IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Multimedia (View All Report Types)
1 - 25 of 212 Matches Previous Page  |  Next Page
Protecting Sensitive Corporate Data Against the Full Spectrum of Mobile Risk
sponsored by Lookout
WEBCAST: Download this webcast to discover a full EMM platform that will protect sensitive corporate data against the full spectrum of mobile risks, from software vulnerabilities to behavior and configuration threats.
Posted: 26 Jun 2017 | Premiered: Jun 6, 2017

Lookout

TIBCO Spotfire Server Overview
sponsored by TIBCO Software Inc.
VIDEO: With its role-based access permissions, TIBCO Spotfire incorporates data discovery, data wrangling, and predictive analytics into a cohesive platform. Learn how to leverage a variety of key resources and services that scale.
Posted: 16 Jun 2017 | Premiered: 21 Feb 2017

TIBCO Software Inc.

The Impact of IoT in the Manufacturing Sector
sponsored by Aruba Networks
VIDEO: Watch this brief video to learn how to connect IoT data from sensors on disparate devices to a single, common platform that allows manufacturers to bolster security, integrate siloed data and workflows, collaboratively share insights across teams, and more.
Posted: 06 Jun 2017 | Premiered: 27 Feb 2017

Aruba Networks

How IoT-Powered Smart Offices Boost Efficiency and Innovation
sponsored by Aruba Networks
VIDEO: Sound IoT strategies promise better productivity and innovation, and bad ones threaten security breaches and wasted investments. Learn how to improve your IoT/big data strategy and apply to data integration, data security, collaboration, and more.
Posted: 05 Jun 2017 | Premiered: 27 Feb 2017

Aruba Networks

GDPR: Finding Your Most Sensitive Data
sponsored by Informatica
WEBCAST: What is the General Data Protection Regulation (GDPR)'s relationship with your data? Join data experts Paul Garstang and Steve Holyer as they identify the challenges facing companies when it comes to the GDPR, how to get started with data discovery and classification, and how to use Secure@Source for data intelligence and security.
Posted: 02 Jun 2017 | Premiered: May 22, 2017

Informatica

Master the Internet of Things
sponsored by VMware
WEBCAST: The Internet of Things (IoT) is ready to change the world, but it has a list of challenges to tackle. Watch this video to learn how you can use a single management platform that enables you to make the most of your IoT investment and overcome those challenges.
Posted: 30 May 2017 | Premiered: Aug 30, 2016

VMware

What the new EU data protection rules mean for IT marketers
sponsored by ComputerWeekly.com
WEBCAST: The new EU data protection laws are top of the agenda for IT buyers this year – find out what opportunities this presents for IT marketers.
Posted: 30 May 2017 | Premiered: May 30, 2017

ComputerWeekly.com

Financial Services & GDPR: The Path to Compliance
sponsored by Informatica
WEBCAST: In financial services institutions, there are challenges to overcome when it comes to data: An overabundance of customer data, enterprise data governance isn't a widespread practice, and disparate technology to manage data. Learn how complying with the General Data Protection Regulation (GDPR) can help you overcome some of these challenges.
Posted: 25 May 2017 | Premiered: May 23, 2017

Informatica

The Essential Guide to Machine Data
sponsored by Splunk
VIDEO: This brief webcast explores the concept of machine data and how it works. Find out how to unify access to and correlate data between IT, app development, and security to monitor and prevent critical data breaches.
Posted: 23 May 2017 | Premiered: 06 Mar 2017

Splunk

GDPR: Understanding Your Data
sponsored by Informatica
WEBCAST: As you prepare to comply with the General Data Protection Regulation (GDPR), you must have a full understanding of the challenges you'll face in order to overcome them smoothly. Join Patrick Dewald and Guiseppe Mura of Informatica to learn how to prepare your company for the GDPR.
Posted: 23 May 2017 | Premiered: May 22, 2017

Informatica

Manage, Monitor & Secure Your IoT Deployment
sponsored by VMware
WEBCAST: The Internet of Things (IoT) is the cause of the next industrial revolution. To take advantage, your IT and OT teams need total control over their IoT use cases. Take 2 minutes to watch this webcast and learn how to manage, monitor, and secure the entirety of your IoT on-premise or in the cloud.
Posted: 12 May 2017 | Premiered: May 5, 2017

VMware

Hybrid Cloud for the Smart Company: Migrating from On-Prem to Cloud
sponsored by Moogsoft
WEBCAST: Cloud isn't just a computing platform, but an entirely new way of doing business. Why are so many organizations pushing a cloud migration if it means changing how they operate? Watch this brief webcast to learn how enterprises are managing their cloud migration.
Posted: 18 Apr 2017 | Premiered: Apr 4, 2017

Moogsoft

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PODCAST: Tune into this podcast to hear from health IT industry leaders as they discuss how application virtualization is reshaping care delivery and improving IT security.
Posted: 01 Dec 2016 | Premiered: Nov 17, 2016

Citrix and Pure Storage

Resume Business Faster with Engineered Oracle Database Recovery
sponsored by Oracle Corporation
VIDEO: This brief video examines the only backup and recovery system co-engineered with Oracle databases and Oracle cloud. Access now to discover a zero data loss recovery appliance that will minimize the time it takes to recover your databases fully with cloud-connected automated backups that eliminate silos and vastly improve user experiences.
Posted: 08 Nov 2016 | Premiered: 26 Oct 2016

Oracle Corporation

Software-Defined Storage Suite Transforms Data Capabilities
sponsored by IBM
VIDEO: In today's rapidly changing business environment, data management is becoming a serious challenge for many companies. This video discusses one Software-Defined Storage suite designed to change the economics of storage. Watch now to learn about this suite and how it can store data at optimal cost, helping to maximize performance and ensure security.
Posted: 21 Oct 2016 | Premiered: 22 Dec 2015

IBM

Transition to a More Flexible Infrastructure with Software-Defined Storage
sponsored by IBM
VIDEO: Discover a software-defined storage solution with tools that can help your organization deploy storage faster for growing data. This storage suite can simplify and support the growth of your business, allowing you to stay ahead your competitors.
Posted: 20 Sep 2016 | Premiered: 28 Jan 2016

IBM

Lightning-Fast Virtual System Recovery
sponsored by arcserve
WEBCAST: Discover a unified data protection solution with instant, efficient virtual machine recovery and migration capabilities and watch a demonstration on how this solution works. Explore how this virtual system backup can provide your enterprise with improvements in RPO, RTO, database performance, and more.
Posted: 12 Jul 2016 | Premiered: May 20, 2016

arcserve

Understanding the Impact of Flash Storage in Healthcare Environments
sponsored by Pure Storage
WEBCAST: Storage experts discuss how to increase provider productivity and enable more patient visits with fast, reliable, flash storage. Discover how flash storage can provide your healthcare organization with the performance and storage flexibility you need to provide secure access to your data anywhere, at any time.
Posted: 20 May 2016 | Premiered: May 20, 2016

Pure Storage

The Essential Guide to Storage for DevOps
sponsored by Tintri
WEBCAST: When it comes to DevOps, you might be overlooking the significance of cloud storage. Access this e-book to learn about the significant impact the right--or wrong--cloud storage in place will have on your DevOps' development.
Posted: 27 Mar 2017 | Premiered: Dec 30, 2016

Tintri

UBM Dark Reading & VMware AirWatch® Webinar
sponsored by vmware airwatch
WEBCAST: In this session, we'll cover how VMware Workspace™ ONE™ can help drastically simplify the deployment of Office 365 and provide the security controls to protect your sensitive information that is stored in corporate email, OneDrive, and SharePoint.
Posted: 03 Mar 2017 | Premiered: Mar 3, 2017

vmware airwatch

ECM and Collaboration: Transforming Work in the Cloud
sponsored by IBM
WEBCAST: This webcast explores how to enable sound content management, even in an era of growing reliance on cloud and mobile computing. Discover how to implement a content strategy that unlocks benefits like simplified end-user experiences, accelerated collaboration, cloud-capable ECM, secure file sync and share across all devices, and more.
Posted: 03 Feb 2017 | Premiered: Feb 3, 2017

IBM

Demo: Next-Gen Antivirus in Action
sponsored by Carbon Black
WEBCAST: Learn how next-generation antivirus protection works in this quick demonstration. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks from owning your database and holding your data hostage.
Posted: 05 Dec 2016 | Premiered: Nov 30, 2016

Carbon Black

Webcast - Enhancing Enterprise Security in 2016 – Part 2
sponsored by Intel
WEBCAST: Discover how sharing threat intel can pay huge dividends in shifting the balance of power away from the bad guys and allow your organization to operate normally. Learn what exactly threat intel encapsulates and how you can utilize it to improve your organization's cyber defenses.
Posted: 15 Aug 2016 | Premiered: Mar 31, 2016

Intel

Security Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.
Posted: 13 Jun 2016 | Premiered: May 1, 2016

Intel Security

Next Generation Cybersecurity: The Age of Artificial Intelligence
sponsored by MASERGY
WEBCAST: Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.
Posted: 06 Jun 2016 | Premiered: May 1, 2016

MASERGY
1 - 25 of 212 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement