Data Security Resources

Data Security news and support resources, featuring the hottest solutions, technologies and vendors in the Data Security world. Use the powerful checkbox-driven menu to fine-tune the results to exactly what you are looking for in seconds!

  1. Home
  2. Tag "Data Security"

Building a better help desk: Part 2, secure permission management

ManageEngine
Welcome to the next installment of our Building a better help desk blog series. This time we will be discussing how to improve your permission management. Data security is of utmost importance in every organization. Since security breaches can have a crippling effect on the operation as well as credibility of organizations, enterprises need to pay great […]

The Denver Broncos Add Availability to Their Playbook with Veeam

Veeam
One of the Most Successful Teams in NFL History Relies on Veeam Availability Suite to Ensure Data is Accessible 24.7.365 for Making Decisions Quickly On and Off the Field Veeam Software, the Availability for the Always-On Enterprise™ innovator, today announced that the Denver Broncos, one of the NFL’s most successful teams, has replaced its legacy backup system […]

Revolutionizing Backup & Recovery Using Amazon S3 – AWS Online Tech Talks Video

Amazon Web Services
Backup to the cloud is one of the easiest-to-implement use cases for cloud storage. Amazon S3 provides a robust feature set that make it much easier for you to eliminate tape backup, reduce storage costs, and meet all of your compliance needs. In this webinar, we’ll talk about different ways to get your backup data […]

Citrix ShareFile Drive Mapper Helps Solves Data Sprawl

Citrix Systems
Let’s face it. “Data Sprawl” is a new reality and a significant challenge for today’s IT infrastructure. As digital natives enter the workforce, they add tablets, smart phones, and virtual desktops to meet their productivity needs. Current enterprise mobility trends highlight the evolving nature of work and emphasize the need for organizations to both empower and manage employee […]

Microsoft Introduces Azure Confidential Computing

Microsoft
Microsoft spends one billion dollars per year on cybersecurity and much of that goes to making Microsoft Azure the most trusted cloud platform. From strict physical datacenter security, ensuring data privacy, encrypting data at rest and in transit, novel uses of machine learning for threat detection, and the use of stringent operational software development lifecycle […]

VMware: Prevent and mitigate ransomware attacks: 7 best practices

VMware
Ransomware attacks have increased to such an extent that they have now become one of the leading threats to the financial stability, reputation, and data security of an organization. The threat has grown to such a level that FBI warnings have already been issued to the public. The problem is, attackers have become more tech-savvy […]

VMware: GDPR and Addressing Data Security Gaps with VMware

VMware
What an exciting opening keynote here at VMworld® in Barcelona! You’ve just heard Pat Gelsinger talk about the EU General Data Protection Regulation (GDPR). The GDPR legally mandates that organizations protect personal data and extends its reach beyond those established in the EU to others beyond its borders. The regulation also requires that companies respect an […]

VMware Expands Its Mobile Security Alliance to Provide a Connected, Comprehensive Approach to Securing the Digital Workspace

VMware
VMware, Inc. (NYSE: VMW) VMware Mobile Security Alliance Connects Traditionally-Siloed Solutions Across Endpoint Security, Application Security, Cloud Security, Network Security, Authentication, and Analytics Deeply-Integrated Ecosystem of Trusted Security Vendors Grows with Six New Members Joining the Mobile Security Alliance Today at VMworld® 2017 Europe, VMware, Inc. (NYSE: VMW) announced an expansion of its Mobile Security Alliance (MSA) — a broad ecosystem of security vendors, […]

Cortado: Apple and Android Device Enrollment From the Cloud

Cortado
Cortado Cloud enables companies of all sizes, and in all verticals, to easily integrate mobile devices into their workplaces The enterprise mobility expert, Cortado Mobile Solutions, today launched Cortado Cloud, a new MDM/MAM solution for quick and easy mobile device and application management. Cortado Cloud enables companies to set-up and commission iOS and Android mobile devices in […]

ComputerWorld partner with Netwrix

ComputerWorld Group
With requirements to combat Ransomware and Malicious Insiders increasing and the need to meet the ever growing list of compliance needs becoming more critical than ever before, Computerworld are pleased to announce our Partnership with Netwrix. Netwrix are a leading provider of change auditing software for security, compliance and operations across the entire IT infrastructure and […]

Red Hat Enhances Cloud-Native Security, Application Consistency with Latest Version of Red Hat OpenShift Container Platform

Red Hat
Enterprise Kubernetes platform adds new container security and compliance features, extends consistent applications and services across multi-cloud deployments Red Hat, Inc. (NYSE: RHT), the world’s leading provider of open source solutions, today announced the general availability of Red Hat OpenShift Container Platform 3.6, the latest version of Red Hat’s enterprise-grade Kubernetes container application platform. Organizations […]

Cisco: Leading Blockchain from Exciting Experiment to Widespread Adoption

Cisco
Like the Internet and the Internet of Things (IoT), blockchain transformation will be a multi-year journey. We’re now at the beginning of that journey—an exciting time, when innovators from across industries are experimenting with new ways to harness blockchain technology in applications that range from enabling real estate transactions to securing energy grids and autonomous […]

VMware: On-Site Protection: 3 Data Security DRaaS Benefits

VMware
In 2013, 1 billion stolen data records were exposed online. Three years later, that figure would reach more than 4.2 billion. The findings, issued by Risk Based SecurityData Breach QuickView Report, also highlighted another remarkable statistic: that the business sector makes up for nearly 81 percent of all confidential data exposed online. This statistic is […]

Cisco: Leading Blockchain from Exciting Experiment to Widespread Adoption

Cisco
Like the Internet and the Internet of Things (IoT), blockchain transformation will be a multi-year journey. We’re now at the beginning of that journey—an exciting time, when innovators from across industries are experimenting with new ways to harness blockchain technology in applications that range from enabling real estate transactions to securing energy grids and autonomous […]

Visit Our Sponsors