IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
26 - 50 of 1965 Matches Previous Page  |  Next Page
3 Ways to Protect Data From Insider Threats
sponsored by Code42
WHITE PAPER: Rising rates of employee turnover creates more opportunities and gaps for outgoing employees to steal, leak, or compromise company data and files. Download this insider data loss threat protection sheet to learn about the signs of each major insider data threat, and have the right plan in place to keep data secure.
Posted: 24 Sep 2019 | Published: 24 Sep 2019

Code42

Computer Weekly – 24 September 2019: Climate change – the challenge for datacentres
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the impact of climate change on datacentres as potential victims and contributors to the problem. We look at the rise of voice channels and how IT leaders can use the technology for better customer experience. And we ask what lessons must be learned from Ecuador's citizens' data breach. Read the issue now.
Posted: 23 Sep 2019 | Published: 24 Sep 2019

ComputerWeekly.com

MicroScope – October 2019: What's next for the channel?
sponsored by MicroScope
EZINE: The fourth quarter is the busiest in the channel, and we get an idea of which technologies should be selling strongly
Posted: 23 Sep 2019 | Published: 04 Sep 2019

MicroScope

Leaders & Laggards: The Latest Findings from the Ponemon Institute's Study on the Cyber Resilient Organization
sponsored by IBM
WEBCAST: In this webinar, Dr. Larry Ponemon will take you through the barriers of becoming cyber resilient and dive into report topics such as implementing automation, aligning privacy and cyber security, and what it takes to become a cyber resilient "High Performer" in 2019.
Posted: 20 Sep 2019 | Premiered: Sep 20, 2019

IBM

5 Steps to Unlock Your Data's Value for Higher KPIs and Improved Protection
sponsored by Dell EMC and Intel®
RESOURCE: Forrester Research recently studied 500+ companies in an effort to help IT decision-makers understand their data capital maturity. Read this resource to view the results of that study and to discover Forrester's 5 recommendations to boost your performance metrics and to fully unlock your data's hidden value.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

Dell EMC and Intel®

The Study on the Cyber Resilient Organization
sponsored by IBM
ANALYST REPORT: Security automation plays a significant role when maintaining an organization's Cyber Resilience, according to IBM Resilient's latest report. Download the report to understand the key factors that hinder the ability for efficient and effective Cyber Resilience and gain insights and guidance for improving your security posture.
Posted: 19 Sep 2019 | Published: 30 Apr 2019

IBM

Comprehensive Security for Your Applications
sponsored by VMware
WHITE PAPER: Despite cybersecurity being a top priority, organizations continue to fall short protecting against threats. In this white paper, learn how VMware can help your organization to architect security into your infrastructure to better secure your applications and data.
Posted: 17 Sep 2019 | Published: 31 Dec 2018

VMware

Data Protection Solutions for Data-driven Organizations
sponsored by Dell EMC and Intel®
RESOURCE: With the cost of downtime on the rise, that data must also be protected, available, and easily recoverable. In fact, IDC found that 48.5% of digital transformation projects involve data protection changes and improvements. Download this infographic to learn how to maximize your data capital and to secure it wherever it resides.
Posted: 17 Sep 2019 | Published: 17 Sep 2019

Dell EMC and Intel®

The State of Data Protection and Cloud
sponsored by Veritas
WHITE PAPER: As the enterprise data environment becomes more complex, so does the challenge of ensuring cost-effective, efficient data protection. In a recent survey, 250 IT executives discussed how they were providing comprehensive backup and recovery across their virtual, physical and multi-cloud environments. Download this white paper to learn more.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Veritas

Zerto IT Resilience Platform: Converged Disaster Recovery & Backup
sponsored by Zerto
DATA SHEET: This datasheet introduces Zerto's IT Resilience Platform, which converges disaster recovery, backup, continuous data protection (CDP), and mobility capabilities to protect all enterprise workloads wherever they reside. Download now to see all its benefits, to view 6 key capabilities, and to learn how it works.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Zerto

Future of Backup: From Periodic to Continuous
sponsored by Zerto
WHITE PAPER: Download this white paper to examine the benefits of continuous backup as compared to periodic backup, and to view an IT Resilience platform that can help your organization defeat the shortcomings of traditional tools by utilizing the Elastic Journal.
Posted: 16 Sep 2019 | Published: 31 Mar 2019

Zerto

Tech Powering your CX Might be Dragging Revenue
sponsored by The Media Trust
RESOURCE: Unknown third-party code outside of your control can introduce new risks or heighten existing ones. Read on to learn about digital risk scans and how you can reduce digital revenue threats like customer information theft, data leakage, site latency, and more.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

The Media Trust

TPCRM 101: A Guide for Beginners
sponsored by CyberGRX
WHITE PAPER: As organizations increasingly rely on third parties, their ecosystems become more vulnerable to third-party cyber risk. Implementing an effective third-party cyber risk management (TPCRM) program is essential to securing your organization's cyber ecosystem. In this white paper, learn everything you need to know about a TPCRM program.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

CyberGRX

Cloud Data Protection for VMware Cloud on AWS
sponsored by Druva Software
WEBCAST: Join this webinar to hear a trio of experts as they walk through how you can leverage Druva and VMware Cloud on AWS to seamlessly move and protect apps without rework, simplify data center migration into AWS, achieve robust backup and DR for hybrid environments, and more.
Posted: 12 Sep 2019 | Premiered: Aug 8, 2019

Druva Software

Hype Cycle for Privacy, 2019
sponsored by TITUS
ANALYST REPORT: Privacy as a fundamental human right has in the recent year been operationalized in sweeping regulatory changes across the world. In this Gartner Hype Cycle, explore international regulatory developments and technologies that help protect personal data.
Posted: 11 Sep 2019 | Published: 11 Jul 2019

TITUS

A 4-Tier Approach to Modern Data Protection
sponsored by Veeam Software
WHITE PAPER: This white paper presents an alternative, 4-tier data protection approach that streamlines storage and security in multi-tier storage environments. Read on to view this solution and to see how it may ultimately benefit your company.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Veeam Software

The Titus Times: The CEO & CTO
sponsored by TITUS
RESOURCE: In this e-magazine, learn about the roles of the CEO and the CTO and delve into how their concerns around data protection overlap – as well as where they diverge. Also, learn how to overcome discrepancies to build a strong data protection strategy.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

TITUS

State of the Web Report 2019
sponsored by Tala Security
ANALYST REPORT: The website is a primary connection point between companies and their customers. Unfortunately, their architecture introduces critical vulnerabilities that enable client-side website attacks. In this research report, discover the risks associated with web and web app security and learn how to better protect your organization against attacks.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Tala Security

Use HPE SimpliVity 380 to Protect your Organization from Ransomware Attacks
sponsored by NTT
RESOURCE: Read this blog post to check out one option that can quickly recover from ransomware attacks with its built-in data protection functionality: HPE SimpliVity 380.
Posted: 11 Sep 2019 | Published: 18 Apr 2019

NTT

2019 Financial Consumer Cybersecurity Threat Index
sponsored by Morphisec, Inc.
ANALYST REPORT: As Morphisec continues to assist financial providers with improving defenses and protecting consumer financial data and funds, they decided to examine how the increasing amount of financial cyberattacks are impacting the mindset of consumers. Download Morphisec's 2019 U.S. Consumer Financial Cybersecurity Threat Index to see what they found.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Morphisec, Inc.

True Data Protection with HPE SimpliVity
sponsored by NTT
RESOURCE: Read the following blog post to discover 6 ways in which HPE SimpliVity hyper-converged infrastructure can bolster data protection in enterprises today—giving folks the flexibility to tune RTOs and enable high-frequency backup and replication across multiple sites.
Posted: 10 Sep 2019 | Published: 28 Apr 2018

NTT

Configuration Guide for NetApp and Veeam Backup & Replication 9.5
sponsored by Veeam Software
WHITE PAPER: Customizing your deployment of Veeam Backup & Replication 9.5 and NetApp ONTAP to suit your environment can result in better overall performance and lower overhead. Download this comprehensive, 43-page configuration guide now to get started.
Posted: 10 Sep 2019 | Published: 31 Dec 2017

Veeam Software

Protecting Point-of-Sale Systems
sponsored by Morphisec, Inc.
PRODUCT OVERVIEW: With their highly valuable payment card and personal sensitive information, Point-of-Sale systems present a ripe target for cybercrime. Modern POS environments are complicated systems with multiple entry points for attack. In this brief, learn about the anatomy of a POS attack and what organizations can do to prevent against these attacks.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Morphisec, Inc.

Save Time and Money with Druva and AWS All-In-One Solution
sponsored by Druva Software
EBOOK: Download this e-book to learn how Druva and AWS's unified approach delivers all-in-one data protection, governance, and intelligence across endpoints, data centers, and cloud workloads.
Posted: 09 Sep 2019 | Published: 31 Aug 2019

Druva Software

Customers Save Time and Up to 50% in Backup Costs with Druva on AWS
sponsored by Druva Software
WEBCAST: Tune into this webinar to discover the benefits of deploying Druva on AWS and gain the ability to improve data protection, streamline management, and effortlessly scale backups.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

Druva Software
26 - 50 of 1965 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement