IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
51 - 75 of 2036 Matches Previous Page  |  Next Page
Understanding the Economics of In-cloud Data Protection: Designed for Today with Tomorrow in Mind
sponsored by Dell EMC
WHITE PAPER: By using cloud-based data protection, organizations can provide enterprise-level protection at a reasonable cost and maximize their cloud resources. Read this ESG white paper to see the results of an annual IT spending intentions survey which outlines 3 major benefits of incorporating in-cloud data protection into your strategy for cloud workloads.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Dell EMC

Implementing the NIST Cybersecurity Framework in Government
sponsored by Absolute Software Corporation
WHITE PAPER: Download this white paper to discover the 5 functions of the NIST cybersecurity framework and why CIOs and CISOs in the public sector should follow this framework in order to best optimize their security approach without exhausting their decreasing budgets.
Posted: 05 Feb 2020 | Published: 07 Dec 2018

Absolute Software Corporation

Dremio Security Architecture Guide
sponsored by Dremio
WHITE PAPER: Because data sets and analytics systems are valuable targets for cybercriminals, it is important that your data access and analysis systems provide a variety of security options so that you can properly secure your organization’s data.Read the attached guide to see some security choices that the data lake engine Dremio offers.
Posted: 05 Feb 2020 | Published: 20 Nov 2018

Dremio

Digital Communication Governance in Banking and Financial Services
sponsored by Hitachi Vantara
WHITE PAPER: Read this Forbes insights white paper to explore the importance of developing a sound communication governance strategy that simultaneously enables fluid information exchange and strong security and the benefits and challenges associated with modern communications systems.
Posted: 05 Feb 2020 | Published: 27 Feb 2018

Hitachi Vantara

Hitchhikers Guide to Veeam Backup & Replication Community Edition
sponsored by Veeam Software
EBOOK: Around the clock data availability is achievable by protecting critical applications and data from failure. Access this e-book to learn about the Veeam Backup & Replication Community Edition, a free backup tool which offers protection for up to 10 instances across any combination of locations, to ensure your data is protected.
Posted: 05 Feb 2020 | Published: 05 Feb 2020

Veeam Software

Tips & Tricks for Veeam Backup for Microsoft Office 365
sponsored by Veeam Software
EBOOK: With an offsite backup solution for Office 365, your organization can maintain archived retention for audits. View this e-book to explore the reasons why companies are investing in 3rd party vendors and solutions to fill any data backup gaps.
Posted: 05 Feb 2020 | Published: 05 Feb 2020

Veeam Software

Actualize Your Microsoft SQL Data Value with PowerProtect DD
sponsored by Dell EMC
DATA SHEET: Download this solution brief for an exclusive look at Dell EMC’s PowerProtect DD, with which you can maximize the value of your Microsoft SQL data and take advantage of grow in-place scalability, extended VMware support, and more.
Posted: 05 Feb 2020 | Published: 31 Dec 2018

Dell EMC

Modern Storage and Data Protection Optimize SAP Workloads and S4/HANA Migration
sponsored by Dell EMC
ANALYST REPORT: This Forrester Report explains how to match the data protection and storage requirements of SAP HANA workloads, as well as the challenges, drivers, benefits, and costs of migrating to SAP HANA and SAP S/4HANA. Download now for the essential takeaways and to examine a set of solutions from Dell EMC that meets these needs.
Posted: 04 Feb 2020 | Published: 31 Dec 2019

Dell EMC

What is the CCPA & How Will it Affect Email Security?
sponsored by Egress Software Technologies Inc
VIDEO: This video explains the the significance and implications of California’s new data privacy regulations, specifically focusing on how they will affect email use among employees. Watch now to learn more.
Posted: 04 Feb 2020 | Premiered: 08 Nov 2019

Egress Software Technologies Inc

Real-time Fraud Detection for Southeast Asia’s Leading Mobile Platform
sponsored by Scylla DB
WEBCAST: Databases can be used simply as data repositories, where data is left and forgotten—or they can have a more active use case, serving as centers for analytics or encryption tools. Watch this video to see how the Scylla NoSQL database, along with Apache Kafka, helps Grab streamline their fraud-detection services.
Posted: 04 Feb 2020 | Premiered: May 22, 2019

Scylla DB

Cyber Threat Intelligence
sponsored by DomainTools
RESOURCE: As cyberattacks become more sophisticated and difficult to detect, proactive approaches to threat management are no longer viable for ensuring network security. In this solution brief, discover a proactive approach to threat intelligence that helps you identify & monitor threats while building a cyber threat database.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

DomainTools

California Federal Credit Union Bolsters Security & Compliance Using SOC-as-a-Service
sponsored by Arctic Wolf Networks, Inc.
CASE STUDY: In this case study, discover how Kern Schools Federal Credit Union, a financial institution in California, partnered with Arctic Wolf to establish a security program that allowed for comprehensive network visibility, robust reporting & flexibility to adapt – all while ensuring compliance.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Arctic Wolf Networks, Inc.

Veeam Backup for Microsoft Office 365
sponsored by Veeam Software
EBOOK: With a ground-up Office 365 backup solution that offers both a short- and long- term protection, organizations can avoid data loss and increase their availability across any cloud and platform. Dive into this e-book to learn more about this solution and to view the 7 benefits it offers.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Veeam Software

Beyond Backup: 5 Principles to Success in 2020
sponsored by Veeam Software
WHITE PAPER: With your IT infrastructure spread out, how can you manage it while ensuring it’s protected and available for everyone that needs it? Read this white paper to learn how to enforce a data protection strategy across all workloads and discover 5 principles that will help your organization harness the power of its data.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Veeam Software

Managed Vulnerability Assessment
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: In this buyer’s guide, discover how vulnerability assessment and management can give you the visibility you need to prioritize security tasks.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

Arctic Wolf Networks, Inc.

Office 365: Data Retention & Compliance
sponsored by Druva
WEBCAST: By introducing a 3rd party backup solution to your SaaS environments, organizations can mitigate IT challenges like shifting data governance and risk of data loss. Watch this webinar to learn 6 key reasons why your organization should consider backing up Office 365 data with a 3rd party solution and the benefits it can bring.
Posted: 04 Feb 2020 | Premiered: Feb 4, 2020

Druva

2019 Cybersecurity Report Card
sponsored by DomainTools
WHITE PAPER: If you only pay attention to the massive data breaches that make headlines, it’s easy to draw the conclusion that cybersecurity is in a state of constant failure. However, there is enough going on behind the scenes to inspire confidence. Download this Cybersecurity Report Card to see how organizations rate their security posture.
Posted: 04 Feb 2020 | Published: 04 Feb 2020

DomainTools

Healthcare - How Global Labs Protect Sensitive Testing Data
sponsored by Cisco Umbrella
CASE STUDY: Eurofins needed a simple solution that’s powerful enough to protect their complex organization and keep their sensitive data safe. Dive into this case study to see how Cisco Umbrella gave them a complete snapshot of what’s happening across their network, devices, and apps.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Cisco Umbrella

Cloud Data Management Adapts to Soaring Volumes—Don’t Get Left Behind
sponsored by Cirrus Data Solutions
EGUIDE: As cloud use cases and data volumes expand, vendors are now responding with their own cloud data management solutions. Read this e-guide to get an update on the current state of cloud data management, about a comparison of tape versus cloud storage, and an exclusive look at the cloud data extraction process.
Posted: 03 Feb 2020 | Published: 30 Jan 2020

Cirrus Data Solutions

Veeam and Cisco HyperFlex: A Data Protection Solution You Can Have Confidence In
sponsored by Veeam Software
WHITE PAPER: In order to properly insulate businesses from risk, hardware and software need to work together to deliver data protection and disaster recovery instantaneously. Access this white paper to learn how a uniquely positioned solution from Veeam and Cisco can help businesses achieve optimum protection for their data and high availability workloads.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Veeam Software

How to Accelerate Rapid Data Recovery
sponsored by Veeam Software
WEBCAST: When looking for suitable solution for the current day, companies should consider adopting modern protection. Access this webcast to learn how to implement 4 crucial data backup functions through solutions that reduce rapid recovery times for large data sets and critical applications from days to minutes.
Posted: 03 Feb 2020 | Premiered: Sep 26, 2019

Veeam Software

Using Data-driven Permissions to Secure Your Data Lake
sponsored by Dremio
WHITE PAPER: When managing a data lake, it is important to make sure that this data is secured for a variety of reasons.How does your business implement data lake security features? Additionally, how customizable are these security tools?Read this white paper and learn how you can create your own data lake permissions with Dremio.
Posted: 03 Feb 2020 | Published: 03 Feb 2020

Dremio

The Big Disconnect: SaaS Apps and Data Protection
sponsored by Druva
WEBCAST: SaaS providers like Office 365 are not responsible for backing up your organization’s data. Watch this webcast to hear two experts in the data protection field discuss how your organization can successfully integrate backup into your SaaS apps establish predictions for the backup and recovery landscape in the coming years.
Posted: 03 Feb 2020 | Premiered: Feb 3, 2020

Druva

2020 Predictions: The Year of IT Resilience
sponsored by Zerto
WEBCAST: To help you navigate the year ahead, Andy Fernandez, Product Marketing Manager at Zerto, crunches the 2020 trends currently shaping IT resilience and how to ensure your business is protected against data loss and downtime. Tune in now to see Fernandez’s 5 predictions and how your company can act on them.
Posted: 03 Feb 2020 | Premiered: Feb 3, 2020

Zerto

Navigating VMware and Cloud Backups
sponsored by Clumio
EGUIDE: VMware VM backups and cloud backups can improve workload protection by securing data but navigating the tools themselves can be intimidating. Dive into this e-guide to learn 6 VMware VM backup best practices and 3 cloud backup security guidelines to help you navigate this tricky landscape.
Posted: 31 Jan 2020 | Published: 29 Jan 2020

Clumio
51 - 75 of 2036 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info