IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 1999 Matches Previous Page  |  Next Page
CipherTrust Data Security Platform
sponsored by Thales
DATA SHEET: Security pros tasked with ensuring data protection are facing challenges on 3 fronts: looming cyberthreats, growing compliance requirements, and expanding environments. Read this data sheet for a closer look at the key features and capabilities of Thales’ CipherTrust Data Security Platform – which looks to alleviate these pain points.
Posted: 26 Oct 2020 | Published: 26 Oct 2020

Thales

Protecting and Securing Your Critical Data with Acronis Cyber Backup
sponsored by Acronis
WHITE PAPER: Access this white paper to explore the challenges involved in protecting and securing private business data and see how Acronis Cyber Backup meets these challenges while addressing all 5 vectors of cyber protection.
Posted: 26 Oct 2020 | Published: 19 Oct 2020

Acronis

Computer Weekly - 27 October 2020: Pet project: How Pets at Home cares for customers with data analytics
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the chief data officer of Pets at Home, about using data analytics to care for customers. British Airways had its GDPR fine reduced to just £20m – we ask what this means for data protection regulation. And we look at GPT3, the language prediction tool that could revolutionise AI. Read the issue now.
Posted: 26 Oct 2020 | Published: 27 Oct 2020

ComputerWeekly.com

Data Protection is No Longer Optional: Why It’s a Requirement and How to Protect Your Business
sponsored by iland Internet Solutions Inc.
WEBCAST: Save your seat at this exclusive webinar—airing December 10, 2020 at 8am PT /10am CT /11am ET—to discover how you can take advantage of Veeam and iland for multi-layered protection & recovery, air-gapped cloud backups with anti-ransomware features, Office 365 security, and more.
Posted: 26 Oct 2020 | Premiered: Oct 26, 2020

iland Internet Solutions Inc.

The Key Pillars For Protecting Sensitive Data In Any Organization
sponsored by Thales
WHITE PAPER: Traditionally, companies have focused IT security primarily on perimeter defense. While this is important, it’s not enough. With today’s data scattered across networks, organizations need to apply a security strategy that protects data wherever it is. View this white paper to see the CipherTrust Data Security platform by Thales.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

Thales

The Total Economic Impact of Armor Anywhere
sponsored by Armor
WHITE PAPER: In this Forrester Total Economic Impact (TEI) report, take a closer look at the costs, risks and benefits of Armor Anywhere in an effort to uncover the potential ROI an organization may realize.
Posted: 23 Oct 2020 | Published: 31 Aug 2020

Armor

Computer Weekly – 19 May 2020: Ocado makes the friendly workplace robot a reality
sponsored by ComputerWeekly.com
EGUIDE: In this week's Computer Weekly, we find out how Ocado is making robot-human collaboration a reality. Unified com-munications has become a must-have lockdown capability – we assess the key technologies. And as contact-tracing apps emerge to help deal with the Covid-19 pandemic, we exam-ine the data privacy challenges. Read the issue now.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

ComputerWeekly.com

Security for Modern Data Centers
sponsored by Fortinet, Inc.
WHITE PAPER: Data centers are a magnet for cybercriminals – likely due to the amount of sensitive or confidential information they manage. This Ponemon Institute white paper provides an overview of the importance of data center security and how to protect modern data centers – read on to get started.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Fortinet, Inc.

4 Ways Commvault Activate Improves Your Ability to Know, Manage, and Use Your Data
sponsored by Commvault
WHITE PAPER: Check out this white paper to learn 4 ways Commvault Activate can improve the way you know, manage, and use your data for security and governance purposes.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Commvault

The Reality of Ransomware – Is Your Data Recovery Ready?
sponsored by Commvault
DATA SHEET: Access this data sheet to view a 5-step plan to protect against ransomware and discover 7 distinguishing features of Commvault ransomware recovery.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Commvault

The Complete Guide for Preventing Costly Data Leaks for UK Local Governments
sponsored by Zivver
EGUIDE: For local governments in the UK, a data leak can be catastrophic, not to mention expensive. This guide provides a deep dive into the risks that lead to data leaks and what UK councils can do to prevent them from happening.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Zivver

Securing Public Clouds: Understand the Cloud Shared Responsibility Model
sponsored by Radware
WHITE PAPER: As organizations continue to adopt cloud services, one key issue remains – each public cloud user and provider has their own unique security policies and approaches, making it difficult to achieve standard, unified security. This white paper overviews the cloud shared security model, which aims to address these challenges.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Radware

At the Edge of Change
sponsored by Aruba Networks
RESOURCE: As the volume of network data explodes it must be processed, stored and analyzed near its source – at the edge. What do IT decision makers (ITDMs) think of this change, and how are they preparing? What barriers to they need to overcome to utilize the edge? Jump into this infographic to find out.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Aruba Networks

RAT Protection for Banking Customers That Works
sponsored by Buguroo
WHITE PAPER: Check out this white paper to learn about bugFraud from Bugaroo, a next-gen fraud prevention solution that identifies user’s behavioral and cognitive analytics to uniquely profile users in order to prevent online banking fraud through remote access trojan (RAT) attacks.
Posted: 15 Oct 2020 | Published: 15 Oct 2020

Buguroo

Decade of the Rats
sponsored by BlackBerry
ANALYST REPORT: The world is concerned with cyber espionage in the perpetual firestorm of information gathering, and the prime target? Linux servers. Learn why in this report and learn also the different types of remote access trojans (RATs) and what they look like.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

BlackBerry

See and Defend Cloud Workloads with CrowdStrike and AWS
sponsored by AWS & CrowdStrike
VIDEO: Cloud security is growing more difficult as it becomes more popular, and security teams face the growing risk of addressing these challenges alongside compliance requirements. Watch this webinar to learn how CrowdStrike and AWS are helping to provide complete security for the cloud.
Posted: 14 Oct 2020 | Premiered: 14 Oct 2020

AWS & CrowdStrike

Data Storage for Every Data Tier
sponsored by Iron Mountain
DATA SHEET: Access this data sheet to learn how Iron Mountain’s Data Management Service Portfolio lets you do things like easily move inactive cloud data to tape, decrease your storage costs and ensure long-term archival data compliance.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Iron Mountain

Veeam Availability Suite v10: Backup and Recovery Capabilities You Didn’t Know About
sponsored by Veeam Software
WEBCAST: Access this webcast to learn the 5 most important capabilities to consider when protecting your assets, no matter where they are, how to move backup copies off site in a safe and secure way, and much more.
Posted: 13 Oct 2020 | Premiered: Apr 1, 2020

Veeam Software

Aruba Clearpass Enables Secure and Robust Connectivity for Thousands Of Users In A Multi-Vendor Environment
sponsored by TechData
CASE STUDY: Since UST Global’s operations are spread across the globe, their associates always need secure connectivity. This means that rather than having a stable and flexible wireless network, they also had to ensure the highest level of data security. Download this case study to learn how UST Global was able to achieve this with the help of Aruba.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

TechData

Benefits of Migrating from Web Access Management (WAM)
sponsored by Okta
PRODUCT OVERVIEW: For organizations favoring hybrid IT environments, web access management (WAM) tools have historically offered effective security. However, as these organizations grew, WAM began to show signs of cracking. Read this white paper to learn more about the disadvantages of WAM and how to secure hybrid IT environments.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Okta

Choosing the Best Mobility Management Solution
sponsored by BlackBerry
WHITE PAPER: Third-party unified endpoint management (UEM) tools are emerging as one of the most cost-effective and secure ways to gain visibility into and protect all endpoints within an organization’s network. This VDC Research report provides a comparative analysis of BlackBerry’s UEM offering vs. Microsoft’s UEM – read on for the results.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

BlackBerry

Futureproofing IoT
sponsored by BlackBerry
ANALYST REPORT: The number of devices connected to the internet of things (IoT) is set to more than double in the next five years. While a surge in data promises gains in efficiency and productivity, experts warn of the growing threat from state-sponsored hackers. In this report, explore the steps businesses must take to ensure their IoT is properly secured.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

BlackBerry

Compliance Made Easy
sponsored by Armor
RESOURCE: The Armor Compliance Matrix was created with the intention of helping IT, IT security and compliance teams understand the major compliance mandates their organizations are subject to and how Armor can help accelerate adherence. Read on for an exclusive look at the matrix.
Posted: 06 Oct 2020 | Published: 06 Oct 2020

Armor

Distance Learning’s Impact on Education IT
sponsored by Absolute Software Corporation
WHITE PAPER: The spread of COVID-19 has brought about a rapid and dramatic shift towards remote learning models in order to facilitate classroom effectiveness at K-12 schools. This report provides an overview of these challenges, risks and opportunities – gathered from a recent study into the impact of COVID-19 and remote learning on education IT.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Absolute Software Corporation

What is Operational Resilience?
sponsored by LogicGate
RESOURCE: According to Gartner, operational resilience is a set of techniques that allows people, processes and information systems to adapt to changing patterns. How do businesses not just prepare but succeed when faced with the unexpected? Read this quick article to get an understanding of how organizations comprehend their respective risk.
Posted: 02 Oct 2020 | Published: 17 Sep 2020

LogicGate
1 - 25 of 1999 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info