solutions to learn which MDM solutions offer features that make them top of the line, including workflow and business process management, data modeling abilities, data stewardship support, integration possibilities, and more.
Posted: 19 Mar 2021 | Published: 27 Jan 2021

TIBCO

Data quality emerges from Covid-19 more critical than ever
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

ComputerWeekly.com

MITRE ATT&CK White Paper
sponsored by IronNet
WHITE PAPER: The MITRE ATT&CK Framework provides valuable and objective insights into the target of a threat and its current phase. Download this whitepaper to read about the 5 ways for a CISO to use the MITRE ATT&CK Framework including increasing your visibility of the threat landscape and strengthening your defensive posture now and over time.
Posted: 05 Mar 2021 | Published: 05 Mar 2021

IronNet

Rethinking Cyber Risk in a Re-globalized World with Andrea Little Limbago, VP Research and Analysis
sponsored by Interos
WEBCAST: The global pandemic has created seismic shifts in technology trends, particularly as they pertain to the global economy. Organizations are being driven to rethink their policies on security and risk.
Posted: 23 Feb 2021 | Premiered: Nov 5, 2020

Interos

Mergers & Acquisitions: Accelerate Data Discovery & Integration
sponsored by Aparavi
DATA SHEET: Finding, classifying, integrating, and migrating M&A data is far from straightforward and can be challenging when data is siloed and 80% of all corporate data is unstructured. Download this datasheet to learn how to enact rapid, accurate data discovery and integration using the Aparavi Platform.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

Aparavi

Bitdefender Endpoint Detection and Response (EDR)
sponsored by Bitdefender
VIDEO: Data breaches spiked in 2020 – affecting nearly every country and industry vertical. COVID-19 certainly was part of the issue – but outdated and traditional security methods also share the responsibility. Watch this short video to learn about the tools and capabilities required to meet the demands of today’s cyberthreats.
Posted: 11 Feb 2021 | Premiered: 11 Feb 2021

Bitdefender

Are You Ready For Managed Detection And Response?
sponsored by Bitdefender
PRODUCT OVERVIEW: Managed Detection and Response (MDR) tools have emerged to ease the burden of high volumes of cyberthreats on security teams. But what exactly is MDR, what key gaps does it address, and how does it improve security? Read on to find out
Posted: 08 Feb 2021 | Published: 08 Feb 2021

Bitdefender

Breaking Down Video Conferencing Privacy And Security
sponsored by Pexip
PODCAST: More people are on video than ever before, but this huge increase has also brought increased security concerns. ‘Zoombombing’ and other video conferencing breaches are in the headlines, and enterprises are being called to ensure privacy and security for all users. Jump into this podcast to hear a breakdown of the subject in detail.
Posted: 08 Feb 2021 | Premiered: May 7, 2020

Pexip

Protecting Healthcare Data with Removable Media Container Encryption
sponsored by WinMagic
CASE STUDY: To better manage and protect patient data, healthcare organizations are embracing encryption capabilities. In this use case, explore the common pain points and challenges that have led to the rise of encryption and discover the potential business benefits of adopting a Removable Media Container Encryption (RMCE).
Posted: 01 Feb 2021 | Published: 01 Feb 2021

WinMagic

Database and Big Data Security
sponsored by Comforte AG
RESEARCH CONTENT: This report provides an overview of database and big data security market along with guidance and recommendations for finding the sensitive data protection and governance products that best meet your requirements. Read this 75-page report to enhance your understanding of the market and discover how to find a solution best-fit to your needs.
Posted: 29 Jan 2021 | Published: 29 Jan 2021

Comforte AG

Top Security Concerns for New Technology Deployments
sponsored by Thales
VIDEO: Thales releases an annual Data Threat Report, which compiles their research into the evolving landscape of cyberthreats, data security, and more. Watch this video for a 45-minute walkthrough of this year’s results, which include everything from zero trust, to mutlicloud environments, to quantum computing and everything in between.
Posted: 29 Jan 2021 | Premiered: 29 Jan 2021

Thales

Computer Weekly – 26 January 2021: 'Salad as a service' – how tech could revolutionise farming
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we find out how new technologies are supporting the rise of vertical farming, and could revolutionise food supply chains. We examine one of the biggest trends in the cloud – serverless computing. And Brexit has not yet ended the debate about UK-EU data protection. Read the issue now.
Posted: 25 Jan 2021 | Published: 26 Jan 2021

ComputerWeekly.com

Stay Ahead of New Ransomware Threats: Protect against data exfiltration and extortion
sponsored by Palo Alto Networks
WHITE PAPER: Recent data shows that threats are developing in two key areas: data exfiltration and extortion. Bad actors are using ransomware as a means to these ends. Organizations must be aptly prepared by knowing what these processes look like. View this white paper to get an in-depth look at an exfiltration-focused attack as well as the extortion phase.
Posted: 22 Jan 2021 | Published: 16 Dec 2020

Palo Alto Networks

CW Benelux - February-April 2021: Is reluctance to report cyber crimes in the Netherlands helping the criminals to get away?
sponsored by ComputerWeekly.com
EZINE: According to an academic study in the Netherlands, only one in seven Dutch people report a cyber crime to the police when it happens - feeling it is better to sort the problem out themselves because they don't think the police will do anything.
Posted: 20 Jan 2021 | Published: 11 Feb 2021

ComputerWeekly.com

The Third Question: What CISOs aren’t asking - and what’s at stake.
sponsored by Absolute Software Corporation
WHITE PAPER: The role CISO is the world’s most stressful balancing act between ensuring operational efficiency and protection against sinister cyberthreats. In this white paper, 4 of the world’s top cybersecurity innovators weigh in on the critical questions CISOs need to be – but often aren’t – asking themselves.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Absolute Software Corporation

Success Story: EVONIK INDUSTRIES
sponsored by SNP Transformation
CASE STUDY: For Evonik, a global chemicals company, balancing a growing list of compliance mandates with data protection and employee productivity is a difficult task. Read this case study to see why they partnered with SNP to address these challenges and discover the outcomes of this initiative.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

SNP Transformation

Securedoc On Top For Bitlocker
sponsored by WinMagic
DATA SHEET: In this product brief, learn about WinMagic’s SecureDoc Enterprise Server (SES) and how it secures data at rest by managing how it’s encrypted, regardless of the operating system, or where the data resides.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

WinMagic

Ransomware Threat Spotlight
sponsored by Barracuda
VIDEO: Another unfortunate consequence of 2020 was the apparent rise of ransomware threats, especially those targeting remote workers. This webinar provides a look back at the top ransomware trends of 2020, highlighting key tactics, common vulnerabilities and more – watch now to get started.
Posted: 23 Dec 2020 | Premiered: 23 Dec 2020

Barracuda

SecureDoc File Encryption
sponsored by WinMagic
DATA SHEET: When it comes to protecting sensitive data, full drive encryption sets a strong data protection foundation. But file-level protection adds an additional layer of security, and as such, it’s often recommended as part of a defense-in-depth security strategy. Scan through this data sheet to read up on SecureDoc File Encryption.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

WinMagic

Leading private hospital consolidates email protection to secure VIP guests’ data “Crown Jewels”
sponsored by Barracuda
CASE STUDY: Healthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

Conquering cloud security threats with awareness and tools
sponsored by SearchSecurity.com
EZINE: The global market for cloud security products and services is booming, and so are threats. Increasingly, a company must beware of nation-state hackers, though the problem of vulnerabilities caused by human error within the organization persists.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

SearchSecurity.com

Getting the most from cyberthreat intelligence services
sponsored by SearchSecurity.com
EZINE: A deluge of data is making it tough to put cyberthreat intelligence to work. This issue of 'Information Security' magazine focuses on what data makes a difference. This issue also includes a feature on top CISO concerns for 2020, plus an interview with Cisco's CISO Steve Martino.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

SearchSecurity.com
26 - 50 of 1783 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences