IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Multimedia (View All Report Types)
51 - 75 of 247 Matches Previous Page  |  Next Page
Tracking the Most Significant Cyber Threat
sponsored by OpenDNS
WEBCAST: Discover steps you can take to best protect your data from ransomware and infections as well as best practices to protect sensitive data overall.
Posted: 18 Apr 2016 | Premiered: Mar 30, 2016

OpenDNS

Experts Discuss the Benefits of Unified Virtual Server Data Protection
sponsored by Commvault
WEBCAST: In this webcast, storage experts Jason Buffington, Arrian Mehis, and Robbie Wright discuss the benefits of a unified virtual server data protection solution that enables disaster recovery as a service (DRaaS). See how a unified virtual approach can provide your enterprise with the security you need.
Posted: 15 Apr 2016 | Premiered: Dec 9, 2015

Commvault

Case Study: St. Luke's Uses Flash Storage for its Mission Critical EHR Software
sponsored by Pure Storage
VIDEO: This brief webcast discusses St. Luke's implementation of a flash-array storage system that enabled access to their patient information rapidly and efficiently. Watch now to see how you can simplify and secure your infrastructure and deliver better care to your patients with high-performing flash storage.
Posted: 15 Apr 2016 | Premiered: 15 Apr 2016

Pure Storage

The Changing Landscape of Data Usage
sponsored by Commvault
VIDEO: In this webcast, TechTarget storage experts, Jillian Coffin and Jonathan Brown, discuss the changing landscape of data usage and the pressing need for holistic data protection. Watch now to see how one platform can overcome the challenges of today's big data environments and protect your data intelligently.
Posted: 14 Apr 2016 | Premiered: 16 Oct 2015

Commvault

Cloudian HyperStore 101
sponsored by Cloudian
VIDEO: This webcast provides an overview of an object storage system that uses commodity servers to build highly scalable and distribute storage. Watch now to discover how Cloudian's "hyperstore" technology operates and how it can scale to support all of your applications.
Posted: 11 Apr 2016 | Premiered: 09 Sep 2015

Cloudian

5 Ways to Win with Data Dedupe
sponsored by arcserve
WEBCAST: If you're ready to maximize your data reduction results, watch this on-demand webcast where we'll reveal five keys to a winning deduplication strategy, explain specific differences between Arcserve's dedupe approach vs. the competition, and share real customer examples from Arcserve Unified Data Protection. Watch on-demand today!
Posted: 17 Mar 2016 | Premiered: Mar 17, 2016

arcserve

Top 3 Considerations When Looking at Cloud-Based Backup
sponsored by arcserve
WEBCAST: Due to its affordability, cloud-based disaster recovery is enabling small and medium-sized businesses to upgrade their data protection to rival that of enterprise-level organizations. What does this trend mean for other affordable mediums? Watch this on-demand webcast to find out!
Posted: 17 Mar 2016 | Premiered: Oct 31, 2015

arcserve

3 Simple Ways to Outsmart Your Storage
sponsored by IBM
VIDEO: This short webcast highlights a software-defined storage solution that improves data security with encryption capabilities, simplifies data management, and enhances overall data value. Watch now to see how you can improve your existing storage infrastructures and better manage higher data volumes.
Posted: 09 Mar 2016 | Premiered: 04 Nov 2015

IBM

IBM Spectrum Virtualize Encryption Capability: Part of a Larger SDS 'Whole'
sponsored by IBM
VIDEO: In this video, Mark Peters, an analyst at ESG, discusses a software-defined storage solution that places encryption in the storage management layer to provide maximum ease and value across an entire storage ecosystem. Watch now to learn how you can improve your data security capabilities.
Posted: 09 Mar 2016 | Premiered: 19 Oct 2015

IBM

Cloud Based Data Protection
sponsored by arcserve
WEBCAST: This webcast shows you the simplest and most direct form of data protection in the cloud. It'll give you tips on best practices for cloud storage and how to effectively backup your data using the 3-2-1 rule.
Posted: 25 Feb 2016 | Premiered: Dec 31, 2015

arcserve

Best Practices for Eliminating SSL Encrypted Traffic Blind Spots
sponsored by Blue Coat Systems
WEBCAST: Learn how to apply policies and protection to combat threats hidden in HTTPS traffic and applications in this helpful webcast.
Posted: 19 Feb 2016 | Premiered: Jan 22, 2016

Blue Coat Systems

Forrester: Tips to Build Your Data Protection Business Case
sponsored by Digital Guardian
WEBCAST: This video will teach you how to establish success factors for data protection programs.
Posted: 04 Feb 2016 | Premiered: Nov 30, 2015

Digital Guardian

Update your current Apple and Oracle software now
sponsored by WatchGuard Technologies, Inc.
VIDEO: Watch this video to learn about the latest updates to Mac OSX, iOS 9 and Oracle patch that will keep your network secure.
Posted: 20 Jan 2016 | Premiered: 19 Jan 2016

WatchGuard Technologies, Inc.

Best Practices for Securing AWS Instances
sponsored by CloudPassage
WEBCAST: In this webcast, security pros will explore the security challenges AWS computing presents and offer 7 best practices to secure your cloud environments faster. Watch now to learn more.
Posted: 15 Jan 2016 | Premiered: Dec 4, 2015

CloudPassage

Case Study: UberGlobal
sponsored by Commvault
VIDEO: Access this webcast to discover how UberGlobal implemented a scalable cloud storage platform with data deduplication capabilities that allowed them to overcome their data management challenges. Watch to see how this storage solution can provide your enterprise with cost and efficiency improvements.
Posted: 03 Dec 2015 | Premiered: 02 Nov 2015

Commvault

Telehuset Case Study: A Backup Fit For MSPs
sponsored by Barracuda Networks Inc.
VIDEO: This video showcases how one MSP company, Telehuset Vennesla, was able to improve their backup quality by moving to a stable, scalable, backup system. Tune in to learn how you can improve your organization's backup and data protection with a solution that is easy to implement and manage.
Posted: 15 Oct 2015 | Premiered: 22 May 2014

Barracuda Networks Inc.

Case Study: MSP Uses Data Backup for Efficient Data Center Management
sponsored by Barracuda Networks Inc.
VIDEO: Access this video to see how one MSP provider was able to implement a data backup solution, allowing them to run an efficient data center and meet the scalability requirements of their clients. Watch now to see their success story.
Posted: 15 Oct 2015 | Premiered: 22 May 2014

Barracuda Networks Inc.

An Examination of Web App Security Process Management
sponsored by WhiteHat Security
WEBCAST: In this webcast, you'll learn the hard numbers about security vulnerabilities and how susceptible your organization is to being the next victim of an attack. View now to arm yourself with the knowledge to prepare for the inevitable attacks and reduce the likelihood of a data breach.
Posted: 01 Oct 2015 | Premiered: Jul 1, 2015

WhiteHat Security

Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 01 Oct 2015 | Premiered: May 12, 2015

WhiteHat Security

Video Brief: Data Protection Appliances
sponsored by arcserve
VIDEO: Find out what you need to know about data protection appliances in this video brief by the Enterprise Strategy Group's Sr. Data Protection Analyst, Jason Buffington. In this short video you will learn about various types of data protection appliances, market trends regarding appliance adoption, and more.
Posted: 25 Aug 2015 | Premiered: 11 May 2015

arcserve

Security School: Effective Analyze SIEM Data
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Achieving the promise of SIEM is a matter of understanding the technology, and this webcast series will help you do so. Watch these interesting presentations from a leading security expert to learn all you need to know to make SIEM work for you.
Posted: 04 Aug 2015 | Premiered: 10 May 2013

SearchSecurity.com

Podcast: Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
PODCAST: Using these tools and tactics, you can identify advanced attacks and protect the crown jewels on your network.
Posted: 18 Feb 2016 | Premiered: Feb 16, 2016

Lancope

Enterprise Mobile Security for Dummies
sponsored by Skycure
WEBCAST: In this webcast, you'll gain insight into the confusing and evolving mobile security landscape. View now to learn a step-by-step guide to achieve holistic mobile security and review a checklist for evaluating mobile security strategies.
Posted: 07 Dec 2015 | Premiered: Mar 19, 2015

Skycure

Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without altering the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015

FinalCode

File Sharing Insecurity: The Final Data Leakage Frontier
sponsored by FinalCode
WEBCAST: In this webinar, discover how you can strengthen security for you shared files without staunching innovation and collaboration.
Posted: 21 Sep 2015 | Premiered: Oct 8, 2015

FinalCode
51 - 75 of 247 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement