IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
1 - 25 of 1279 Matches Previous Page  |  Next Page
Omnichannel Authentication: Balancing Humanity and Technology
sponsored by NICE Systems, Inc
WHITE PAPER: Learn how to make authentication processes less cumbersome for your customers with technology for secure, simple engagement.
Posted: 24 Feb 2017 | Published: 24 Feb 2017

NICE Systems, Inc

Complying with the European General Data Protection Regulation
sponsored by Quest
WHITE PAPER: Access this white paper now to learn what GDPR compliance means to your organization, what steps you must take to remain compliant, key GDPR provisions, and more.
Posted: 23 Feb 2017 | Published: 23 Feb 2017

Quest

Cloud, Mobility, Big Data: Future Proof Your Organization with Consolidation
sponsored by Matrix42
WHITE PAPER: This white paper explores how to optimize all of your existing workflows and manage them effectively. In the face of growing big data, cloud, and mobile adoption, learn how to leverage a business process automation platform for hybrid environments that facilitates integrations, boosts compliance, and enhances reporting.
Posted: 22 Feb 2017 | Published: 31 Dec 2015

Matrix42

Enabling Secure Collaboration across Microsoft Tools and Devices
sponsored by Box
WHITE PAPER: This paper explores how to leverage a collaboration platform in conjunction with popular Microsoft tools like Office 365, Windows, Intune, and Outlook. Discover how to manage content securely and easily across mobile and desktop devices to empower users to sync, share, edit, and collaborate with up-to-date versions of all of your important files.
Posted: 21 Feb 2017 | Published: 20 Feb 2017

Box

Building the Business Case for Cloud Backup
sponsored by Druva Software
WHITE PAPER: Download this resource to overcome legacy VM data protection complexity with cloud-native backup and recovery. Discover why enterprises employ this method as a cost-effective alternative to traditional DR by learning 5 reasons for migrating backup and archiving to a single, cloud-native platform.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Druva Software

Manage Application Security Risks to Help Protect your Organization’s Critical Data
sponsored by IBM
WHITE PAPER: Effective application security is really a matter of managing risk. Learn how to develop application security when you build an asset inventory, assess the business impact, and 3 more ways to mitigate risks to your most crucial assets.
Posted: 14 Feb 2017 | Published: 14 Feb 2017

IBM

How to Keep Your Data Secure In An Increasingly Insecure World
sponsored by Micron
WHITE PAPER: Digital information has completely transformed the way we live and do business. But with this change comes the need for strong data security measures to protect vital information. In this white paper, explore important data security topics and considerations, including data breaches, regulations and standards, drive decommissioning and more.
Posted: 13 Feb 2017 | Published: 01 Nov 2015

Micron

Tackling Insider Threats
sponsored by Intel Security
WHITE PAPER: Security is an inside job. Insiders are responsible for more than 40% of data loss. Whether it's intentional or accidental, you need to stop it with policy development, event monitoring, and incident response—backed by a strong set of data loss prevention tools. Learn more. Read Tackling Insider Threats.
Posted: 13 Feb 2017 | Published: 30 Nov 2016

Intel Security

How to Prepare for Out-of-Control Data Growth
sponsored by Micron
WHITE PAPER: If you're ready for a storage refresh, access this infographic to prepare for the big data deluge by adopting flash to extend scalability, enhance virtualization support, simplify storage capacity management, and more. You'll also clue into the main drivers behind software-defined storage adoption, as told by IT pros.
Posted: 09 Feb 2017 | Published: 09 Feb 2017

Micron

Lowering Business Risk with Data
sponsored by Cloudera
WHITE PAPER: Companies must stay one step ahead of looming risks. Learn how you can reduce your overall risk exposure by more effectively leveraging your data.
Posted: 07 Feb 2017 | Published: 07 Feb 2017

Cloudera

Ensure A Safe, Successful Move To The Cloud With A Good Information Governance Plan
sponsored by IBM
WHITE PAPER: The benefits of moving data to the cloud are numerous, but doing so without an information governance plan in place can cause more problems than it solves. In this white paper, learn how you can create an effective information governance methodology and increase your success of migrating safely to the cloud.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

Cloud Security and Content Management: Box Case Study
sponsored by IBM
WHITE PAPER: Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

Box: Securing Business Information in the Cloud
sponsored by IBM
WHITE PAPER: Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

Disaster Recovery Guide
sponsored by Zerto
WHITE PAPER: Use this Disaster Recovery Guide to gain insight into the challenges, needs, strategies, and available solutions for disaster recovery and business continuity, especially in modern, virtualized environments and the public cloud. And compare different BD/DR technologies.
Posted: 03 Feb 2017 | Published: 02 Feb 2017

Zerto

Accelerating Your BDR: 7 Ways to Turn Your Turtle into a Cheetah
sponsored by QuorumLabs Inc.
WHITE PAPER: Discover 7 ways you can accelerate your backup and disaster recovery and stay ahead of your competitors.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

QuorumLabs Inc.

How to Plan For The General Data Protection Regulation & Govern Your Data
sponsored by IBM
WHITE PAPER: Customer information can offer invaluable insights into trends, behavior and spending habits. However, using and storing personal information can also be a big risk to organizations if not handled properly. In this white paper, learn about the General Data Protection Regulation (GDPR), including how to protect and govern your organization's data.
Posted: 02 Feb 2017 | Published: 01 Nov 2016

IBM

Demand More from Data Center Management Services
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: 91% of IT decision-makers are looking to a third party to help develop and execute their IT strategy. Access this Frost & Sullivan white paper to learn why IT leaders are turning to service providers to help manage their data center strategy and how to select the right provider for your business needs.
Posted: 23 Jan 2017 | Published: 31 Aug 2016

Hewlett-Packard Enterprise

Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: With destructive malware ravaging the networks of governments, Aramco, Sands Corporation, and Sony Pictures, you need to adjust your tactics to ensure your continued safety. In this white paper, discover a deeper look at these recent attacks and potential countermeasures to thwart them.
Posted: 23 Jan 2017 | Published: 17 Oct 2016

BlackBerry

Protecting Your Business in the Digital Transformation Journey
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: As digital transformation shifts the business risk landscape, IT security must change with it. In this white paper, discover the role mobile devices play in modern security networks, how to build a comprehensive security program and more.
Posted: 17 Jan 2017 | Published: 29 Feb 2016

Hewlett-Packard Enterprise

The 5 Rings of Data Integration Hell Impacting Your Security
sponsored by Globalscape
WHITE PAPER: In this guide discover the 5 "rings of hell" that make meeting data integration requirements difficult and threaten the security of your data. Learn about the various scenarios which can cause data integration challenges, methods for data migration worth considering, and more.
Posted: 11 Jan 2017 | Published: 31 Dec 2016

Globalscape

How The US Navy Helped Transform Today's BDR Market
sponsored by QuorumLabs Inc.
WHITE PAPER: This white paper explains how the US Navy helped transform today's BDR market. Discover an agnostic solution that fits into any environment to provide backup and disaster recovery capabilities that now offers the fastest recovery in the market, as well as the easiest backups.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

QuorumLabs Inc.

Security for the Future-Ready Workforce
sponsored by Dell India
WHITE PAPER: To both empower the workforce and protect the enterprise, organizations must choose the right technologies and match users to the right devices. Learn how to cover the needs of 5 future-ready worker categories, while keeping your data safe.
Posted: 05 Jan 2017 | Published: 05 Jan 2017

Dell India

Survey Findings: Data Security
sponsored by Dell India
WHITE PAPER: This data security report illuminates the data security concerns held by businesses. Learn how to obtain the business support needed to integrate data security, while mitigating the cloud and mobile risks that plague IT.
Posted: 04 Jan 2017 | Published: 04 Jan 2017

Dell India

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

Manage Risk by Protecting the Apps and Data that Drive Business Productivity
sponsored by Citrix
WHITE PAPER: Traditional perimeter-based security has been rendered ineffective by mobility and the cloud. In this infographic, learn how to successfully navigate the increasingly volatile IT business environment and take a new approach to information security.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix
1 - 25 of 1279 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement