IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 2000 Matches Previous Page  |  Next Page
Case Study: NetLib Helps MIMICS gain competitive advantage in the Financial Sector
sponsored by NetLib Security
CASE STUDY: In this case study, follow the data security journey of MIMICS, a financial software firm, and their continued partnership with NetLib Security as they focus on security objective related to database encryption, data privacy regulations, and more.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

NetLib Security

Beginners Guide to Encryption and Key Management (and Encryptionizer)
sponsored by NetLib Security
RESOURCE: Sensitive personal information and business data has become increasingly critical to defend as its value grows amongst ‘the bad guys’. But what is the best way to go about protecting data from falling into the wrong hands? Read on to find out.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

NetLib Security

Cloud Security During Mergers and Acquisitions
sponsored by DivvyCloud
WHITE PAPER: Like any large-scale data migration, mergers and acquisitions (M&As) require careful planning. The efficacy of an organization’s cloud security strategy plays a critical role in the success of a M&A. This white paper further illustrates when & how things can go wrong during a migration and offers tips for overcoming these challenges.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

DivvyCloud

A Holistic Approach to Securing Kubernetes That Integrates Culture and Technology
sponsored by DivvyCloud
WHITE PAPER: Today’s ever-evolving cloud and container environments paves the way for both innovation and security headaches. In this white paper, discover how integrating a holistic approach for meeting regulatory requirements with Kubernetes can help provide a competitive advantage.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

DivvyCloud

Modern Dell EMC Storage and Data Protection Optimize SAP Workloads and S4/HANA Migration
sponsored by Dell Technologies and Intel
ANALYST REPORT: This Forrester Report explains how to match the data protection and storage requirements of SAP HANA workloads, as well as the challenges, drivers, benefits, and costs of migrating to SAP HANA and SAP S/4HANA. Download now for the essential takeaways and to examine a set of solutions from Dell EMC that meets these needs.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

Dell Technologies and Intel

2020 Cloud Misconfigurations Report
sponsored by DivvyCloud
WHITE PAPER: Across 2018 and 2019, data breaches caused by cloud misconfiguration resulted in the exposure of over 33 billion records, which led to a loss of nearly $5 trillion. In this report, explore the underlying causes of this threat and discover best practices for avoiding a misconfiguration-related incident.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

DivvyCloud

Building Cloud Services for Security: 3 Common Misconfigurations
sponsored by DivvyCloud
WHITE PAPER: Ensuring the secure configuration of a distributed set of cloud services is a critical piece to cloud transformation. In fact, most risk areas related to cloud come from security misconfigurations. This white paper highlights 3 common misconfigurations and explores ways to fix them or prevent them from happening.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

DivvyCloud

Security for your private data center: Getting it right
sponsored by Kaspersky Lab
WHITE PAPER: Over 75% of companies already work with software-defined data centers, and that number looks to continue its upward trend. But what is a corporate data center and why is protecting it so important? Read on to find an in-depth answer, as well as an overview of modern data center threats and how to overcome them.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

Kaspersky Lab

How to seamlessly and securely transition to hybrid cloud
sponsored by Kaspersky Lab
WHITE PAPER: As organizations begin rapidly embracing hybrid cloud for its various benefits, it’s critical that ensuring security is at the foundation of the transition. Read this white paper to learn more about the importance of hybrid cloud security, common challenges and how to overcome them.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

Kaspersky Lab

GDPR Compliance support that works for your business
sponsored by TITUS
PRODUCT OVERVIEW: GDPR is forcing organizations to rethink their workflows and achieve broader visibility into personal data collection. In this solution brief, take a closer look at Titus’ offering that is powered by machine learning to help identify what data you have, how sensitive it is, and how it should be handled by your security stack.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

TITUS

Mobile Security App-titude: Best Practices for Secure App Design and Data Privacy
sponsored by WhiteHat Security
WEBCAST: Data privacy is a hot topic right now, whether people are concerned with the security of video conferencing, third-party cookies being removed from Google Chrome, or other major safeguarding headlines. This webinar dives into data privacy concerns. Tune in to the conversation. Watch the webinar here.
Posted: 06 Apr 2020 | Premiered: Apr 6, 2020

TOPICS:  Data Security
WhiteHat Security

Protect & Recover Your Data with StorageCraft Ransomware Recovery Solutions
sponsored by StorageCraft Technology Corporation
DATA SHEET: The following resource highlights a set of solutions from StorageCraft with which you can combat these attacks. Access now to view the advantages of deploying them and to ensure your last line of defense against ransomware is as resilient as ever.
Posted: 06 Apr 2020 | Published: 31 Dec 2019

StorageCraft Technology Corporation

Martins Group Deploys StorageCraft OneXafe to Safeguard Business Against Rapid Data Growth
sponsored by StorageCraft Technology Corporation
CASE STUDY: Download the following case study to discover how Martins Group benefited from protecting their systems with a unified, converged data protection solution.
Posted: 06 Apr 2020 | Published: 06 Apr 2020

StorageCraft Technology Corporation

Global Partners
sponsored by TITUS
WHITE PAPER: To bring best-of-breed data classification solutions to enterprise customers across the globe, Titus relies on partnerships with recognized security technology companies as well as solution providers in every region. Download this white paper to learn more about Titus’s global partners.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

TITUS

6 Key Use Cases for Securing Your Organization’s Cloud Workloads
sponsored by Cyber-Ark Software
CASE STUDY: In order to ensure organizations are transitioning to the cloud responsibly, security programs need to be implemented that address the unique challenges each organization faces. In this collection of use cases, discover how 6 organizations overcame various cloud security challenges to ensure their data was protected.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Cyber-Ark Software

Data security success at financial institutions around the world
sponsored by TITUS
CASE STUDY: In order to protect their sensitive data and critical applications, security leaders at financial institutions have worked to integrate adequate cybersecurity methods. This white paper highlights a few key examples of global financial institutions who saw success from their partnerships with Titus. Read on to learn more.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

TITUS

The Move to Multiple Public Clouds Creates Security Silos
sponsored by Radware
WHITE PAPER: The migration of data to the cloud appears to be a trend that isn’t slowing down. Luckily for security teams, ensuring the protection of this critical data has come a long way. This report highlights the key findings of a study designed to further understand the impact of cloud migration on cybersecurity. Read on to unlock the results.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Radware

Cyber Resilience for Dummies
sponsored by mimecast
EBOOK: Today’s organizations are more connected than ever – IoT and cloud technologies enable massive, interconnected ecosystems. In order to ensure the security of these fragile networks, security leaders are opting for cyber resilience practices. Download your copy of Cyber Resilience for Dummies to learn more about the cyber resilience imperative.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

mimecast

Data Protection in the Enterprise
sponsored by TITUS
DATA SHEET: Download this white paper to learn about the Titus Classification Suite.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

TITUS

What Is Application Security?
sponsored by Veracode, Inc.
DATA SHEET: As organizations shift from data hosted in traditional databases to application containers, security needs to also shift to reflect this change. This data sheet provides an overview of application security to equip you with the knowledge you need to get started.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Veracode, Inc.

Digital Resilience in the Multi-Cloud Era
sponsored by Trustwave
EBOOK: Today’s enterprise typically consists of multiple cloud offerings orchestrated to offer enhanced scalability and seamless customer experience. However, each additional vendor increases the potential for security vulnerabilities. This e-book offers best practices for addressing common challenges tied to data privacy in the cloud.
Posted: 27 Mar 2020 | Published: 27 Mar 2020

Trustwave

Encrypt Everything
sponsored by Thales
EBOOK: Today’s IT security leaders are tasked with ensuring enterprise-wide protection for sensitive data. However, challenges arise due to data residing in various platforms (like on-prem systems or in the cloud). In this e-book, discover an overview of a data protection method along with best practices to ensure security.
Posted: 26 Mar 2020 | Published: 30 Nov 2019

Thales

The Changing Face of Data Security 2020 Thales Data Threat Report
sponsored by Thales
ANALYST REPORT: No organization is immune from data security threats, with 49% of global respondents experiencing a data breach at some point. In this 2020 Thales Data Threat Report, learn why it’s important to implement a smarter approach to data security and review IDC’s research on the topic.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Thales

Protecting a Nation in the Cloud
sponsored by Trustwave
CASE STUDY: In this case study, see how a major government sub-agency partnered with Trustwave to address challenges they were having with securing sensitive data across multiple cloud vendors. Read on to follow the journey of their partnership.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Trustwave

Upgrading Existing Security Systems to Agile Quantum-Safe
sponsored by Thales
PRODUCT OVERVIEW: Since the National Security Agency (NSA) issued a warning against quantum computer attacks in 2015, organizations have begun to revisit their protection strategies in order to account for this growing threat. This solution brief highlights 3 challenges in today’s landscape and recommends tools for addressing them. Read on to learn more.
Posted: 24 Mar 2020 | Published: 31 Aug 2019

Thales
1 - 25 of 2000 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info