IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 2075 Matches Previous Page  |  Next Page
Rise of the Machines: Transforming Cybersecurity Strategy for the Age of IoT
sponsored by Forescout
WHITE PAPER: Information technology (IT) & operational technology (OT) were, for a long time, regarded as two distinct areas within an organization. Now these two domains are interconnected, thanks to the Internet of Things (IoT) revolution.But what are these “things”, what do they have to say & are we listening? Read on to learn more.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Forescout

Modern Data Protection: Why Backup Alone Is Not Enough
sponsored by Comport Consulting
WEBCAST: This white paper introduces one method of unifying data protection across your on-prem and offsite environments: Disaster Recovery as a Service (DRaaS). Read on to view 10 tangible benefits of DRaaS and for guidance on properly protecting all your workloads.
Posted: 12 Nov 2019 | Premiered: Dec 31, 2017

Comport Consulting

Veeam Backup & Replication: A Comprehensive Overview
sponsored by Veeam Software
WHITE PAPER: This detailed document covers everything you need to know to protect your mission-critical environments with Veeam Backup & Replication and troubleshooting should an issue occur.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Veeam Software

How to Lock Down Git
sponsored by Perforce
WHITE PAPER: While Git allows for developers to collaborate, it can also contribute to loss of intellectual property & significant security issues. This white paper covers tactics designed to mitigate the risks of Git & discusses best practices for securing native Git. Download this report to get started.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

Perforce

Best practices for secure cloud migration
sponsored by Thales
WHITE PAPER: The Cloud Security Alliance (CSA) is an organization whose mission is to promote best practices & provide education for cloud security. Recently, the CSA released a guide that covered best practices, key considerations & use cases. Is your organization considering adoption of cloud services? Read on to enhance your understanding.
Posted: 11 Nov 2019 | Published: 30 Jun 2019

Thales

Protecting Data in The Cloud 2019 Thales Cloud Security Study
sponsored by Thales
WHITE PAPER: During 2019, research was conducted to better understand the trends in cloud security practices across organizations in order to uncover emerging trends, encryption practices, IAM features to consider & why some organizations fail to protect sensitive data.Download the executive summary to discover the key findings of the research.
Posted: 11 Nov 2019 | Published: 31 Oct 2019

Thales

Data Resiliency Moves to the Cloud
sponsored by Druva Software
WEBCAST: Watch this webinar to hear guest speaker from Forrester Research, Naveen Chhabra, and Druva CPO Mike Palmer discuss why businesses need data resiliency more than ever before, methodology and market research findings in the evaluation of data resiliency providers, and how Druva’s solutions align to the global shift in moving data to the cloud.
Posted: 11 Nov 2019 | Premiered: Nov 11, 2019

Druva Software

Escape Your Legacy Backup Provider
sponsored by Druva Software
WEBCAST: In this presentation, Druva’s Chief Product Officer, Mike Palmer, breaks down the backup renewals process, and will help you evaluate the pros and cons of legacy on-premises solutions versus SaaS-based data protection.
Posted: 11 Nov 2019 | Premiered: Nov 11, 2019

Druva Software

Traditional Disaster Recovery vs. Disaster Recovery as a Service
sponsored by Comport Consulting
RESOURCE: We’re sending you a checklist to help you evaluate and compare on-premises DR, cloud-based DR, and hybrid DR options, so you can make an informed decision and select the best option for your enterprise. Download it here to get started.
Posted: 11 Nov 2019 | Published: 11 Nov 2019

Comport Consulting

Common and Best Practices for SOCs: Results from the 2019 Survey
sponsored by Siemplify
WHITE PAPER: In the 2019 edition of the Security Operations Center (SOC) Survey, security leaders & professionals provided responses in order to better understand:Common barriers & best practicesWhere to focus to enhance security What to highlight when requesting additional SOC resourcesDownload the report to uncover the key results.
Posted: 08 Nov 2019 | Published: 08 Nov 2019

Siemplify

Aeris ConnectionLock: Restricting Device Communications to Select Destinations
sponsored by Aeris
PRODUCT OVERVIEW: Without any network restrictions in place, IoT devices can send data to or receive data from any unintended destination. This increases the risk of application data getting compromised. In this brief, learn about The Aeris Intelligent IoT Network which can help your organization restrict data delivery to only designated IP addresses or endpoints.
Posted: 08 Nov 2019 | Published: 31 May 2019

Aeris

2019 Cybersecurity Trends
sponsored by Cisco Umbrella
RESOURCE: In this research summary of 2019’s cybersecurity trends, discover the challenges, best practices, market trends & prominent threats as they relate to today’s increasingly distributed enterprises. Continue to this report to learn more.
Posted: 08 Nov 2019 | Published: 08 Nov 2019

Cisco Umbrella

Cyber Hygiene: Doing the Basics with Microsoft
sponsored by Snow Software
WEBCAST: Cybersecurity is an easily defined term but achieving a secure environment & security protocol takes diligent planning. So, what are the basics of cyber hygiene & what steps must my organization take towards cybersecurity?In this webinar, leverage industry expertise to uncover some of the fundamentals of cyber hygiene.
Posted: 07 Nov 2019 | Premiered: Nov 7, 2019

Snow Software

Access Management is Essential for Cloud Transformation
sponsored by Thales
RESOURCE: This infographic highlights some of the key takeaways from the 2019 Thales Access Management Index. Continue reading to uncover the key takeaways as they relate to top access management tools, the role of data breaches in access management adoption & other significant statistics.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Thales

IT Security Challenges for State and Local Government IT Departments
sponsored by Dell Technologies
RESOURCE: Today's overall increasing security risks have threatened the state and local government IT departments. This has impacted their functionality. In this infographic, learn about the many different security challenges government IT departments face.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Dell Technologies

Italy's Largest Service Provider Leverages Security to Address Cybercrime Threats
sponsored by Cisco Umbrella
CASE STUDY: As multiple studies revealed that Italy’s businesses grew increasingly vulnerable to data breaches & cyberattacks, Telecom Italia (TIM) was already working on a way to protect its 600,000+ customers from cybercrime. In this case study, discover how TIM was able to leverage security to meet this challenge.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Cisco Umbrella

The Changing Face of Data Security in Europe
sponsored by Thales
RESOURCE: Take a glimpse at the results from the 2019 Thales Data Threat Report – European Edition. This infographic shares some key statistics from the research findings, including the use of sensitive data, multi-cloud environments & the effects of GDPR and other data privacy laws.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Thales

The No-Nonsense Guide to Security Operations Metrics
sponsored by Siemplify
WHITE PAPER: Given that it’s difficult to define & measure success when it comes to cybersecurity, companies must carefully consider the appropriate KPIs to use when setting their security goals. In this guide, learn about how business, operational & improvement metrics can measure the efficacy of your cybersecurity operations program.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

Siemplify

The CISO’s Handbook for Certificate Management
sponsored by AppViewX
WHITE PAPER: Certificate-related outages usually stem from persistent cases of mismanagement. Even the simplest of errors have large impacts. However, most events can be circumvented by simply using a certificate management system. In this white paper, uncover 3 steps technology leaders can take to implement certificate management.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

AppViewX

Vormetric Data Security Platform Architecture
sponsored by Thales
WHITE PAPER: As enterprise security teams struggle to defend against more frequent & intricate attacks, data encryption has become a vital safeguard. When it comes to encryption, configuration is a constant trade-off between security & complexity. Read on for an overview of the advantages & limitations of different encryption approaches.
Posted: 06 Nov 2019 | Published: 31 Jul 2019

Thales

Certificate Lifecycle Management and Automation
sponsored by AppViewX
WHITE PAPER: Certificate management is a complex process. Without constant management, certificates are vulnerable to attacks, breaches, & system downtime. This white paper outlines why you should automate the certificate lifecycle, the consequences for not applying it & 5 steps to quickly implement automation in your organization.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

AppViewX

Elevating Enterprise Security with Fidelis Cybersecurity: Endpoint Security Capabilities
sponsored by Fidelis
ANALYST REPORT: When it comes to developing a security strategy, organizations should strive to view their entire environment as a single landscape. Critical to this is endpoint security, which enables organizations to monitor activity, track behavior & detect threats. In this paper, dive deeper into the advantages of endpoint security capabilities.
Posted: 05 Nov 2019 | Published: 30 Sep 2019

Fidelis

Learnings from The Frontlines: 4 Steps to Protect What Attackers Are Really After
sponsored by Cyber-Ark Software
WHITE PAPER: Forrester estimates that 80% of security breaches involve privileged credentials & it makes sense why: attackers are targeting those who have access to sensitive data & infrastructure. In this guide, discover how to think like an attacker in order to develop a security strategy to protect your critical assets.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Cyber-Ark Software

Just-In-Time (JIT) Privileged Access Management (PAM)
sponsored by BeyondTrust Corporation
WHITE PAPER: Always-on privileged access presents a massive risk surface to data breaches, & traditional security is limited in their detection against these threats. A strategy called just-in-time (JIT) privileged access can help by limiting the time an account has certain access. Read more about JIT & why you should include it in your policy.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

BeyondTrust Corporation

Executive Summary 2019 Thales Data Threat Report
sponsored by Thales
WHITE PAPER: European enterprises are moving quickly to adopt and deploy transformative technologies to increase their efficiency, while also introducing new risks. Technology changes & data privacy laws are forcing companies to rethink how they provide data security. View this report for top data concerns and threat mitigations in 2019.
Posted: 05 Nov 2019 | Published: 05 Nov 2019

Thales
1 - 25 of 2075 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement