IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 2018 Matches Previous Page  |  Next Page
Selecting Your Next-Generation Firewall Solution
sponsored by Fortinet, Inc.
WHITE PAPER: As security architects consider how to provide comprehensive threat protection for their enterprises, they face a confusing array of feature sets and vendor claims lacking complete specifications and/or standards-based performance metrics. View this white paper so that you may approach your CISO with a well-informed and compelling recommendation.
Posted: 06 Aug 2020 | Published: 06 May 2020

Fortinet, Inc.

Incorporate Information Protection into Microsoft Teams from the Start
sponsored by Nucleus Cyber
RESOURCE: Microsoft Teams’ user base has nearly doubled over the past few months. However, new users face the risk of misconfiguration during initial setup, which can lead to data exposure and even theft. This article highlights 3 key practices new Microsoft Teams users should implement in order to avoid these risks.
Posted: 06 Aug 2020 | Published: 28 May 2020

Nucleus Cyber

CipherTrust Cloud Key Manager for Multi-cloud Environments - White Paper
sponsored by Thales
WHITE PAPER: The era of multi-cloud environments has enabled unmatched scalability and productivity. However, in order to optimize these capabilities, organizations need to restructure their approaches to data protection and key management. Download this report for a closer look at Thales’ CipherTrust Cloud Key Manager for multi-cloud environments.
Posted: 05 Aug 2020 | Published: 31 Jul 2020

Thales

Best Practices for Cloud Data Protection and Key Management
sponsored by Thales
WHITE PAPER: In the era of digital transformation and multi-cloud environments, ensuring the protecting of sensitive data is more important than ever. The following whitepaper highlights cloud data protection best practices, including an in-depth look into cloud native encryption and key management (BYOK, HYOK, RoT & more).
Posted: 05 Aug 2020 | Published: 31 Jul 2020

Thales

CipherTrust Cloud Key Manager
sponsored by Thales
PRODUCT OVERVIEW: To meet the recommendations of industry best practices, organizations are offering bring your own key (BYOK) services. However, this level of separation can have significant visibility and security impacts. This solution brief offers a closer look at CipherTrust Cloud Key Manager, which leverages BYOK while offering centralized visibility.
Posted: 05 Aug 2020 | Published: 30 Apr 2020

Thales

Unlock Hidden Resources in Your Hybrid Virtualization Infrastructure
sponsored by Quest
WHITE PAPER: Read this white paper for guidance on how to meet the backup and recovery needs of container and hybrid virtualized environments, as well as how to find, and apply, the most suitable and flexible solution.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

Quest

Enhancing the Modern Workplace with Hardware-Enforced Security
sponsored by Servium
WHITE PAPER: An exceptional user experience, no matter where work gets done is fundamental to the modern workplace. However, balancing this pursuit and the freedoms it entails with robust security is tough for IT teams. In this white paper, learn why a different approach to security is needed to support the modern workplace.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

Servium

Cloud with Confidence: Re-Imagine Cloud Security
sponsored by Checkpoint Software Technologies
EGUIDE: According to Verizon’s 2020 Data Breach Investigations Report, human error accounted for 22% of all breaches. So, as cloud capabilities expand into all areas of the business, how can organizations ensure adequate configuration to avoid human error? Download the following e-guide for insight and guidance regarding this persistent issue.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

Checkpoint Software Technologies

Tried and Tested: The New Paradigm in the Workplace
sponsored by NTT
ANALYST REPORT: The COVID-19 lockdown has forced the acceleration of companies' digital transformation agendas, with important advancements in employee engagement, productivity and security. In this IDC report, learn more about how the new paradigm or work is transforming the workplace, workforce and work culture.
Posted: 03 Aug 2020 | Published: 03 Aug 2020

NTT

When Everything is Closed, Keep Your Business Open with Remote Access
sponsored by Aruba Networks
RESOURCE: When the unexpected happens, it doesn’t have to mean downtime for your business. In this infographic, learn how Aruba remote access solutions can help provide your business with seamless access, always-on connectivity, zero-touch provisioning, and more.
Posted: 31 Jul 2020 | Published: 31 Jul 2020

Aruba Networks

Making Apache Spark Better with Delta Lake
sponsored by DataBricks
EBOOK: For data engineers, building fast, reliable pipelines is only the beginning. Today, you also need to deliver clean, high quality data ready for downstream users to perform BI and ML. Read on to learn how the best big data engines like Apache Spark can be improved with the addition of the Delta Lake.
Posted: 30 Jul 2020 | Published: 30 Jul 2020

DataBricks

Staying Secure in the Cloud While Driving Innovation: Healthcare & Life Sciences
sponsored by DivvyCloud
EGUIDE: In order to ensure they are meeting user demands, healthcare and life sciences organizations are rapidly embracing cloud capabilities. However, within this industry, security often goes hand in hand with HIPAA compliance. So, how can these organizations balance security, compliance and innovation? Download this e-guide to find out.
Posted: 29 Jul 2020 | Published: 29 Jul 2020

DivvyCloud

Privileged Access Cloud Security For Dummies
sponsored by Thycotic
EBOOK: Cloud breaches have increased to 24% of all breaches per the 2020 Verizon Data Breach Investigations Report. 77% of these breaches involved compromised user credentials. Enter privileged access management (PAM). Understanding PAM is essential in giving users easy, secure cloud access, and so browsing this e-book may be beneficial.
Posted: 28 Jul 2020 | Published: 28 Jul 2020

Thycotic

Threat Intelligence: Shrinking the Cybersecurity Data Gap
sponsored by Bitdefender
WHITE PAPER: The average cost of a data breach reached $3.92B in 2019, and this figure continues to grow year-over-year. Simultaneously, security teams are struggling to keep up with evolving threats and false positives. As a result, more companies are adopting threat intelligence. Read this white paper to learn why it’s becoming more popular.
Posted: 27 Jul 2020 | Published: 27 Jul 2020

Bitdefender

Cloud Architect’s Guide to Office 365 Backup
sponsored by Druva
WHITE PAPER: Access this white paper to learn what Microsoft recommends in their SLA for securing Office 365, why you need to protect your Office 365 data, and the 6 advantages of doing it with Druva.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

Druva

TikTok Case Study
sponsored by Lookout
WHITE PAPER: Social media companies have been known to breach privacy laws regarding user data, and TikTok, a video sharing app, may be the latest culprit. US, Chinese and Russian governments are all of the belief that TikTok is covertly being used to collect user data, and organizations are digging to find answers. Open this white paper to learn more.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

Lookout

Security That Works Wherever You Go: Empower Your Workers to Safely Stay Productive
sponsored by Lookout
DATA SHEET: IT security professionals have never had their hands fuller than during ‘the new normal’. Cybercriminals see the many hundreds of thousands (if not millions) of remote workers as a breaching buffet, and as a result, organizations need to secure their workforces ASAP. View this brochure to find out how you can keep employees secure wherever they go.
Posted: 24 Jul 2020 | Published: 24 Jul 2020

Lookout

Dynamic Data Protection
sponsored by Forcepoint
PRODUCT OVERVIEW: The following solution brief provides an inside look into Forcepoint Dynamic Data Protection, which combines behavior analytics with data protection capabilities to enable your organization to prioritize high-risk activity and automate policies – ensuring security without sacrificing productivity. Read on for an overview of the key features.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Forcepoint

Securing Your Data Stored in OneDrive: SailPoint Demo
sponsored by SailPoint Technologies
VIDEO: In order to responsibly migrate to the cloud, organizations need to take deliberate steps to ensure their cloud-native data is just as secure as on-premise data. Watch this short video for a brief overview of the challenges of ensuring cloud data protection and ways to overcome them.
Posted: 23 Jul 2020 | Premiered: 23 Jul 2020

SailPoint Technologies

How to Detect The 7 Types of Document and Identity Fraud
sponsored by Onfido
WHITE PAPER: Document and identity fraud have the potential to be one of the most disruptive risks facing organizations. However, addressing these challenges while meeting the user experience demands of customers is a tall order. Download this resource for a closer look into detecting and mitigating the most common types of fraud.
Posted: 23 Jul 2020 | Published: 23 Jul 2020

Onfido

Cloud Pak for Data Podcast Series
sponsored by IBM
WEBCAST: Join the podcast to hear the latest news on IBM’s leading data and AI platform, IBM Cloud Pak for Data. As IBM celebrates the platform’s 2 years in market, hear from their Chief Product Officer, Dinesh Nirmal, and their Forrester guest on the benefits of this unified data and AI platform and its partnership with Red Hat OpenShift.
Posted: 23 Jul 2020 | Premiered: Jul 23, 2020

IBM

Leading healthcare provider protects vital client assets with help from Thales
sponsored by Thales
CASE STUDY: This North America-based healthcare provider needed an encryption solution that could operate without disrupting their patient management system while simultaneously meeting all HIPAA standards. Tap into the case study to learn why the healthcare provider chose Vormetric Transparent Encryption from Thales.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Thales

Enterprise Data Protection Solutions, Explained
sponsored by Forcepoint
WHITE PAPER: Incomplete or sub-par data protection practices can have devastating impacts for an organization – and choosing the right data protection partner is no easy task. To help you get started, download this enterprise data protection buyer’s guide to key evaluation criteria, questions to consider, a comparison of top vendors, and more.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Forcepoint

The Definitive Guide to Data Protection
sponsored by Forcepoint
RESOURCE: It’s estimated that 90% of the world’s data was created in only two years. To compound this, the proliferation of mobile devices and remote employees means that data is stored and accessed in more places, by more people—at any time.To sum up, today’s data is equally as vulnerable as it is accessible. To learn how to protect it, read this guide.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Forcepoint

Frost & Sullivan Best Practices Award
sponsored by Onfido
WHITE PAPER: The Technology Leadership Award is given out each year by Frost & Sullivan after a 10-step analysis of key vendors within a certain field. For 2019, the winner was Onfido for their achievements in innovation and adherence to industry best practices. Read on for an analysis of Onfido’s offering and discover how they earned this recognition.
Posted: 22 Jul 2020 | Published: 22 Jul 2020

Onfido
1 - 25 of 2018 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info