IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Multimedia (View All Report Types)
51 - 75 of 257 Matches Previous Page  |  Next Page
Considerations for Secure Enterprise File Sharing
sponsored by Citrix
VIDEO: File sharing becomes an issue when there is no one predetermined way to share within an enterprise, especially when taking cloud and mobile computing into consideration. Watch this brief video to learn about how to spot and close security gaps.
Posted: 06 May 2016 | Premiered: 20 Aug 2013

Citrix

Case Study: Veterans United Home Loans Simplifies Their Data Management
sponsored by Commvault
VIDEO: Watch this webcast to see how Veterans United Home Loans implemented a flexible data management solution that enabled them to manage their data at multiple sites and provide reliable services to their customers. Access now to learn more about this resilient, scalable, and secure solution.
Posted: 05 May 2016 | Premiered: 15 Oct 2015

Commvault

The IoT Journey: Freight Farms Conquers Data Challenges
sponsored by Xively by LogMeIn
WEBCAST: Freight Farms, a network of urban farms that shares data every minute, struggled to scale their system to handle millions of data points and securely manage access control for every single device. In this webinar, discover the strategy that empowered Freight Farms to conquer these challenges and create optimal user experiences.
Posted: 05 May 2016 | Premiered: May 5, 2016

Xively by LogMeIn

Case Study: Public Consulting Group Meets Governance, DR, and SLA Requirements with Efficient Data Management
sponsored by Commvault
VIDEO: In this case study, witness how a consulting group utilized a data management solution to seamlessly meet compliance, governance, and disaster recovery requirements for their customers. Watch now to learn more.
Posted: 04 May 2016 | Premiered: 21 Oct 2015

Commvault

Case Study: OnX Enterprise Solutions Implements Integrated Data Management
sponsored by Commvault
VIDEO: This brief webcast highlights one enterprise's implementation of a single integrated data management solution that manages all different copies of data. Access now to witness how you can utilize this solution to improve your customer service and data storage operations.
Posted: 03 May 2016 | Premiered: 17 Dec 2015

Commvault

Case Study: Christie Digital Protects Big Data
sponsored by Commvault
VIDEO: In this webcast, witness how Christie Digital utilized a backup and data management solution to ensure their data can be protected and recovered quickly, easily, and efficiently. See how you can secure your virtual environments, regardless of the size of your data volumes.
Posted: 28 Apr 2016 | Premiered: 18 Nov 2015

Commvault

How Shannon Medical Center is Scaling VDI
sponsored by Pure Storage
WEBCAST: In this webcast, Mike Russell, Assistant IT Director at Shannon Medical Center, explains how VDI has enabled them to boost IT efficiency and patient care. Watch now to learn how you can utilize flash storage to overcome the VDI challenge and secure provider access to your desktops, clinical apps, and patient information.
Posted: 26 Apr 2016 | Premiered: Apr 26, 2016

Pure Storage

Storage Analyst Discussion: The Shift to Array-Based Snapshots
sponsored by Commvault
VIDEO: In this webcast, Senior Storage Analyst, Dave Simpson, discusses the shift to array-based snapshots that integrate backup software and hardware to create a more efficient, holistic data protection solution. Watch now to see how you can manage all of your arrays under one platform and transform stagnant data into a business resource.
Posted: 20 Apr 2016 | Premiered: 07 Dec 2015

Commvault

Analyst Perspective: How Smart Businesses Use the Cloud
sponsored by Commvault
VIDEO: In this webcast, expert analyst Lauren Nelson discusses the rise of cloud adoption. Discover how cloud and virtualization can enable your enterprise to implement a holistic data protection and disaster recovery approach that can enable you to secure all of your applications and data under a single platform.
Posted: 19 Apr 2016 | Premiered: 08 Feb 2016

Commvault

Tracking the Most Significant Cyber Threat
sponsored by OpenDNS
WEBCAST: Discover steps you can take to best protect your data from ransomware and infections as well as best practices to protect sensitive data overall.
Posted: 18 Apr 2016 | Premiered: Mar 30, 2016

OpenDNS

Experts Discuss the Benefits of Unified Virtual Server Data Protection
sponsored by Commvault
WEBCAST: In this webcast, storage experts Jason Buffington, Arrian Mehis, and Robbie Wright discuss the benefits of a unified virtual server data protection solution that enables disaster recovery as a service (DRaaS). See how a unified virtual approach can provide your enterprise with the security you need.
Posted: 15 Apr 2016 | Premiered: Dec 9, 2015

Commvault

Case Study: St. Luke's Uses Flash Storage for its Mission Critical EHR Software
sponsored by Pure Storage
VIDEO: This brief webcast discusses St. Luke's implementation of a flash-array storage system that enabled access to their patient information rapidly and efficiently. Watch now to see how you can simplify and secure your infrastructure and deliver better care to your patients with high-performing flash storage.
Posted: 15 Apr 2016 | Premiered: 15 Apr 2016

Pure Storage

The Changing Landscape of Data Usage
sponsored by Commvault
VIDEO: In this webcast, TechTarget storage experts, Jillian Coffin and Jonathan Brown, discuss the changing landscape of data usage and the pressing need for holistic data protection. Watch now to see how one platform can overcome the challenges of today's big data environments and protect your data intelligently.
Posted: 14 Apr 2016 | Premiered: 16 Oct 2015

Commvault

Cloudian HyperStore 101
sponsored by Cloudian
VIDEO: This webcast provides an overview of an object storage system that uses commodity servers to build highly scalable and distribute storage. Watch now to discover how Cloudian's "hyperstore" technology operates and how it can scale to support all of your applications.
Posted: 11 Apr 2016 | Premiered: 09 Sep 2015

Cloudian

Webinar - Network security without compromise
sponsored by Aruba Networks
WEBCAST: In this webcast, you will learn how to enhance network security, enforcement and a better user experience.
Posted: 23 Mar 2016 | Premiered: Feb 1, 2016

Aruba Networks

5 Ways to Win with Data Dedupe
sponsored by arcserve
WEBCAST: If you're ready to maximize your data reduction results, watch this on-demand webcast where we'll reveal five keys to a winning deduplication strategy, explain specific differences between Arcserve's dedupe approach vs. the competition, and share real customer examples from Arcserve Unified Data Protection. Watch on-demand today!
Posted: 17 Mar 2016 | Premiered: Mar 17, 2016

arcserve

Top 3 Considerations When Looking at Cloud-Based Backup
sponsored by arcserve
WEBCAST: Due to its affordability, cloud-based disaster recovery is enabling small and medium-sized businesses to upgrade their data protection to rival that of enterprise-level organizations. What does this trend mean for other affordable mediums? Watch this on-demand webcast to find out!
Posted: 17 Mar 2016 | Premiered: Oct 31, 2015

arcserve

3 Simple Ways to Outsmart Your Storage
sponsored by IBM
VIDEO: This short webcast highlights a software-defined storage solution that improves data security with encryption capabilities, simplifies data management, and enhances overall data value. Watch now to see how you can improve your existing storage infrastructures and better manage higher data volumes.
Posted: 09 Mar 2016 | Premiered: 04 Nov 2015

IBM

IBM Spectrum Virtualize Encryption Capability: Part of a Larger SDS 'Whole'
sponsored by IBM
VIDEO: In this video, Mark Peters, an analyst at ESG, discusses a software-defined storage solution that places encryption in the storage management layer to provide maximum ease and value across an entire storage ecosystem. Watch now to learn how you can improve your data security capabilities.
Posted: 09 Mar 2016 | Premiered: 19 Oct 2015

IBM

Cloud Based Data Protection
sponsored by arcserve
WEBCAST: This webcast shows you the simplest and most direct form of data protection in the cloud. It'll give you tips on best practices for cloud storage and how to effectively backup your data using the 3-2-1 rule.
Posted: 25 Feb 2016 | Premiered: Dec 31, 2015

arcserve

Best Practices for Eliminating SSL Encrypted Traffic Blind Spots
sponsored by Blue Coat Systems
WEBCAST: Learn how to apply policies and protection to combat threats hidden in HTTPS traffic and applications in this helpful webcast.
Posted: 19 Feb 2016 | Premiered: Jan 22, 2016

Blue Coat Systems

Forrester: Tips to Build Your Data Protection Business Case
sponsored by Digital Guardian
WEBCAST: This video will teach you how to establish success factors for data protection programs.
Posted: 04 Feb 2016 | Premiered: Nov 30, 2015

Digital Guardian

On-demand Webcast: Top Security Challenges and Best Practices when Moving to the Cloud
sponsored by Intel Security
WEBCAST: Learn about the latest research into secure cloud computing from some of the leading authorities in the industry, such as the foremost security guru from the Cloud Security Alliance, Jim Reavis. You discover how perceptions about cloud computing and security continue to impact adoption, best practices for choosing a secure cloud provider.
Posted: 06 May 2016 | Premiered: Apr 1, 2016

Intel Security

Podcast: Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
PODCAST: Using these tools and tactics, you can identify advanced attacks and protect the crown jewels on your network.
Posted: 18 Feb 2016 | Premiered: Feb 16, 2016

Lancope

Update your current Apple and Oracle software now
sponsored by WatchGuard Technologies, Inc.
VIDEO: Watch this video to learn about the latest updates to Mac OSX, iOS 9 and Oracle patch that will keep your network secure.
Posted: 20 Jan 2016 | Premiered: 19 Jan 2016

WatchGuard Technologies, Inc.
51 - 75 of 257 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement