IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
1 - 25 of 1241 Matches Previous Page  |  Next Page
5-Step Data Quality Framework For Data In Motion
sponsored by Infogix
WHITE PAPER: 6 out of 10 users don't trust their data – and this is all the more strengthened when data is flowing through a myriad of systems prior to analysis. The truth is, if your data is in motion, you may have data quality issues. Learn a 5-step data quality framework for data in motion.
Posted: 15 May 2017 | Published: 15 May 2017

Infogix

4 Mobile Security Insights for CISOs
sponsored by Lookout
WHITE PAPER: Discover the four mobile security insights that you must know, about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Posted: 12 May 2017 | Published: 12 May 2017

Lookout

Bracing for Digital Disruption: What the CIO Needs to Know
sponsored by Infor
WHITE PAPER: This white paper is the CIO's strategy guide to bracing for digital disruption. Learn how to shepherd the launch of new implementations and step into the future with confidence.
Posted: 10 May 2017 | Published: 28 Feb 2017

Infor

Citrix ShareFile eases IT migration to Windows 10®
sponsored by Citrix
WHITE PAPER: Access this white paper to discover a technology that eases OS migrations making future updates simpler. And, find out how the technology allows user data to be freed from devices, protected from overwrites and under your control.
Posted: 09 May 2017 | Published: 09 May 2017

Citrix

Hybrid Cloud & Data Fabric For Dummies
sponsored by NetApp SolidFire
WHITE PAPER: Hybrid clouds are seeing a growth in adoption rates, but we're also seeing data management challenges arise. This guide explores these challenges to the hybrid cloud model and how a data fabric addresses them.
Posted: 09 May 2017 | Published: 31 Dec 2015

NetApp SolidFire

MobileIron and iOS: The Security Backbone for the Modern Enterprise
sponsored by MobileIron
WHITE PAPER: Download this white paper to discover an EMM solution that provides a comprehensive platform that protects enterprise information wherever it lives: in the datacenter, in the cloud, in mobile apps, on mobile devices, and in motion between them.
Posted: 09 May 2017 | Published: 09 May 2017

MobileIron

Why Organizations Still Struggle to Digitally Transform & Innovate
sponsored by TechData - Veeam
WHITE PAPER: Over 80% of enterprises deal with a data availability gap. Do you know how many millions that gap is costing you? Access this white paper to learn how to close the availability and protection gaps, quantify your availability goals, see how these challenges are impacting your digital transformation strategies, and more.
Posted: 09 May 2017 | Published: 09 May 2017


The 5 Features of an Always On Data Platform
sponsored by DataStax
WHITE PAPER: Access this white paper to learn about the 5 features of an always on data platform. Find out what it takes to achieve always on success, how to handle mixed workloads in real time, and more.
Posted: 08 May 2017 | Published: 08 May 2017

DataStax

Data Center Services: Trust the Professionals
sponsored by Comarch
WHITE PAPER: Whether you have an established data center, or are designing and building one, outsourcing to data center services can help stretch your budget and maximize your ROI. Access this white paper to learn about a data center service provider and IT infrastructure as a service to see how your data center stands to benefit.
Posted: 05 May 2017 | Published: 05 May 2017

Comarch

How to Plan for IoT Success: Strategy and Recommendations
sponsored by VMware
WHITE PAPER: The Internet of Things is forcing us to change the way that operations and information technology departments collaborate. Access this white paper to learn how to plan, deploy and manage IoT use cases for tangible, quantifiable benefits.
Posted: 04 May 2017 | Published: 04 May 2017

VMware

The Developer's Guide to the DevSecOps Galaxy
sponsored by Veracode, Inc.
WHITE PAPER: Bringing developers and operations staff together under the singular DevOps roof means trying to mesh contradictory approaches, leaving open security concerns. DevSecOps to the rescue! Access this white paper to learn about DevSecOps challenges, best practices, and more!
Posted: 03 May 2017 | Published: 03 May 2017

Veracode, Inc.

Prevent Full-Blown Breaches with Threat Response and Incident Intelligence
sponsored by Proofpoint, Inc.
WHITE PAPER: The manual tasks it takes to aggregate, organize, and analyze data from all of the key systems and devices on your network can be incredibly time-consuming and can overwhelm security teams with their scope. Discover how to modernize security with threat response and incident intelligence.
Posted: 02 May 2017 | Published: 02 May 2017

Proofpoint, Inc.

Why Cybersecurity's Visibility Gap Matters, and How Organizations Can Solve It
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper explores how to close the cybersecurity visibility gap in an increasingly mobile world. Learn how to see beyond the confines of your network and endpoints to protect your people, brand, and data better.
Posted: 02 May 2017 | Published: 31 Dec 2015

Proofpoint, Inc.

Beware the Beastly Threats of IT security
sponsored by Lenovo
WHITE PAPER: It's essential that IT professionals have the right tools to build safeguards against them as battling threats is more critical for organizations than ever— in dollars and in brand reputation. This eBook explores 6 beastly threats scratching at the perimeter of your company's computers and IT networks, and where these threats are trending.
Posted: 01 May 2017 | Published: 01 May 2017

Lenovo

7 Keys to Unified Data Protection Vendor Evaluation
sponsored by Veritas
WHITE PAPER: Having a unified data protection platform is the way to ensure that your data is both secure and visible. Access this white paper to see gain an understanding of what to look for in a vendor and how two unified data protection vendors compare to each other based on 7 key aspects.
Posted: 27 Apr 2017 | Published: 28 Feb 2017

Veritas

Unified Data Protection Vendor Comparison
sponsored by Veritas
WHITE PAPER: Your data is growing in importance and it needs to be protected no matter which environment it lives in be it virtual, physical, or in the cloud. Access this white paper to see how 2 leading data protection and backup providers compare to one another based on 7 key performance areas.
Posted: 27 Apr 2017 | Published: 30 Dec 2016

Veritas

Vendor Comparison Based on Top 8 Data Protection Needs
sponsored by Veritas
WHITE PAPER: Your data is growing in importance and it needs to be protected no matter which environment it lives in be it virtual, physical, or in the cloud. Access this white paper to see how 2 leading data protection and backup providers compare to one another based on the top 8 data needs.
Posted: 27 Apr 2017 | Published: 31 Oct 2016

Veritas

SaaS Analytics: Safe and Certain Reporting
sponsored by IBM
WHITE PAPER: In this white paper, learn how one multi-national firm was able to maintain Cognos while keeping sensitive data on premises. Plus, discover how 2 more companies were able to access data wherever it resides, create efficiencies and cost savings, and more.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

IBM

How Transactional Analytics is Enabling Digital Payments Transformation
sponsored by Aerospike
WHITE PAPER: Learn how transactional analytics can help you keep up with the rapid changes wrought on eCommerce by technologies like mobile payment apps and non-banking payment service providers (FinTech). Discover how to leverage a database with a hybrid memory architecture and machine learning to transform digital payments.
Posted: 20 Apr 2017 | Published: 20 Apr 2017


How Eurostar Managed Their Mobile Data, Increased Productivity & Reduced Cost
sponsored by Wandera
WHITE PAPER: Eurostar needed its mobile workforce to have access to the tools and data required for work while managing the associated costs. Being an international company, employees were travelling abroad on a daily basis so data roaming bills were excessive. Learn how they reduced bills by 40%, increased roaming productivity, and more.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

Wandera

Building Trust in a Cloudy Sky Executive Summary
sponsored by McAfee, Inc.
WHITE PAPER: Over 90% of organizations worldwide are leveraging cloud services and – faced with a growing skills gap and increasingly advanced threats – can cybersecurity strategies keep up with the demands of the cloud? Uncover the findings of a survey of over 2,000 IT pros to learn about protecting sensitive data and apps in the cloud.
Posted: 11 Apr 2017 | Published: 31 Jan 2017

McAfee, Inc.

Fourth Generation Data Leak Prevention
sponsored by Ghangor Cloud
WHITE PAPER: In this white paper, learn what you need to know about the 4th generation of data leak prevention solutions.
Posted: 05 Apr 2017 | Published: 31 Jan 2017

Ghangor Cloud

Don't Settle, Choose the Best Mobile Security Platform for Your Mobile Transformation
sponsored by MobileIron
WHITE PAPER: This white paper explores how to leverage a modern, scalable EMM platform to bolster your mobile security strategy. Access a comparison guide between AirWatch and MobileIron and learn how to enhance your strategy for securing all things mobile, from apps to emails and beyond.
Posted: 05 Apr 2017 | Published: 31 Dec 2016

MobileIron

Data Governance: Embracing Security and Privacy
sponsored by Tealium
WHITE PAPER: With proper analysis and planning, you can minimize risk, build trust, and protect your brand. This white paper discusses steps to take for building an effective data governance strategy.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Tealium

The Essential Guide Data Protection and Disaster Recovery
sponsored by Tintri
WHITE PAPER: Download this guide to understand the must-have storage features that are essential to modern DP and DR practices;provided are specific guidelines on what to look for, how to strategize DR in your organization, and more.
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Tintri
1 - 25 of 1241 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement