IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed   
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 

Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary
Data Security Reports
1 - 25 of 1903 Matches Previous Page  |  Next Page
Neustar SiteProtect Customer Success Stories
sponsored by Neustar
CASE STUDY: DDoS attacks represent a consistent and persistent threat to the digital operations and security of organizations everywhere. The attacks can be used to severely degrade network performance to the point of inoperability. In this case study, learn why organizations are turning to Neustar SiteProtect to keep their infrastructures secure.
Posted: 15 Feb 2019 | Published: 08 Feb 2018

TOPICS: 
Neustar

Consumption-based Data Management Providing Peace of Mind
sponsored by Veeam Software
WEBCAST: This webcast introduces you to consumption-based data management, a model that eliminates the need for overprovisioning while assuring supply as business needs grow. Tune in to learn how it differs from the cloud and 3 advantages of this strategy.
Posted: 15 Feb 2019 | Premiered: Jan 22, 2019

TOPICS: 
Veeam Software

Data Secrets Revealed - A Collection of Customer Stories
sponsored by Splunk Services UK Ltd
CASE STUDY: Download this e-book to explore how companies like Zillow, Domino's and Yelp are driving new, powerful and unique business insights.
Posted: 14 Feb 2019 | Published: 14 Feb 2019

TOPICS: 
Splunk Services UK Ltd

The Rise of the Intelligent AI-Powered Business
sponsored by Box
WHITE PAPER: Gartner has predicted an 800% growth in data volume in the next 5 years, 80% of which will be unstructured. Download this white paper to learn how companies can leverage machine learning and AI to get to grips with their content and do more with their data.
Posted: 14 Feb 2019 | Published: 14 Feb 2019

TOPICS: 
Box

Are You Protected from Downtime and Data Loss?
sponsored by Veeam Software
PRODUCT OVERVIEW: Download this brief for the details on HPE Nimble Storage and Veeam's flash-based, predictive backup solution. For hassle-free data availability and flash-accelerated data protection, keep reading.
Posted: 14 Feb 2019 | Published: 31 Dec 2018

TOPICS: 
Veeam Software

How to Detect the 7 Types of Document and Identity Fraud
sponsored by Onfido
WHITE PAPER: Forgeries. Imposters. Counterfeit documents. You can't afford to let fake identities slip through the cracks and put your company—and your customers—at risk. Learn how to detect the 7 most common types of ID fraud, and how advanced identity verification technology can turn things around.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Onfido

Aflac Adopts Splunk Platform for Analytics-Driven Security
sponsored by Splunk Services UK Ltd
CASE STUDY: Aflac is the leading provider of voluntary insurance in the U.S. Facing an increase in the volume and velocity of security threats, Aflac needed a new analytics-driven security approach. In this case study, learn about the benefits Aflac has seen since deploying Splunk Enterprise Security and Splunk User Behavior Analytics.
Posted: 13 Feb 2019 | Published: 13 Feb 2019

TOPICS: 
Splunk Services UK Ltd

Backup and Disaster Recovery for AWS Workloads
sponsored by Veeam Software
WEBCAST: Watch this session to learn the essentials of protecting critical data and workloads in AWS, including discussions on the native AWS data backup options, low-cost alternatives for protecting data in AWS, and compliance and ransomware concerns.
Posted: 13 Feb 2019 | Premiered: Jun 21, 2018

TOPICS: 
Veeam Software

What it Takes to be GDPR Compliant
sponsored by ServiceNow
WHITE PAPER: On May 25, 2018, GDPR compliance became mandatory. So, what impact does this regulation have on your business? How does it change the way you collect and store – and even define – personal data? In this e-book, ServiceNow offers insights they've gathered from working with their customers on GDPR compliance.
Posted: 13 Feb 2019 | Published: 30 Sep 2018

TOPICS: 
ServiceNow

Veeam Builds Your Availability All the Way to the Cloud
sponsored by Veeam Software
VIDEO: Alex Fraser and Nick Furnell from Veeam Software provide guidance on leveraging the public cloud as part of your organization's overall backup, recovery, and availability strategy. Tune in as they walk you through a demonstration of the benefits of Veeam Cloud Connect.
Posted: 13 Feb 2019 | Premiered: 23 May 2018

TOPICS: 
Veeam Software

The EHR Imperative: Eliminating Outages and Combatting Cyberattacks to Improve Patient Care
sponsored by ServiceNow
WHITE PAPER: Download this white paper to learn how healthcare organizations can better pinpoint and remediate service outages as well as security incidents and vulnerabilities impacting components of their IT infrastructure, while ensuring compliance with strict regulations for health data security and privacy.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
ServiceNow

True 15-Minute RTO for Mission-Critical VMs Using Vembu BDR Suite
sponsored by Vembu Technologies
WHITE PAPER: Vembu's Backup and Disaster Recovery (BDR) solution adds critical optimizations to both restore and replication operations that dramatically minimize overhead on ESXi hosts and production VMs to just VM snapshot processing. Read more about it here.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
Vembu Technologies

Seamless Security Integration During a Merger or Acquisition Process
sponsored by Dell SecureWorks
WHITE PAPER: In addition to the challenges of brokering and completing a merger or acquisition, the logistics of integrating two or more businesses and closing potential risk gaps can be staggering. In this white paper, learn how a cybersecurity firm can deliver crucial expertise to facilitate a seamless integration of each company's cybersecurity program.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
Dell SecureWorks

Overcome the Data Protection Dilemma with Vembu
sponsored by Vembu Technologies
PRODUCT OVERVIEW: This paper presents a one-stop solution for your virtual environments' backup and DR needs, one feature of which is agentless VM backup. Read on to protect your virtual environments without leaving legacy apps out in the cold.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
Vembu Technologies

Data Capital Powers Digital Transformation
sponsored by Dell EMC and Intel®
RESOURCE: 73% of those surveyed in a study conducted by Vanson Bourne agree that formulating a centralized data management and protection strategy needs to be a priority for their business. Click here to learn about a storage portfolio that will help you do so, too.
Posted: 12 Feb 2019 | Published: 12 Feb 2019

TOPICS: 
Dell EMC and Intel®

How Google Backs Up the Internet
sponsored by Fujifilm Recording Media USA, Inc.
VIDEO: Tune into this instructive video as Raymond Blum, Staff Site Reliability Engineer at Google, reveals Google's hybrid tape backup strategy. You'll find out how Google literally backs up the internet.
Posted: 12 Feb 2019 | Premiered: 12 Feb 2019

TOPICS: 
Fujifilm Recording Media USA, Inc.

IBM Spectrum Scale Datasheet
sponsored by Arrow and IBM
DATA SHEET: This datasheet highlights an analytics-driven software-defined storage solution that provides the scalable capacity and performance needed to handle big and unstructured data workloads. View it here to learn how to streamline your data workloads with this solution.
Posted: 12 Feb 2019 | Published: 31 Dec 2017

TOPICS: 
Arrow and IBM

Threat Landscape Assessment with David Balcar
sponsored by Fujifilm Recording Media USA, Inc.
VIDEO: Security Strategist David Balcar assesses the current threat landscape as it relates to corrupted backups, malware attacks, and security breaches. Tune in for Balcar's top 10 guiding principles on protecting data with proper backups and preparing for outside and insider threats.
Posted: 12 Feb 2019 | Premiered: 12 Feb 2019

TOPICS: 
Fujifilm Recording Media USA, Inc.

The 2019 Intelligent Information Management Benchmark Report
sponsored by M-Files
RESEARCH CONTENT: Download this white paper to explore the heart of document management, including statistics on how organizations in 9 countries are managing company information and how they are facing the challenges presented by their ever-increasing store of data.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
M-Files

Why Microsoft Azure is Choosing Tape
sponsored by Fujifilm Recording Media USA, Inc.
VIDEO: Taken from Fujifilm's Global IT Executive Summit, in this clip Marvin McNett, Principal Developer Manager at Microsoft, details 5 concrete advantages of tape technology and why organizations will continue to use it in their data centers.
Posted: 11 Feb 2019 | Premiered: 11 Feb 2019

TOPICS: 
Fujifilm Recording Media USA, Inc.

How VembuHIVE Is Changing the Dynamics of Data Protection
sponsored by Vembu Technologies
WHITE PAPER: In this analysis, openBench Labs assesses the performance and functionality of the Vembu Backup & Disaster Recovery (BDR) data protection solution. Continue reading for 5 featured benefits and detailed analyses on RTO and RPO success factors, lowering snapshot overhead, and more.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
Vembu Technologies

Evolving Your Security Architecture to Meet Current and Future Needs
sponsored by Dell SecureWorks
WHITE PAPER: The security of an organization is dependent on the quality of its enterprise information security architecture. A security architecture should be designed for the specific organization it's going to protect. In this white paper, learn how to define your security needs and reassess your security architecture as new threats develop.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
Dell SecureWorks

Complying with the General Data Protection Regulation (GDPR)
sponsored by ServiceNow
WHITE PAPER: One of GDPR's major goals is the protection of an individual's personal data and the definition of the rules for the free movement of personal data in the EU. In order to protect personal data, businesses must understand how they use data. In this white paper, learn about how to strengthen your data protection services to comply with GDPR.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
ServiceNow

IBM Spectrum Protect Plus Overview
sponsored by Arrow and IBM
DATA SHEET: This datasheet highlights the features and benefits of IBM Spectrum Protect Plus for virtual environments, a backup solution that unlocks the value of your data to facilitate data reuse and accelerate DevOps. View it here.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
Arrow and IBM

Understanding Security Ratings
sponsored by Security Scorecard
WHITE PAPER: Security ratings grade your organization on how well it protects information. In a digital world, the importance of data and your company's protection of that data parallels your income and protection of financial assets. In this white paper, learn all things security ratings including what they are and why they are useful.
Posted: 11 Feb 2019 | Published: 11 Feb 2019

TOPICS: 
Security Scorecard
1 - 25 of 1903 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement