IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
101 - 125 of 1465 Matches Previous Page  |  Next Page
The Top Five Requirements for Secure Enterprise File Sync and Sharing
sponsored by Citrix
WHITE PAPER: Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.
Posted: 24 Jun 2016 | Published: 01 May 2016

Citrix

Top 10 Reasons to choose EMC Data Protection Solutions
sponsored by Richardson Eyres
WHITE PAPER: Learn 10 reasons why changing your data protection platform to enable efficiency and TCO is a must. Discover enterprise-class data protection across on premise, virtualized, hybrid, and cloud consumption models.
Posted: 23 Jun 2016 | Published: 01 May 2016

Richardson Eyres

The Axway MFT Solution Transcript
sponsored by Axway
WHITE PAPER: It's critical your organization implements MFT to manage and secure the giant wave of data moving forward. MFT is innovating, securing and optimizing business for the future. Whether your organizational value is banking transactions, trades, manufacturing, etc., MFT can increase customer satisfaction and engagement.
Posted: 23 Jun 2016 | Published: 01 May 2016

Axway

Secure File Transfer Lifecycle
sponsored by Axway
WHITE PAPER: This presentation transcript highlights how two globally recognized companies maintain brand equity and commerce by securing, scaling and optimizing their data and file exchange capabilities. Discover how to maximize the transfer, communication and security of information between your headquarters and your global community.
Posted: 22 Jun 2016 | Published: 01 May 2016

Axway

Data Refinement: Facilitating the data-driven organization
sponsored by IBM
WHITE PAPER: Packed with findings from architecture and app development pros, this Forrester Research report will help development and IT teams better understand why a good data refinement strategy is a business imperative, why architects and developers don't' see data the same way, where the hybrid cloud fits in when defining data refinement success, and more.
Posted: 22 Jun 2016 | Published: 30 Jun 2015

IBM

Top Reasons Why Customers Deploy Hybrid Storage
sponsored by TechData - EMC
WHITE PAPER: Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology.
Posted: 21 Jun 2016 | Published: 30 Apr 2016

TechData - EMC

Object Storage Erasure Coding and Self Protecting Technologies
sponsored by HGST
WHITE PAPER: Scale-out object storage solution can provide disk-based access performance with high levels of durability, scalability, and simplicity. Discover how this storage system can enable your enterprise to simplify your storage architecture and take advantage of your data without requiring your budgets to significantly increase.
Posted: 20 Jun 2016 | Published: 30 Apr 2016

HGST

Top 8 Trends For Big Data
sponsored by Tableau Software
WHITE PAPER: Big data is experiencing a boom in importance and usage. More businesses are coming to rely on data for critical decisions. Why not make your data work for you? You already own it, so make the most of it. Read on to discover the top eight trends currently underway in big data and how to make them work for you.
Posted: 20 Jun 2016 | Published: 20 Jun 2016

Tableau Software

Get started in e-Commerce with the Right Payment Foundation
sponsored by CyberSource
WHITE PAPER: Avoid shopping cart abandonment. Help digital patrons take items to checkout by accepting more payments across channels, while effectively managing fraud and payment security. In this infographic, explore 4 steps to help you get started.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

CyberSource

Top Reasons Why Customers Deploy Flash Storage
sponsored by TechData - EMC
WHITE PAPER: Discover a modern, all-flash storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver improved flash economics. See the benefits your enterprise can take advantage of with this technology.
Posted: 17 Jun 2016 | Published: 30 Apr 2016

TechData - EMC

Clustering for Axway SecureTransport
sponsored by Axway
WHITE PAPER: Learn how to successfully implement clustering for MFT and other business-critical services in your organization. Get proven expertise to leverage an enhanced MFT gateway that supports Standard Clustering and Enterprise Clustering to meet a wide range of capacity requirements and help your organization ensure business continuity.
Posted: 15 Jun 2016 | Published: 31 Dec 2012

Axway

Employing Cyber Threat Intelligence
sponsored by Anomali
WHITE PAPER: Cyber threat intelligence is fast becoming a cornerstone in enterprise security but are you using your various intelligence feeds most effectively? Learn how organizations large and small are increasingly adding threat intelligence to their security posture and see what type of attacks you can mitigate using threat intelligence.
Posted: 15 Jun 2016 | Published: 01 Feb 2016

Anomali

Axway SecureTransport Enhanced Managed File Transfer Gateway
sponsored by Axway
WHITE PAPER: Handle everything from high-volume automated file transfers between systems, sites and lines of business to user-driven communications and mobile file sharing. Ensure you're ready for high-growth uses cases while maintaining corporate controls and visibility.
Posted: 14 Jun 2016 | Published: 31 Dec 2015

Axway

Pivot3 Marries Erasure Coding and Hyperconvergence
sponsored by Pivot3
WHITE PAPER: Discover a hyper-converged infrastructure platform that implements scalar erasure codes to deliver higher storage efficiency and greater resilience than data replication. Explore how to enable efficient, resilient data protection in your hyper-converged environment.
Posted: 14 Jun 2016 | Published: 31 Dec 2015

Pivot3

Integrating Data Protection and Active Archiving
sponsored by HGST
WHITE PAPER: Learn how to easily integrate data protection with scalability. An integrated solution demonstrates data availability at scale, manageability, disaster recovery capabilities and simplicity agreeable to the demands of current and future enterprise data center environments.
Posted: 13 Jun 2016 | Published: 01 Apr 2016

HGST

Integrated Solution for Workforce Mobility and Secure Hybrid Cloud
sponsored by Hitachi Data Systems
WHITE PAPER: Discover a content platform portfolio that combines object storage software with hybrid cloud to efficiently consolidate, automate, mobilize and archive data. See how this solution can bring structure to your unstructured data, simplify your storage management, ensure security, and more.
Posted: 13 Jun 2016 | Published: 31 Jan 2015

Hitachi Data Systems

Support Unstructured Data with Multipurpose Distributed Object Storage
sponsored by Hitachi Data Systems
WHITE PAPER: Explore a single, multipurpose distributed object-based storage system that can support large-scale repositories of unstructured data throughout a wide range of workloads. Discover the benefits this platform can bring to your enterprise, including multitenancy, adaptive cloud tiering, spin-down capability, and more.
Posted: 10 Jun 2016 | Published: 30 Nov 2014

Hitachi Data Systems

Optimizing Web Application Security for the New Bad Bot Threat Landscape
sponsored by Distil Networks
WHITE PAPER: Winning in today's bot battlefield takes time, expertise, and a dedicated team. In this white paper, get a glimpse into the world of anti-bot defenses and win the battle of the bots on your site.
Posted: 07 Jun 2016 | Published: 01 May 2016

Distil Networks

Mobilephobia: Curing the CISO’s Most Common Mobile Security Fears
sponsored by IBM MaaS360
WHITE PAPER: This white paper shows you a comprehensive portfolio of mobile security solutions that address four key mobile security challenges. Learn intelligent, integrated and innovative approaches that can help your organization stay ahead of emerging threats while managing operational risks and lowering cost of a strong security posture.
Posted: 03 Jun 2016 | Published: 01 May 2016

IBM MaaS360

The State of Mobile Security Maturity
sponsored by IBM MaaS360
WHITE PAPER: This study takes the mobile security pulse of large enterprises worldwide. It'll help you assess where you are on this emerging mobile security maturity scale and giving you an indication of where you should make your mobile security investments moving forward.
Posted: 03 Jun 2016 | Published: 31 Dec 2014

IBM MaaS360

Securing mobile productivity for Microsoft Office 365
sponsored by IBM MaaS360
WHITE PAPER: Take the complexity out of securing your mobile workforce. Learn how to secure your Microsoft ecosystem across all mobile platforms, including Windows 10. Enable IT to efficiently manage enterprise productivity, connectivity and security today and into the future.
Posted: 03 Jun 2016 | Published: 01 Mar 2016

IBM MaaS360

Protect Confidential Data While Keeping Mobile Users Productive
sponsored by IBM MaaS360
WHITE PAPER: Common sense dictates that you look for ways to supplement your mobile device management (MDM) solution with additional, more robust security controls. This white paper helps you identify the goals for your MDM security strategy and select the best approach to reach those goals.
Posted: 03 Jun 2016 | Published: 01 Mar 2016

IBM MaaS360

EMC VNX and VNXe Family with Veeam Availability Suite
sponsored by Veeam Software
WHITE PAPER: Learn how Veeam Availability Suite v9 is designed to provide enhanced availability with storage snapshots for backup, replication, and recovery tasks. This white paper covers the issues you can expect to solve by integrating this technology, and how to connect it to a storage array.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Veeam Software

Extending Backup to the Cloud
sponsored by Veeam Software
WHITE PAPER: This white paper discusses a backup and replication system that can simplify your move to the cloud. Access now to see how you can achieve new levels of availability and storage efficiencies for your mission-critical virtual environments.
Posted: 02 Jun 2016 | Published: 21 Jan 2016

Veeam Software

‘PowerShell’ Deep Dive: A United Threat Research Report
sponsored by Carbon Black
WHITE PAPER: Learn more about PowerShell and how cybercriminals are using it to expedite their criminal activities. This report outlines several techniques attackers use to leverage PowerShell to gain access to organizations' endpoints and provides suggestions on how security teams can detect, prevent and respond to such attacks.
Posted: 17 Jun 2016 | Published: 01 May 2016

Carbon Black
101 - 125 of 1465 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement