IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Multimedia (View All Report Types)
1 - 25 of 235 Matches Previous Page  |  Next Page
An MSP Guide to Selling IT Security
sponsored by LogicNow
WEBCAST: Discover a roadmap to enhance your MSP offering with security services, a detailed methodology in taking a layered security approach, and 5 tips for selling IT security. Access now to unveil how to expand upon your existing toolkit and evolve your MSP to an MSSP.
Posted: 07 Dec 2016 | Premiered: Dec 7, 2016

LogicNow

Case Study: The Yield Transforms Australian Agriculture with IoT
sponsored by Microsoft
VIDEO: Tune into this case study as The Yield demonstrates how they transform agriculture decision-making by delivering the data they garner with IoT strategies to industry regulators for fast and informed decisions. Discover how to leverage IoT in the field to turn usable information into real-time actionable insight.
Posted: 05 Dec 2016 | Premiered: 15 Nov 2016

Microsoft

A Powerful Next-Gen Antivirus Solution
sponsored by Carbon Black
WEBCAST: Traditional AV simply doesn't cut it anymore. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks, from owning your database and holding your data hostage. Empower your security team to stop the most attacks, see more threats and close more security gaps.
Posted: 05 Dec 2016 | Premiered: Nov 30, 2016

Carbon Black

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PODCAST: Today's healthcare organizations are struggling to meet the demands of reform while maintaining security and privacy for patients. Tune into this podcast as leaders from the nation's leading health systems discuss why application virtualization is reshaping care delivery and improving security.
Posted: 01 Dec 2016 | Premiered: Nov 17, 2016

Citrix and Pure Storage

When "Free" is not Free: The True Costs of Open Source
sponsored by Rogue Wave Software
WEBCAST: In this webinar, director of product management and OSS expert, Richard Sherrard examines how to know exactly what packages are used in your company, specific technical, security, and licensing hurdles that many organizations face and What "free" actually means when it comes to OSS.
Posted: 28 Nov 2016 | Premiered: Oct 31, 2016

Rogue Wave Software

Solving the DLP Puzzle: Learnings for a Successful Deployment
sponsored by Intel Security
PODCAST: What's steps do you take to implement a mature DLP solution? What are some of the best practices for long term DLP success? And how are data breaches evolving? In this podcast, a security industry veteran answers these questions and more so you can solve the DLP puzzle. Ensure successful DLP deployment now.
Posted: 22 Nov 2016 | Premiered: Sep 8, 2016

Intel Security

Building a Next-Gen Storage Infrastructure for SaaS Applications
sponsored by NetApp
PODCAST: In this podcast, you will discover how to build a next-gen storage infrastructure for SaaS implementations, with a node-based architecture that can scale without impacting production workloads and the development cycle.Also, learn how integrated RAID-based data protection can eliminate workload disruption.
Posted: 17 Nov 2016 | Premiered: Nov 17, 2016

NetApp

Building a Next-Gen Storage Infrastructure for SaaS Applications
sponsored by NetApp
WEBCAST: Tune into this webcast to discover how to build a next-gen storage infrastructure for SaaS implementations, with a node-based architecture that can scale without impacting production workloads and the development cycle.Also, learn how integrated RAID-based data protection can eliminate workload disruption.
Posted: 17 Nov 2016 | Premiered: Nov 17, 2016

NetApp

Demo video: How QRadar Works - IBM Security Intelligence and Analytics Whiteboard
sponsored by IBM
WEBCAST: This video shows you how to get greater network visibility and risk management out of your security solution. Discover how to instantly sense and detect a breach as it happens in real-time.
Posted: 16 Nov 2016 | Premiered: Feb 3, 2016

IBM

Preventing internal Cybersecurity Breaches
sponsored by Navex Global
WEBCAST: Get insight from security experts on the various types of cybersecurity threats created by a lack of employee awareness. Learn how to develop an effective cybersecurity training program to prevent and solve potential insider issues.
Posted: 10 Nov 2016 | Premiered: Oct 31, 2016

Navex Global

6 Ways to Put 'Secure" Back in Secure Web Gateways
sponsored by Trustwave
WEBCAST: Recent research shows 33% of malware used encryption, underscoring the importance of having an advanced secure web gateway with the capability to inspect encrypted content. Discover practical steps your organization can take to optimize protection and policy control for your web users.
Posted: 09 Nov 2016 | Premiered: Oct 31, 2016

Trustwave

Resume Business Faster with Engineered Oracle Database Recovery
sponsored by Oracle Corporation UK Ltd
VIDEO: This brief video examines the only backup and recovery system co-engineered with Oracle databases and Oracle cloud. Access now to discover a zero data loss recovery appliance that will minimize the time it takes to recover your databases fully with cloud-connected automated backups that eliminate silos and vastly improve user experiences.
Posted: 08 Nov 2016 | Premiered: 26 Oct 2016

Oracle Corporation UK Ltd

Outthinking Cybercrime: Prepare for the Human Factor
sponsored by Trustwave
WEBCAST: Learn some of the key risks associated with defending modern IT infrastructures and see real-world scenarios where human influence is the weak link in security.
Posted: 08 Nov 2016 | Premiered: Oct 6, 2016

Trustwave

Modern Cybercrime: Staying Ahead of The Perfect Storm
sponsored by Trustwave
WEBCAST: Discover how to get ahead of today's cyber threats using simple steps and key strategies. The more you know the better equipped you are to detect and prevent cybercrime - and ultimately protect your business.
Posted: 07 Nov 2016 | Premiered: Jul 20, 2016

Trustwave

Next Level Threats: Stopping Ransom & CEO Email fraud
sponsored by Trustwave
WEBCAST: Ransomware and CEO email fraud cause organizations billions of dollars in losses annually. This webinar reveals valuable insight from researchers, security experts and industry leaders on how to prevent ransomware and CEO fraud.
Posted: 07 Nov 2016 | Premiered: Oct 19, 2016

Trustwave

Gaining Support for ITAM: Improve IT Operations Through Data Curation
sponsored by BDNA
VIDEO: Tune into this webinar to learn how to enforce enterprise-wide data consistency and improve IT operations with robust ITAM that transforms multi-source data into actionable business insight.
Posted: 03 Nov 2016 | Premiered: 31 Jul 2016

BDNA

Drive Innovation with Agile Cloud Medical Imaging
sponsored by Ambra
VIDEO: Tune into this video to learn how Partners in Health, Memorial Hermann Health System, Barrow Neurological Institute, and the Mayo Clinic were able to streamline healthcare diagnostic image exchange, automate workflow processes, and allow anytime mobile viewing with the cloud.
Posted: 25 Oct 2016 | Premiered: 25 Oct 2016

Ambra

Oracle Database Recovery Strategy
sponsored by Oracle Corporation UK Ltd
WEBCAST: This webcast explores how to implement a backup and recovery strategy specifically designed to protect Oracle databases. Learn about a converged Oracle infrastructure that incorporates archiving, backup, and flash storage to enable fast, reliable data recovery and discover how Oracle's recovery appliance can improve your protection strategy.
Posted: 25 Oct 2016 | Premiered: Apr 14, 2016

Oracle Corporation UK Ltd

Balancing Endpoint Security vs. End User Productivity
sponsored by AppSense
PODCAST: Most IT organizations struggle to balance endpoint security and user productivity. In this podcast, industry expert Simon Townsend will examine both sides of the issue and suggest approaches that will help you get and maintain that balance.
Posted: 21 Oct 2016 | Premiered: Oct 13, 2016

AppSense

How to Provide Simple, Secure Access to All of Your Organization's Synced Content
sponsored by IntraLinks, Inc
WEBCAST: You need to provide your employees with a way to work collaboratively and securely with external partners—otherwise they may put your content at risk. Watch this quick video to learn how to securely collaborate and share files with external partners.
Posted: 13 Oct 2016 | Premiered: Oct 13, 2016

IntraLinks, Inc

Miami Children's Hospital Tackles Explosive Data Growth with Scale-out Storage
sponsored by Dell EMC
VIDEO: David Bratt, Director of Technology Services at Miami Children's Hospital, explains how IT is transforming patient care delivery. Tune in to learn how scale-out storage will manage the explosion of healthcare data, as well as how the utilization of data lakes will foster dynamic business growth.
Posted: 05 Oct 2016 | Premiered: 31 Mar 2015

Dell EMC

Partners Healthcare Redefines Health IT with Data Lake Utilization
sponsored by Dell EMC
VIDEO: Tune into this video as Brent Richter, Associate Director of IS Operations at Partners Healthcare, illustrates a strategic solution to health IT's most important big data challenge (easy and secure access to EHRs and EMRs): data lake utilization.
Posted: 03 Oct 2016 | Premiered: 18 Sep 2015

Dell EMC

Achieving Maximum Backup Granularity
sponsored by Veeam Software
WEBCAST: Discover a data backup and replication solution that ensures your enterprise can recover what you need, when you need it. Watch and learn how to easily browse business-critical applications, avoid data loss with item-level restores, use advanced search options to find what you need to restore, and more.
Posted: 15 Sep 2016 | Premiered: Sep 9, 2015

Veeam Software

DSSD D5 Overview: What Is The World's Fastest Storage Platform and Why Do You Need It?
sponsored by Dell EMC
WEBCAST: Are your mission-critical applications performing the way you want? Attend this webinar to find out how DSSD D5 can provide the storage performance demanded by tomorrow's mission-critical workloads, whether they are running on a traditional database infrastructure, leveraging Hadoop, or running a BI app.
Posted: 12 Sep 2016 | Premiered: Jul 8, 2016

Dell EMC

Protect and Recovery Data with Confidence
sponsored by IBM
PRODUCT DEMO: This demonstration tool provides an at-a-glance summary of how IBM Spectrum Protect monitors and protects your backup data. See how this tool can provide your enterprise with the ability to see your data protection world in a single view, confidence that your business will continue in event of a disaster, and more.
Posted: 23 Aug 2016 | Premiered: 23 Aug 2016

IBM
1 - 25 of 235 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement