IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
76 - 100 of 1975 Matches Previous Page  |  Next Page
Robinson Tech Takes Backup to New Level with Unitrends MSP
sponsored by Unitrends
CASE STUDY: Read this case study to find out how partnering with Unitrends improved Robinson Tech's ransomware insurance—among other benefits—due to Unitrends' Linux-based appliances which are impervious to the threat.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Unitrends

Thriving in Threatening Times with IT Resiliency
sponsored by Unitrends
WHITE PAPER: The following white paper highlights 5 technologies your enterprise can use as building blocks to establish IT resilience and perform near-instantaneous recovery. Download the paper to learn how to integrate these technologies into your infrastructure and service offerings.
Posted: 30 Aug 2019 | Published: 31 Dec 2018

Unitrends

Insurer Prevents Losses from Fake Quotes
sponsored by Shape Security
CASE STUDY: A top 10 insurance company noticed higher than anticipated traffic on its quote generation application and was concerned that the unexpected volume was caused by a surge of automated traffic creating fake insurance quotes. In this case study, learn why the insurance company choose to implement Shape's Enterprise Defense to stop these attacks.
Posted: 30 Aug 2019 | Published: 30 Aug 2019

Shape Security

Gaining Visibility into Risk and the ROI of Your Security Program
sponsored by Verizon
ANALYST REPORT: To make informed decisions about risk tolerance and security spending, it is critical to gain insight into the effectiveness of your security architecture, the threat landscape, and vulnerabilities. Download this IDC research report to explore how organizations can evaluate their security programs in the broader context of business risk.
Posted: 29 Aug 2019 | Published: 31 Oct 2018

Verizon

6 Degrees of Network Security
sponsored by Cisco Umbrella
RESOURCE: A number of obstacles stand between you and a safe network. Your security solution shouldn't be one of them. Download this infographic to uncover 6 common security pitfalls that put your users, their devices, and your data at risk.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

Cisco Umbrella

Identity and Access Management for the Real World: Identity Governance
sponsored by One Identity
WHITE PAPER: This white paper evaluates what IAM for the real world would, should and can look like. It delves into the most pressing IAM issues faced by virtually every organization and offers actionable, affordable and sustainable approaches to the challenges you face. Read on to learn more.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

One Identity

Webinar: Latest Fraud Schemes in Retail and Hospitality
sponsored by Shape Security
WEBCAST: Up to 99% of the traffic on retail and e-commerce login forms are due to account takeover (ATO) attempts. In this webinar, Shape Security's Threat Intel Analyst Smriti Kawal Jaggi will explain how attackers use both online and offline methods to target individuals and monetize successful ATOs.
Posted: 29 Aug 2019 | Premiered: Jul 31, 2019

Shape Security

How Tier One Bank can Innovate Alongside Financial Aggregators
sponsored by Shape Security
VIDEO: Aggregators innovate but also add credential-stuffing threat surface, ATO risk, and more. In this video, learn the techniques and strategies that Fortune 500 Banks use to partner with aggregators and better serve clients.
Posted: 28 Aug 2019 | Premiered: 28 Aug 2019

Shape Security

Druva Security Overview: End-to-End Data Security
sponsored by Druva Software
DATA SHEET: Your organization is tasked with ensuring data security, regardless of how or where backup solutions are deployed. In this overview, see how your organization can receive end-to-end data security from Druva.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Druva Software

Unlock the Value of Office 365 Data Protection
sponsored by Druva Software
EBOOK: Read this e-book to discover 4 reasons why cloud-native data protection and management is essential to any Office 365 deployment and how to ensure O365 data is properly backed up.
Posted: 27 Aug 2019 | Published: 27 Aug 2019

Druva Software

Natural Language Understanding (NLU): A New Way to Fight Cyberattacks
sponsored by Armorblox
WEBCAST: In this webcast, listen as Garret Bekker from 451 Research and Anand Raghavan from Armorblox discuss the email threat landscape and how Armorblox leverages deep learning and natural language understanding to deliver more comprehensive and accurate data security.
Posted: 26 Aug 2019 | Premiered: Aug 26, 2019

Armorblox

6 Reasons Why Your Security Appliance Solution is Failing Your Business
sponsored by Avast Software
WHITE PAPER: A decade ago it was easier to secure most businesses. With less advanced threats, most SMBs were protected with a combination of Unified Threat Management and Secure Web Gateways. In this white paper, uncover the most common reasons these security application solutions are now failing your business.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Avast Software

10 Questions to Answer Before Adopting SaaS SIEM
sponsored by LogRhythm, Inc.
ANALYST REPORT: SaaS-like options for leveraging SIEM technologies are becoming more common. Download this Gartner research report to explore a series of questions that should be asked and answered when considering SaaS SIEM to determine if it's an appropriate option for your organization.
Posted: 23 Aug 2019 | Published: 05 Nov 2018

LogRhythm, Inc.

Security and Privacy at Armorblox
sponsored by Armorblox
PRODUCT OVERVIEW: Armorblox takes the security and privacy of their customers' data seriously. Download this brief to learn about their natural language platform.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Armorblox

Security Powered by Understanding
sponsored by Armorblox
DATA SHEET: In this brief, learn how Armorblox brings understanding to security to address security's weakest link: the human layer.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Armorblox

Preserve Proven Business Continuity Practices Despite Changes In Your Storage Infrastructure
sponsored by DataCore Software Corporation
WHITE PAPER: This resource offers easy-to-follow guidance on how to preserve your business continuity practices as your storage infrastructure evolves. Read it here to ensure your enterprise can confidently adapt recovery methods to new scenarios.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

DataCore Software Corporation

Armorblox NLU Platform
sponsored by Armorblox
PRODUCT OVERVIEW: Using natural language understanding (NLU), deep learning, analytics, automation, and distributed remediation, Armorblox can help defend your organization against business email compromise attacks, prevent data leaks, and inject integrity into your business workflows. In this solution brief, explore key features of the Armorblox NLU Platform.
Posted: 22 Aug 2019 | Published: 22 Aug 2019

Armorblox

Armorblox for Data Privacy
sponsored by Armorblox
DATA SHEET: With employees sharing content over email, messaging apps, and cloud storage on a daily basis, Data Privacy is a major challenge for organizations. Armorblox can protect your organization against malicious or accidental data privacy breaches, and helps you avoid financial penalties and brand damage. Download this brief to learn more.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

Armorblox

Don't Let Unexpected Storage Dependencies Put Your Business Continuity Plans at Risk!
sponsored by DataCore Software Corporation
RESOURCE: Despite assumptions to the contrary, you don't have to waste time and money reinventing your BC/DR plan every time your storage infrastructure changes. Download this infographic for more information on how to preserve proven business continuity practices even as your storage infrastructure evolves.
Posted: 21 Aug 2019 | Published: 21 Aug 2019

DataCore Software Corporation

Taking Steps to Prevent Your BC/DR Plans from Being Derailed
sponsored by DataCore Software Corporation
WHITE PAPER: The following white paper digs into how storage array replacement, mergers and acquisitions, cloud replication, multi-site metro clusters, and HCI could disrupt current BC/DR processes and how enterprises can use software-defined storage to fortify their BC/DR practices during these situations.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

DataCore Software Corporation

A Computer Weekly buyer's guide to data protection
sponsored by ComputerWeekly.com
EGUIDE: Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

ComputerWeekly.com

Top Reasons to Choose Dell EMC PowerProtect
sponsored by DELL EMC & INTEL®
DATA SHEET: Introducing Dell EMC PowerProtect, a solution that provides steadfast data protection and availability to improve the integrity of your business' most valuable asset: your data. How does PowerProtect accomplish this? Download the following datasheet to find out.
Posted: 16 Aug 2019 | Published: 31 Dec 2018

DELL EMC & INTEL®

Infographic: Dell EMC PowerProtect
sponsored by DELL EMC & INTEL®
RESOURCE: Download this infographic to view a solution—Dell EMC PowerProtect—that will help your organization go beyond backup and transform data into business value.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

DELL EMC & INTEL®

Global Data Protection Index Highlights
sponsored by DELL EMC & INTEL®
RESOURCE: According to a survey from Vanson Bourne, 69% of respondents said they were not very confident they could meet service level objectives to fully recover systems and data. Read this infographic for the highlights of the study, as well as to learn 3 tactics that will help you extend, protect, and maximize the value of your organization's data.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

DELL EMC & INTEL®

Improve Your Relationship with Data
sponsored by Virtru
EBOOK: No matter where you are in your cloud journey, there's still time to improve your relationship with your data. Becoming familiar with your data and knowing all the places it resides is a great place to start. Discover how to improve your relationship with data by building a compliance readiness plan today.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

Virtru
76 - 100 of 1975 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement