IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 2027 Matches Previous Page  |  Next Page
Zerto IT Resilience Platform: Converged Disaster Recovery & Backup
sponsored by Zerto
DATA SHEET: This datasheet introduces Zerto's IT Resilience Platform, which converges disaster recovery, backup, continuous data protection (CDP), and mobility capabilities to protect all enterprise workloads wherever they reside. Download now to see all its benefits, to view 6 key capabilities, and to learn how it works.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Zerto

Future of Backup: From Periodic to Continuous
sponsored by Zerto
WHITE PAPER: Download this white paper to examine the benefits of continuous backup as compared to periodic backup, and to view an IT Resilience platform that can help your organization defeat the shortcomings of traditional tools by utilizing the Elastic Journal.
Posted: 16 Sep 2019 | Published: 31 Mar 2019

Zerto

Tech Powering your CX Might be Dragging Revenue
sponsored by The Media Trust
RESOURCE: Unknown third-party code outside of your control can introduce new risks or heighten existing ones. Read on to learn about digital risk scans and how you can reduce digital revenue threats like customer information theft, data leakage, site latency, and more.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

The Media Trust

A Guide for Customer Identity and Access Management (CIAM)
sponsored by Akamai Technologies
WHITE PAPER: When implementing the concepts, processes, and technologies needed to collect, manage, and utilize digital identity and customer data, companies have 2 basic choices: build or buy. In this white paper, explore the pros and cons of in-house software development versus commercial off-the-shelf solutions.
Posted: 13 Sep 2019 | Published: 31 May 2019

Akamai Technologies

TPCRM 101: A Guide for Beginners
sponsored by CyberGRX
WHITE PAPER: As organizations increasingly rely on third parties, their ecosystems become more vulnerable to third-party cyber risk. Implementing an effective third-party cyber risk management (TPCRM) program is essential to securing your organization's cyber ecosystem. In this white paper, learn everything you need to know about a TPCRM program.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

CyberGRX

Cloud Data Protection for VMware Cloud on AWS
sponsored by Druva Software
WEBCAST: Join this webinar to hear a trio of experts as they walk through how you can leverage Druva and VMware Cloud on AWS to seamlessly move and protect apps without rework, simplify data center migration into AWS, achieve robust backup and DR for hybrid environments, and more.
Posted: 12 Sep 2019 | Premiered: Aug 8, 2019

Druva Software

Hype Cycle for Privacy, 2019
sponsored by TITUS
ANALYST REPORT: Privacy as a fundamental human right has in the recent year been operationalized in sweeping regulatory changes across the world. In this Gartner Hype Cycle, explore international regulatory developments and technologies that help protect personal data.
Posted: 11 Sep 2019 | Published: 11 Jul 2019

TITUS

Striking the Right Balance Between Tape and Cloud
sponsored by Iron Mountain
WHITE PAPER: The following white paper will walk you through how to strike the right balance between tape media and cloud for your organization, as well as how to unite the two with a holistic data management strategy. Download now to access this critical insight.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Iron Mountain

A 4-Tier Approach to Modern Data Protection
sponsored by Veeam Software
WHITE PAPER: This white paper presents an alternative, 4-tier data protection approach that streamlines storage and security in multi-tier storage environments. Read on to view this solution and to see how it may ultimately benefit your company.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Veeam Software

BackupCare Backup Assistance Solution Overview
sponsored by Iron Mountain
DATA SHEET: Sending someone from your IT staff to a remote data center to eject and reinsert a single set of backup tapes likely isn't the best use of your staff's time and expertise. But with Iron Mountain's BackupCare, their experts mount new tapes to handle your next backup—all done at your remote site or colocation facility. Click here to learn more.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Iron Mountain

Offsite Media Vaulting: Secure, Off-site Backup and Recovery
sponsored by Iron Mountain
DATA SHEET: Download this datasheet to gain the peace of mind that your data is properly protected and immediately recoverable using Iron Mountain's Offsite Media Vaulting service.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Iron Mountain

The Titus Times: The CEO & CTO
sponsored by TITUS
RESOURCE: In this e-magazine, learn about the roles of the CEO and the CTO and delve into how their concerns around data protection overlap – as well as where they diverge. Also, learn how to overcome discrepancies to build a strong data protection strategy.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

TITUS

State of the Web Report 2019
sponsored by Tala Security
ANALYST REPORT: The website is a primary connection point between companies and their customers. Unfortunately, their architecture introduces critical vulnerabilities that enable client-side website attacks. In this research report, discover the risks associated with web and web app security and learn how to better protect your organization against attacks.
Posted: 11 Sep 2019 | Published: 11 Sep 2019

Tala Security

Use HPE SimpliVity 380 to Protect your Organization from Ransomware Attacks
sponsored by NTT
RESOURCE: Read this blog post to check out one option that can quickly recover from ransomware attacks with its built-in data protection functionality: HPE SimpliVity 380.
Posted: 11 Sep 2019 | Published: 18 Apr 2019

NTT

The Biggest Backup Mistakes Made with Office 365
sponsored by Druva Software
WEBCAST: Many enterprises assume that cloud apps like O365 protect your data, but with limited built-in data recovery capabilities, O365 is commonly overlooked. Join this webinar session, presented by W. Curtis Preston, Chief Technologist at Druva, to learn how to avoid any Office 365 data protection missteps.
Posted: 11 Sep 2019 | Premiered: Sep 11, 2019

Druva Software

Active Archive and the State of the Industry
sponsored by Iron Mountain
WHITE PAPER: This report describes the state of the archiving market and introduces an active archiving approach with an intelligent data management layer that streamlines eDiscovery, data retrieval, and analysis. Download now to view 11 benefits of this approach and to key into important market trends.
Posted: 10 Sep 2019 | Published: 31 Jul 2019

Iron Mountain

2019 Financial Consumer Cybersecurity Threat Index
sponsored by Morphisec, Inc.
ANALYST REPORT: As Morphisec continues to assist financial providers with improving defenses and protecting consumer financial data and funds, they decided to examine how the increasing amount of financial cyberattacks are impacting the mindset of consumers. Download Morphisec's 2019 U.S. Consumer Financial Cybersecurity Threat Index to see what they found.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Morphisec, Inc.

True Data Protection with HPE SimpliVity
sponsored by NTT
RESOURCE: Read the following blog post to discover 6 ways in which HPE SimpliVity hyper-converged infrastructure can bolster data protection in enterprises today—giving folks the flexibility to tune RTOs and enable high-frequency backup and replication across multiple sites.
Posted: 10 Sep 2019 | Published: 28 Apr 2018

NTT

Configuration Guide for NetApp and Veeam Backup & Replication 9.5
sponsored by Veeam Software
WHITE PAPER: Customizing your deployment of Veeam Backup & Replication 9.5 and NetApp ONTAP to suit your environment can result in better overall performance and lower overhead. Download this comprehensive, 43-page configuration guide now to get started.
Posted: 10 Sep 2019 | Published: 31 Dec 2017

Veeam Software

Protecting Point-of-Sale Systems
sponsored by Morphisec, Inc.
PRODUCT OVERVIEW: With their highly valuable payment card and personal sensitive information, Point-of-Sale systems present a ripe target for cybercrime. Modern POS environments are complicated systems with multiple entry points for attack. In this brief, learn about the anatomy of a POS attack and what organizations can do to prevent against these attacks.
Posted: 09 Sep 2019 | Published: 09 Sep 2019

Morphisec, Inc.

Save Time and Money with Druva and AWS All-In-One Solution
sponsored by Druva Software
EBOOK: Download this e-book to learn how Druva and AWS's unified approach delivers all-in-one data protection, governance, and intelligence across endpoints, data centers, and cloud workloads.
Posted: 09 Sep 2019 | Published: 31 Aug 2019

Druva Software

Customers Save Time and Up to 50% in Backup Costs with Druva on AWS
sponsored by Druva Software
WEBCAST: Tune into this webinar to discover the benefits of deploying Druva on AWS and gain the ability to improve data protection, streamline management, and effortlessly scale backups.
Posted: 09 Sep 2019 | Premiered: Sep 9, 2019

Druva Software

You Need to See It to Protect It: How Real-Time Visibility and IT Hygiene Drive AWS EC2 Security
sponsored by Amazon Web Services
WHITE PAPER: Organizations are increasingly connecting mission-critical apps and data to AWS and taking advantage of its scalable Elastic Compute Cloud (EC2). But, managing and securing your own EC2 environment can become a challenge. In this white paper, learn how real-time visibility and good IT hygiene can drive AWS EC2 security.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Amazon Web Services

End-of-Life Data Security Gap Analysis
sponsored by Iron Mountain
DATA SHEET: Staying up-to-date with new and evolving data security regulations, while also keeping growing amounts of data secure, is a major challenge for most industries. Download this checklist to help you assess and improve your end-of-life data management strategy and execution.
Posted: 06 Sep 2019 | Published: 06 Sep 2019

Iron Mountain

Using Hyperconverged Infrastructure to Improve Data Protection and Recovery
sponsored by Hewlett Packard Enterprise
ANALYST REPORT: Organizations looking to unbind themselves from the limitations of client/server era technologies should read this IDC white paper. It documents 4 critical considerations for evolving your VM backup strategies and explains how hyper-converged infrastructure (HCI) can improve and simplify data protection and disaster resiliency.
Posted: 06 Sep 2019 | Published: 30 Apr 2019

Hewlett Packard Enterprise
1 - 25 of 2027 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement