IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
76 - 100 of 2026 Matches Previous Page  |  Next Page
Enterprise Data Protection Solutions, Explained
sponsored by Forcepoint
WHITE PAPER: Incomplete or sub-par data protection practices can have devastating impacts for an organization – and choosing the right data protection partner is no easy task. To help you get started, download this enterprise data protection buyer’s guide to key evaluation criteria, questions to consider, a comparison of top vendors, and more.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Forcepoint

The Definitive Guide to Data Protection
sponsored by Forcepoint
RESOURCE: It’s estimated that 90% of the world’s data was created in only two years. To compound this, the proliferation of mobile devices and remote employees means that data is stored and accessed in more places, by more people—at any time.To sum up, today’s data is equally as vulnerable as it is accessible. To learn how to protect it, read this guide.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Forcepoint

Frost & Sullivan Best Practices Award
sponsored by Onfido
WHITE PAPER: The Technology Leadership Award is given out each year by Frost & Sullivan after a 10-step analysis of key vendors within a certain field. For 2019, the winner was Onfido for their achievements in innovation and adherence to industry best practices. Read on for an analysis of Onfido’s offering and discover how they earned this recognition.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Onfido

Protecting Workloads and Hybrid in Multi-Cloud Environments
sponsored by Guardicore
WHITE PAPER: Businesses may be moving to the cloud, but with 98% of enterprises running on-premise servers, data centers aren’t going anywhere. A hybrid cloud model uses both on-prem data centers and a public cloud to optimize functionality. Read this white paper for information on how to keep these dual-workloads secure.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Guardicore

9 Steps to Success with Data Protection
sponsored by Forcepoint
RESOURCE: Effective data protection requires delicate balance between meeting the productivity needs for strategic imperatives and assuaging the security concerns of the risk averse. To help you get started, this infographic highlights 9 steps for implementing effective data protection controls that meet your needs. Read on to unlock the steps.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

Forcepoint

CISO’s Guide to Reducing Risk with Responsible Disclosure
sponsored by HackerOne
WHITE PAPER: Data breaches have devastated organizations over recent years. However, countless breaches were prevented due to hackers disclosing known security vulnerabilities to the organization through what’s known as vulnerability disclosure polices (VDPs). In this white paper, discover how CISO’s can leverage VDPs to reduce risk in their environments.
Posted: 21 Jul 2020 | Published: 21 Jul 2020

HackerOne

Eliminating the Weakest Link
sponsored by Iron Mountain
WEBCAST: Access this webcast to hear two solution experts from Iron Mountain discuss the backup challenges associated with working remote, the new business continuity landscape, where organizational priorities should lie, and the future for remote workforces.
Posted: 21 Jul 2020 | Premiered: Jul 21, 2020

Iron Mountain

Why Companies Move to the Cloud: 8 Success Stories
sponsored by Talend
CASE STUDY: Businesses want to migrate to the cloud for a variety of reasons: storage scalability, data integration, flexibility. When you have a data management suite that can do it all, the process of cloud migration suddenly becomes easier. Check out these 8 cloud migration success stories to learn why companies choose Talend when moving to the cloud.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Talend

Don't Pay the Bad Guys! Protect Your Data from Ransomware Attacks
sponsored by Bytes Technology Group
RESOURCE: Rubrik is utilizing machine learning to provide instant recovery, immutability, and impact visibility which makes paying ransoms a thing of the past. Access this resource to learn the 5 components of Rubrik’s solution and see for yourself how it compares to traditional backup architectures.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Bytes Technology Group

GDPR, CCPA, & Beyond
sponsored by Talend
WHITE PAPER: Access this white paper to learn about the data sovereignty regulations that dictate data privacy across the globe including GDPR and CCPA and discover 16 steps to enact a data governance program for data privacy with Talend.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

Talend

Modernizing Your Infrastructure in a Multi-cloud World
sponsored by IBM
WEBCAST: During this webcast, you’ll hear directly from IBM executives and Netezza experts focusing on the improvements to your business that you can achieve by modernizing Netezza in a multicloud world, as well as the benefits of Cloud Pak for Data, a fully integrated data and AI platform.
Posted: 16 Jul 2020 | Premiered: Jul 16, 2020

IBM

Microsoft Data Protection: A Growing Success Story
sponsored by InteliSecure
EGUIDE: In 2017, InteliSecure conducted an evaluation of Microsoft’s data protection capabilities – the results were less than ideal. Since then, Microsoft has made great improvements to the built-in data protection capabilities native to their licensing bundles. Download this e-guide for a closer look at Microsoft’s data protection advances.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

InteliSecure

C-Suite Perspectives: Cybersecurity Implications of Transforming Into a Multicloud Environment
sponsored by Radware
ANALYST REPORT: As organizational demand for agility and performance increases, multicloud architectures are becoming more viable due to their cost-effectiveness.That said, the cybersecurity implications of adopting multicloud cannot be ignored.Browse this report to learn how C-suite professionals responded about movement to multicloud environments.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

Radware

Prevent Ransomware Attacks from Disrupting Your Business with Thales Data Security
sponsored by Thales
WHITE PAPER: Cybersecurity Ventures predicts that a business will fall victim to a ransomware attack every 11 seconds, and the estimated cost to businesses globally will be around $20 billion by 2021. In this white paper, learn how to defend against ransomware by taking a look at the anatomy of ransomware attacks.
Posted: 16 Jul 2020 | Published: 30 Jun 2020

Thales

Advanced Data Obfuscation with Libelle DataMasking
sponsored by Libelle
WHITE PAPER: Obfuscating sensitive data like credit card information or social security numbers is no longer just a moral responsibility for many companies—it’s now becoming a legal requirement. Read this white paper to learn what, exactly, data masking is and how you can use it to protect and secure data even as you make it available for analytics purposes.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

Libelle

The Big Bad Bot Problem 2020
sponsored by Radware
ANALYST REPORT: Research showed that in 2019 ‘bad bot’ traffic rose to 24.5% of total internet traffic, a 20% increase year over year.What’s more is that automated threats are evolving to be more sophisticated in their capabilities to mimic human behavior. Is your organization prepared?View this report for a look at the landscape and implications for the future.
Posted: 16 Jul 2020 | Published: 16 Jul 2020

Radware

Leading Dutch IT Services Provider Gets Complete Office 365 Protection
sponsored by Barracuda
CASE STUDY: After successive failures to protect data with their previous backup provider occurred, Truston knew they needed a more efficient off-site backup solution for their O365 data. Download this case study to discover the results of Truston investing in Barracuda Essentials.
Posted: 16 Jul 2020 | Published: 31 Dec 2017

Barracuda

Aligning Cyber Risk Management with Business Performance
sponsored by Coalfire
WHITE PAPER: Traditionally, the realm of cybersecurity was considered a technical issue to be solved by technical people. The mindset has changed, and organizations are looking to align cybersecurity objectives with business imperatives. Download this white paper to explore how CISOs can develop a plan to mitigate risks while optimizing resources.
Posted: 15 Jul 2020 | Published: 10 Jul 2020

Coalfire

2020 Data Breach Investigations Report
sponsored by Verizon
WHITE PAPER: Each year, Verizon conducts a Data Breach Investigations Report (DBIR) to observe and analyze data breaches and provide industry professionals with key takeaways, industry highlights, relevant best practices, and more. Read on to unlock the complete 119-page report overviewing this year’s findings.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Verizon

Securing Big Data
sponsored by Thales
WHITE PAPER: In this white paper, explore the results of the various performance benchmarks run by the Vormetric Product Development team on a reference Hadoop configuration secured with Vormetric Transparent Encryption.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Thales

Quantum Computing and Quantum-Safe Security
sponsored by Thales
WHITE PAPER: Although quantum computer will have many benefits, it will also have the ability to do harm. The very same computing power that allows complex problems to be solved can, in turn, be applied to undermine cybersecurity. In this white paper, learn more about quantum computing and the implications it will have on the cybersecurity landscape.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Thales

Dutch Insurance Provider Deploys Barracuda Firewalls from Data Unit
sponsored by Barracuda
CASE STUDY: Aevitae, a leading Dutch insurance provider company, was not satisfied with any of their existing firewalls solutions. They sought a solution that would provide seamless, end-to-end data visibility across their hybrid environment. In this case study, learn why Aevitae ultimately decided to partner with Barracuda Networks.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Barracuda

Vormetric Transparent Encryption for the SAP HANA® Data Management Suite
sponsored by Thales
PRODUCT OVERVIEW: While SAP HANA users realize unmatched operational efficiency, enhanced capabilities are often accompanied by increased risk. In this white paper, take a closer look at Thales’ Vormetric Transparent Encryption (VTE), designed to help organizations control the risks of sensitive data-at-rest within SAP HANA environments.
Posted: 14 Jul 2020 | Published: 31 Jul 2019

Thales

Is Your Front Door Open and Unlocked for Cyber Criminals?
sponsored by Verizon
RESOURCE: When it comes to cyber security, small businesses represent 43% of all data breaches because their false sense of security leads them to not put proper defenses in place. In this blog, learn why cyber criminals often target SMBs before going after larger organizations.
Posted: 14 Jul 2020 | Published: 14 Jul 2020

Verizon

The Changing Face of Data Security: 2020 Thales Data Threat Report
sponsored by Thales
WHITE PAPER: Thales, in conjunction with IDC, provides a comprehensive Data Threat Report each year designed to analyze the key trends and challenges as they relate to data breaches and securing critical data. Download this year’s Data Threat Report to learn more about the effects of digital transformations, cloud environments, and more.
Posted: 13 Jul 2020 | Published: 31 Mar 2020

Thales
76 - 100 of 2026 Matches Previous Page    2 3 4 5 6 7    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info