IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
51 - 75 of 1967 Matches Previous Page  |  Next Page
Protecting Point-of-Sale Systems
sponsored by Morphisec, Inc.
PRODUCT OVERVIEW: With their highly valuable payment card and personal sensitive information, Point-of-Sale systems present a ripe target for cybercrime. Modern POS environments are complicated systems with multiple entry points for attack. In this brief, learn about the anatomy of a POS attack and what organizations can do to prevent against these attacks.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Morphisec, Inc.

Save Time and Money with Druva and AWS All-In-One Solution
sponsored by Druva Software
EBOOK: Download this e-book to learn how Druva and AWS's unified approach delivers all-in-one data protection, governance, and intelligence across endpoints, data centers, and cloud workloads.
Posted: 09 Sep 2019 | Published: 31 Aug 2019

Druva Software

Customers Save Time and Up to 50% in Backup Costs with Druva on AWS
sponsored by Druva Software
WEBCAST: Tune into this webinar to discover the benefits of deploying Druva on AWS and gain the ability to improve data protection, streamline management, and effortlessly scale backups.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

Druva Software

Using Hyperconverged Infrastructure to Improve Data Protection and Recovery
sponsored by Hewlett Packard Enterprise
ANALYST REPORT: Organizations looking to unbind themselves from the limitations of client/server era technologies should read this IDC white paper. It documents 4 critical considerations for evolving your VM backup strategies and explains how hyper-converged infrastructure (HCI) can improve and simplify data protection and disaster resiliency.
Posted: 06 Sep 2019 | Published: 30 Apr 2019

Hewlett Packard Enterprise

5 Ways to Reduce Risk and Boost Productivity
sponsored by Citrix
WHITE PAPER: While IT must enable both the flexibility employees need to be productive and the security the business requires, this balancing act often ends in compromise. In this white paper, explore 5 ways a secure digital workspace can reduce risk and boost productivity.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Citrix

Defending the Digital Enterprise
sponsored by Gigamon
EBOOK: Given the amount of encrypted traffic and the threat vector it now poses, you need a way to efficiently decrypt traffic, share it with tools and then re-encrypt it. In this white paper, discover 7 things you need to do to successfully decrypt your SSL and TLS traffic.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Gigamon

Trend Report: More Organizations are Using a Secure Internet Gateway for Secure Access
sponsored by Cisco Umbrella
EBOOK: Security leaders need to find a way to give users back their freedom while still protecting sensitive data. In this white paper, learn how a Secure Internet Gateway (SIG) can do just that by providing workers with safe access to the internet – no matter what device they're using or where they're located.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Cisco Umbrella

4 Critical Principles of Enterprise Security
sponsored by Smartsheet
RESEARCH CONTENT: What's the key to effective enterprise security? In this white paper, explore the 4 critical principles of effective enterprise security. Review the importance of a multi-layered data security strategy, and learn how to manage your security at scale.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Smartsheet

The Anatomy of a Hack: Perception vs. Reality
sponsored by Centrify Corporation
WEBCAST: There is a common belief that data breaches require a tremendous amount of sophistication. However, analyses have repeatedly found that the source of a hack is often due to compromised credentials. In this webcast, Dr. Torsten George discusses the 3 major phases of the "cyberattack lifecycle" and how to prevent data exfiltration.
Posted: 04 Sep 2019 | Premiered: Sep 4, 2019

Centrify Corporation

Talkdesk GDPR Compliance
sponsored by Talkdesk
EBOOK: In this e-book, discover what steps Talkdesk has taken to ensure compliance with General Data Protection Regulation (GDPR). Get a comprehensive overview of Talkdesk personal data processing protocols, and review how Talkdesk ensures data security, controls third-party access to personal data, and more.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Talkdesk

The True Cost of Cold Data
sponsored by Igneous
WHITE PAPER: Download this white paper to dig into the true costs of keeping cold data on primary storage as well as several alternatives, such as a solution that can quickly and easily identify datasets that haven't been touched so you can archive them accordingly.
Posted: 04 Sep 2019 | Published: 04 Sep 2019

Igneous

Succeeding at the Intersection of Security and Privacy
sponsored by Virtru
WHITE PAPER: This white paper covers the intersection of the security and privacy industries, incorporating how privacy laws, cybersecurity challenges and increased attention have affected the crossover of these spaces. Read on to learn more.
Posted: 03 Sep 2019 | Published: 03 Sep 2019

Virtru

What IT Resilience Means to MSPs
sponsored by Unitrends
WHITE PAPER: The following paper breaks down the evolution of backup technology and explains the importance of IT resilience for MSPs. Access now to learn how to leverage IT resilience to both protect your own organization and establish DR services to maximize your margins as a service provider.
Posted: 03 Sep 2019 | Published: 31 Dec 2018

Unitrends

The MSP's Guide to Better BC/DR
sponsored by Unitrends
WHITE PAPER: Download the following MSP guide to better BC/DR to discover several strategies with which you can prevent, minimize, and deal with downtime to keep your organization up and running.
Posted: 03 Sep 2019 | Published: 31 Dec 2018

Unitrends

Robinson Tech Takes Backup to New Level with Unitrends MSP
sponsored by Unitrends
CASE STUDY: Read this case study to find out how partnering with Unitrends improved Robinson Tech's ransomware insurance—among other benefits—due to Unitrends' Linux-based appliances which are impervious to the threat.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Unitrends

Thriving in Threatening Times with IT Resiliency
sponsored by Unitrends
WHITE PAPER: The following white paper highlights 5 technologies your enterprise can use as building blocks to establish IT resilience and perform near-instantaneous recovery. Download the paper to learn how to integrate these technologies into your infrastructure and service offerings.
Posted: 30 Aug 2019 | Published: 31 Dec 2018

Unitrends

Insurer Prevents Losses from Fake Quotes
sponsored by Shape Security
CASE STUDY: A top 10 insurance company noticed higher than anticipated traffic on its quote generation application and was concerned that the unexpected volume was caused by a surge of automated traffic creating fake insurance quotes. In this case study, learn why the insurance company choose to implement Shape's Enterprise Defense to stop these attacks.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Shape Security

Gaining Visibility into Risk and the ROI of Your Security Program
sponsored by Verizon
ANALYST REPORT: To make informed decisions about risk tolerance and security spending, it is critical to gain insight into the effectiveness of your security architecture, the threat landscape, and vulnerabilities. Download this IDC research report to explore how organizations can evaluate their security programs in the broader context of business risk.
Posted: 29 Aug 2019 | Published: 31 Oct 2018

Verizon

6 Degrees of Network Security
sponsored by Cisco Umbrella
RESOURCE: A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Download this infographic to uncover 6 common security pitfalls that put your users, their devices, and your data at risk.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

Cisco Umbrella

Identity and Access Management for the Real World: Identity Governance
sponsored by One Identity
WHITE PAPER: This white paper evaluates what IAM for the real world would, should and can look like. It delves into the most pressing IAM issues faced by virtually every organization and offers actionable, affordable and sustainable approaches to the challenges you face. Read on to learn more.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

One Identity

Webinar: Latest Fraud Schemes in Retail and Hospitality
sponsored by Shape Security
WEBCAST: Up to 99% of the traffic on retail and e-commerce login forms are due to account takeover (ATO) attempts. In this webinar, Shape Security's Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs.
Posted: 29 Aug 2019 | Premiered: Jul 31, 2019

Shape Security

How Tier One Bank can Innovate Alongside Financial Aggregators
sponsored by Shape Security
VIDEO: Aggregators innovate but also add credential-stuffing threat surface, ATO risk, and more. In this video, learn the techniques and strategies that Fortune 500 Banks use to partner with aggregators and better serve clients.
Posted: 28 Aug 2019 | Premiered: 28 Aug 2019

Shape Security

Druva Security Overview: End-to-End Data Security
sponsored by Druva Software
DATA SHEET: Your organization is tasked with ensuring data security, regardless of how or where backup solutions are deployed. In this overview, see how your organization can receive end-to-end data security from Druva.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Druva Software

Unlock the Value of Office 365 Data Protection
sponsored by Druva Software
EBOOK: Read this e-book to discover 4 reasons why cloud-native data protection and management is essential to any Office 365 deployment and how to ensure O365 data is properly backed up.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Druva Software

Top 20 Cloud Backup Services for 2019
sponsored by Druva Software
EGUIDE: To keep your pulse on the latest cloud backup developments, download this e-guide. Inside, our experts share 7 considerations for selecting a cloud backup service, examine 20 top cloud backup services to simplify the selection process, and explain how the public cloud is improving data protection.
Posted: 05 Sep 2019 | Published: 04 Sep 2019

Druva Software
51 - 75 of 1967 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement