IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Multimedia (View All Report Types)
1 - 25 of 234 Matches Previous Page  |  Next Page
Find The Right Cloud Service Provider For Your Organization
sponsored by VMware
VIDEO: Watch this brief video to examine a cloud network that provides customers with unprecedented levels of extensibility, flexibility, and choice of public and hybrid cloud services.
Posted: 16 Nov 2015 | Premiered: 03 Mar 2015


Safeguard Your Data, Productivity, and Reputation with Business Continuity and Resiliency
sponsored by IBM
VIDEO: This video focuses on a cloud managed backup resilience service that can help you attack threats head-on with customized consulting and cloud-based technologies to keep your data and your business always on. Watch this video to see how you can proactively defend your business against the unexpected.
Posted: 13 Nov 2015 | Premiered: 21 Nov 2014


HGST Strengthens CrossFit Data Storage
sponsored by HGST
VIDEO: This video details how one health and fitness company was able to increase efficiency and simplify storage management using an active archival system. Tune in to learn how you can lower your storage total; cost of ownership, easily scale capacity and performance, increase resiliency, and more.
Posted: 11 Nov 2015 | Premiered: 11 Nov 2015


Enhance Security with Hardware Based Memory Protection
sponsored by Oracle Corporation
VIDEO: This video discusses a hardware based memory protection system that improves security and reliability and can fit a multitude of different data center designs. Watch now to learn how this memory protection can improve your data center security, reliability, and efficiency.
Posted: 11 Nov 2015 | Premiered: 26 Oct 2015

Oracle Corporation

Security and Performance in One Cloud Infrastructure
sponsored by Oracle Corporation
VIDEO: This brief video explains how you can build a highly secure cloud infrastructure that offers equally effective performance.
Posted: 11 Nov 2015 | Premiered: 26 Oct 2015

Oracle Corporation

Masood Heydari Discusses the Key to Securing and Accelerating Databases and Applications
sponsored by Oracle Corporation
WEBCAST: In this webinar, Masood Heydari discusses the next phase of hardware and software engineering. Tune in and find out how, by converging elements of database software onto processor silicon, technology has made a giant leap forward in making a fully encrypted data center.
Posted: 11 Nov 2015 | Premiered: Oct 26, 2015

Oracle Corporation

Making "Things" Secure: Towards a Safer Internet of Things
sponsored by Symantec Corporation
WEBCAST: This webcast discusses different IoT applications and exposes how important security and reliability is when putting together an IoT system. Access now to see the top 10 vulnerabilities of IoT applications, including insecure network services, insufficient security configurability, and inefficient authentication, and learn how you can resolve them.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015

Symantec Corporation

Threat Intelligence Networks: The Next Generation
sponsored by Symantec Corporation
WEBCAST: This video discusses how information security architecture has shifted the focus of threat intelligence from reactive protection for individual threats to proactive risk management. Learn how you can build security into your infrastructure by utilizing an ecosystem of products that work together to minimize the risks of a data breach.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015

Symantec Corporation

Discovering the New Business Case for Cybersecurity
sponsored by Symantec Corporation
WEBCAST: This presentation demonstrates how cyber security creates wealth for stakeholders and justifies the investments that need to be made towards it. Learn how security can enable your digital information to have functional and economic value as property and can help you manage the risk of any potential threat or attack on your information.
Posted: 11 Nov 2015 | Premiered: Nov 11, 2015

Symantec Corporation

Cloud Data Encryption Made Easy
sponsored by Oracle Corporation
WEBCAST: This webcast takes an in-depth look at one cloud system that accelerates data encryption in motion and at rest while protecting against malware attacks. View now to review this system and determine if it provides the security your organization needs to mitigate breaches.
Posted: 09 Nov 2015 | Premiered: Oct 26, 2015

Oracle Corporation

Data Archiving for Financial Services
sponsored by Proofpoint, Inc.
WEBCAST: Discover how to simplify data privacy compliance and meet global financial regulation requirements in this informative webcast.
Posted: 09 Nov 2015 | Premiered: Dec 31, 2014

Proofpoint, Inc.

Reduce Attack Surface and Compliance Risks with Unified Threat Protection
sponsored by Proofpoint, Inc.
WEBCAST: In this webcast, Joe Diamond, Director of Product Marketing for Information Protection at Proofpoint, explains how to protect your sensitive information from malicious attacks, system glitch, and human error with ongoing security solutions. View now to reduce your attack surface with automated classification.
Posted: 05 Nov 2015 | Premiered: Nov 5, 2015

Proofpoint, Inc.

Smart Parking and the Evolution of the Hybrid Cloud Service Provider
sponsored by IBM
VIDEO: This video depicts smart parking as an example of cloud services allowing enterprises to access data in real time without having to worry about data protection or management challenges. Watch how hybrid cloud service providers are evolving to providing more services that can make your enterprise's data processes efficient and easy to manage.
Posted: 29 Oct 2015 | Premiered: 09 Jun 2015


Why Your Cybersecurity Needs to Advance
sponsored by BitDefender
VIDEO: This brief video discusses the dangers of traditional security and the importance of embracing sophisticated security measures. Take a look to learn how improving your security architecture can stop the rise of cybercrime.
Posted: 29 Oct 2015 | Premiered: 13 Oct 2015


Automate Your Enterprise Apps to Ensure Secure Mobile Data Access
sponsored by Citrix
WEBCAST: In this webcast, Security Strategists Stacy Bruzek Banerjee and Kurt Roemer share their advice on how and where to protect the enterprise data that matters. Tune in to receive guidance on automating your enterprise data and apps, so that your people can access sensitive data when—and where—they need it.
Posted: 28 Oct 2015 | Premiered: Oct 28, 2015


How John Lewis Streamlined IT Operations
sponsored by Splunk
VIDEO: In this webcast, learn how leading retailer John Lewis has been able to finely tune its e-commerce customer experience using an operational intelligence tool. See how this has led to rapid growth in online sales and better efficiency across the company.
Posted: 28 Oct 2015 | Premiered: 01 Jul 2014


Set the bar on your Hadoop Security with HDP 2.3
sponsored by Hortonworks
VIDEO: Access this video now to uncover how your enterprise can secure its data using a gateway for perimeter security, provide fine grain authorization and auditing for all access patterns and ensure data encryption over the wire as well as stored on disk. Watch now to learn more.
Posted: 23 Oct 2015 | Premiered: 23 Sep 2015


Telehuset Case Study: Backup Fit For MSPs
sponsored by Barracuda Networks Inc.
VIDEO: This video shows how one MSP company was able to improve their backup quality by moving to a stable, easy to use, backup system. Tune in to learn how you can improve backup times and quality at your organization.
Posted: 15 Oct 2015 | Premiered: 22 May 2014

Barracuda Networks Inc.

Case Study: MSP Uses Data Backup for Efficient Data Center Management
sponsored by Barracuda Networks Inc.
VIDEO: Access this video to see how one MSP provider was able to implement a data backup solution, allowing them to run an efficient data center and meet the scalability requirements of their clients. Watch now to see their success story.
Posted: 15 Oct 2015 | Premiered: 22 May 2014

Barracuda Networks Inc.

Storage Assessment Tool: How Much Inactive Data is Too Much?
sponsored by FujiFilm Dternity
SOFTWARE DOWNLOAD: This IT download provides you with a tool that can assess your stored files and give you a comprehensive analysis of the makeup of your file environment. Click now so that you can reduce your storage management time as well as costs associated with file storage.
Posted: 15 Oct 2015 | Premiered: 15 Oct 2015

FujiFilm Dternity

Classify and Secure All Your Sensitive Data
sponsored by Identity Finder, LLC
VIDEO: This brief video describes how you can find and protect all of your sensitive data for the utmost security and compliance.
Posted: 12 Oct 2015 | Premiered: 27 Dec 2013

Identity Finder, LLC

Best Practices for Classification Techniques and Data Protection
sponsored by Identity Finder, LLC
WEBCAST: In this webinar, Forrester senior analyst Heidi Shey reveals how to turn your data classification project into a success. Tune in and learn how to protect sensitive data types beyond the realm of what is considered regulated.
Posted: 12 Oct 2015 | Premiered: Jun 24, 2015

Identity Finder, LLC

Case Study: How West Virginia University Reduced Its Sensitive Data Footprint
sponsored by Identity Finder, LLC
WEBCAST: In the following webinar, chief information security officer Alex Jalso describes how he reduced his sensitive data footprint in his organization and suggests best practices for reducing your own.
Posted: 12 Oct 2015 | Premiered: Oct 12, 2015

Identity Finder, LLC

Trusted Computing in a Hybrid Cloud Environment
sponsored by Intel and IBM
WEBCAST: In this extensive webcast, learn the 4 challenging questions consumers ask when considering a cloud migration, and how to lay their fears to rest that their data will remain safe. View now to learn how to remain compliant with data privacy laws when data is moved to the cloud.
Posted: 05 Oct 2015 | Premiered: Jun 11, 2015

Intel and IBM

Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without altering the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015

1 - 25 of 234 Matches Previous Page    1 2 3 4    Next Page
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement