IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
76 - 100 of 1783 Matches Previous Page  |  Next Page
Data Protection in the Enterprise
sponsored by HelpSystems
WHITE PAPER: Every organization is challenged by exponential data growth. A data classification solution not only helps identify the data in your IT environment, but it monitors your data at creation and as it moves throughout your organization. Read this white paper to learn how the Titus Classification Suite can help meet your data classification needs.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

HelpSystems

Access & protect your data – anywhere, anytime
sponsored by HelpSystems
DATA SHEET: In this brief, learn how Titus and Dataguise can help bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable and vulnerable data wherever it resides.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

HelpSystems

A Security Engineer’s Nightmare
sponsored by Cribl.io
WHITE PAPER: For security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Cribl is helping security engineers log information and incidents so they can focus their efforts on more important tasks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Cribl.io

Automate data security
sponsored by Red Hat & Intel
WHITE PAPER: Financial services firms must comply with a range of increasingly strict security and privacy standards. However, using joint solutions can take a DevSecComplianceOps approach to automate application building, testing, and deployment. View this white paper to learn more.
Posted: 11 Nov 2020 | Published: 11 Nov 2020

Red Hat & Intel

CompTIA IT Security Community Data Breach Response Planning Guide
sponsored by CompTIA
RESOURCE: CompTIA's IT Security Community designed this resource to help you prepare a data breach response plan. The tips you'll find here range from the big picture (preplanning and testing) to the details (keeping related notes of an incident separate from day-to-day business), but are all designed to take fear of the unknown out of the equation.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

CompTIA

CW APAC: Expert advice on zero-trust security
sponsored by ComputerWeekly.com
EZINE: Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.
Posted: 09 Nov 2020 | Published: 19 Nov 2020

ComputerWeekly.com

Analyzing The Economic Benefits Of Google Chronicle Security Analytics Platform
sponsored by Chronicle
ANALYST REPORT: With an increasingly remote workforce, and a constantly evolving threat landscape, organizations that can deploy security analytics and operations in the cloud are in a better position to continue to provide a secure infrastructure. Read this report to see ESG’s analysis of Google Chronicle, a cloud-based security analytics platform.
Posted: 29 Oct 2020 | Published: 29 Oct 2020

Chronicle

Cradlepoint Solution Allows Retail Jewelry Store to Open on Time, Saving $50,000
sponsored by Cradlepoint
CASE STUDY: Pandora, an international jewelry retailer, was almost delayed opening one of its unique concept stores in Lancaster, PA because of an ISP strike. However, its outsourced IT expert packaged a technology solution that allowed the store to open on time. Read the full case study to learn the details and how the jeweler avoided a $50,000 loss.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

Cradlepoint

Computer Weekly - 27 October 2020: Pet project: How Pets at Home cares for customers with data analytics
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the chief data officer of Pets at Home, about using data analytics to care for customers. British Airways had its GDPR fine reduced to just £20m – we ask what this means for data protection regulation. And we look at GPT3, the language prediction tool that could revolutionise AI. Read the issue now.
Posted: 26 Oct 2020 | Published: 27 Oct 2020

ComputerWeekly.com

Computer Weekly – 19 May 2020: Ocado makes the friendly workplace robot a reality
sponsored by ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we find out how Ocado is making robot-human collaboration a reality. Unified com-munications has become a must-have lockdown capability – we assess the key technologies. And as contact-tracing apps emerge to help deal with the Covid-19 pandemic, we exam-ine the data privacy challenges. Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

ComputerWeekly.com

AT THE EDGE OF CHANGE
sponsored by Aruba Networks
RESOURCE: As the volume of network data explodes it must be processed, stored and analyzed near its source – at the edge. What do IT decision makers (ITDMs) think of this change, and how are they preparing? What barriers to they need to overcome to utilize the edge? Jump into this infographic to find out.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Aruba Networks

Kern Medical Center Defends Against Ransomware and Migrates to Azure with Rubrik
sponsored by Mannai and Rubrik
CASE STUDY: Access this case study to learn about the legacy storage challenges that Bakersfield CA based Kern Medical Center was facing and the 5 transformational benefits they saw after implementing Rubrik for ransomware recovery.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Mannai and Rubrik

A Computer Weekly buyer’s guide to compliance, risk and governance
sponsored by ComputerWeekly.com
EGUIDE: Managing data compliance and security has emerged as an integral business consideration. In this 15-page buyer's guide, Computer Weekly looks at the rise of integrated risk management, security risks in the age of digitisation and how to manage an integrated approach
Posted: 28 Aug 2020 | Published: 28 Aug 2020

ComputerWeekly.com

State of GDPR in mainland Europe
sponsored by ComputerWeekly.com
EGUIDE: The General Data Protection Regulation has been in place for over 18 months now, but its implementation is only really just becoming clearer as regulators begin to fine organisations that fail to meet the rules. That is because different countries are implementing it differently. This e-guide gives a snapshot of the current state of GDPR in Europe.
Posted: 28 Aug 2020 | Published: 28 Aug 2020

ComputerWeekly.com

The Periodic Table of Data Protection
sponsored by DELL, INC. AND INTEL®
EBOOK: Based on today's increasing threats to data integrity on a number of fronts, the topic of data protection is a primary concern. View this comprehensive e-book to navigate the complexities of enterprise data protection and to view all the options you have at your disposal.
Posted: 25 Aug 2020 | Published: 25 Aug 2020

DELL, INC. AND INTEL®

CipherTrust Cloud Key Manager for Multi-cloud Environments - White Paper
sponsored by Thales
WHITE PAPER: The era of multi-cloud environments has enabled unmatched scalability and productivity. However, in order to optimize these capabilities, organizations need to restructure their approaches to data protection and key management. Download this report for a closer look at Thales’ CipherTrust Cloud Key Manager for multi-cloud environments.
Posted: 05 Aug 2020 | Published: 31 Jul 2020

Thales

DivvyCloud Health and Life Sciences Guide: How to Stay Secure in the Cloud While Driving Innovation and Discovery
sponsored by DivvyCloud
EGUIDE: In order to ensure they are meeting user demands, healthcare and life sciences organizations are rapidly embracing cloud capabilities. However, within this industry, security often goes hand in hand with HIPAA compliance. So, how can these organizations balance security, compliance and innovation? Download this e-guide to find out.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

DivvyCloud

5 Reasons Qlik and Snowflake Are Better Together: Automating the Data Warehouse for Faster Time-to-Insight
sponsored by Qlik
WHITE PAPER: How does Qlik’s Data Integration Platform enable Snowflake users to speed analytics projects, achieve greater agility and reduce risk – all while fully realizing the advantages of Snowflake’s cloud-built data platform? Download this eBook to find out.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Qlik

Leading healthcare provider protects vital client assets with help from Thales
sponsored by Thales
CASE STUDY: This North America-based healthcare provider needed an encryption solution that could operate without disrupting their patient management system while simultaneously meeting all HIPAA standards. Tap into the case study to learn why the healthcare provider chose Vormetric Transparent Encryption from Thales.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Thales

C-SUITE PERSPECTIVES: CYBERSECURITY IMPLICATIONS OF TRANSFORMING INTO A MULTICLOUD ENVIRONMENT
sponsored by Radware
ANALYST REPORT: As organizational demand for agility and performance increases, multicloud architectures are becoming more viable due to their cost-effectiveness.That said, the cybersecurity implications of adopting multicloud cannot be ignored.Browse this report to learn how C-suite professionals responded about movement to multicloud environments.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

Radware

Prevent Ransomware Attacks from Disrupting Your Business with Thales Data Security
sponsored by Thales
WHITE PAPER: Cybersecurity Ventures predicts that a business will fall victim to a ransomware attack every 11 seconds, and the estimated cost to businesses globally will be around $20 billion by 2021. In this white paper, learn how to defend against ransomware by taking a look at the anatomy of ransomware attacks.
Posted: 16 Jul 2020 | Published: 30 Jun 2020

Thales

Leading Dutch IT Services Provider Gets Complete Office 365 Protection
sponsored by Barracuda
CASE STUDY: After successive failures to protect data with their previous backup provider occurred, Truston knew they needed a more efficient off-site backup solution for their O365 data. Download this case study to discover the results of Truston investing in Barracuda Essentials.
Posted: 16 Jul 2020 | Published: 31 Dec 2017

Barracuda

ALIGNING CYBER RISK MANAGEMENT WITH BUSINESS PERFORMANCE
sponsored by Coalfire
WHITE PAPER: Traditionally, the realm of cybersecurity was considered a technical issue to be solved by technical people. The mindset has changed, and organizations are looking to align cybersecurity objectives with business imperatives. Download this white paper to explore how CISOs can develop a plan to mitigate risks while optimizing resources.
Posted: 15 Jul 2020 | Published: 10 Jul 2020

Coalfire

Securing Big Data
sponsored by Thales
WHITE PAPER: In this white paper, explore the results of the various performance benchmarks run by the Vormetric Product Development team on a reference Hadoop configuration secured with Vormetric Transparent Encryption.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Thales

12 Essential Features of Advanced Endpoint Security Tools
sponsored by Claranet
EGUIDE: Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing IT security operations' policies. However, it does more than protect a network from malware. Download this e-guide to learn how endpoint security can be used for a number of operation monitoring functions and data backup strategies.
Posted: 17 Sep 2020 | Published: 17 Sep 2020

Claranet
76 - 100 of 1783 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences