IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
126 - 150 of 1423 Matches Previous Page  |  Next Page
The Secure Mobile Enterprise: Enabling Mobility while Controlling Risk
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Building a secure mobile enterprise requires a broad, scalable and integrated approach that manages and secures every aspect of mobility usage. To learn more about four essential components of such an enterprise and how to bring them to yours, access this white paper.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

Dell, Inc. and Intel®

How to Exercise Faster Operational Analytics Using In-Memory Computing
sponsored by Redislabs
WHITE PAPER: In this white paper, discover how you can accelerate real-time analysis of operational data using in-memory computing. In addition, learn how you can optimize time series data and accelerate the speed of your queries.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

Redislabs

Securing Data in the Cloud and on the Ground
sponsored by IBM
WHITE PAPER: In this resource, you will discover how to govern and secure your cloud-based data to realize the financial benefits of the cloud while ensuring information culled from cloud sources is secure and trustworthy. Read on to learn the 4 pillars of good hybrid information governance.
Posted: 16 Mar 2016 | Published: 30 Apr 2015

IBM

How to Choose an IT Platform to Empower Your Internet of Things
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This resource describes how to adapt your organization's human resources, processes, and architectures to derive maximum value from the Internet of Things (IoT). Discover the criteria you need to consider when establishing an IoT platform, including connectivity between devices and data, security and governance, big data analytics, and 2 more.
Posted: 16 Mar 2016 | Published: 31 Dec 2015

Hewlett-Packard Enterprise

Covering the Security Aspect of Software Asset Management
sponsored by Snow Software
WHITE PAPER: Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.
Posted: 14 Mar 2016 | Published: 09 Dec 2015

Snow Software

EMC DATA PROTECTION SUITE 2015
sponsored by EMC & MicroAge
WHITE PAPER: This white paper shows you how to achieve simplicity and flexibility from your data protection. Access now and learn about a simplified, integrated approach that allows your organization to become more flexible while optimizing performance and reducing costs.
Posted: 11 Mar 2016 | Published: 31 Dec 2015

EMC & MicroAge

Replacing Antivirus, and Doing it Right: A CISO Response
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper shows you how to successfully execute a complete antivirus replacement. Access now and learn how to make a daunting task into a simple project with the right careful planning, frequent communication and stakeholder buy-in.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

EMC DATA PROTECTION SUITE 2015
sponsored by EMC & NextNet
WHITE PAPER: In this white paper, you will learn how you can better protect data residing throughout your enterprise. Access this resource now and find out how you can gain flexibility to quickly optimize performance while saving your organization money.
Posted: 11 Mar 2016 | Published: 31 Oct 2015

EMC & NextNet

Backup and Recovery for SAP with Oracle Environments
sponsored by EMC & NextNet
WHITE PAPER: In this white paper, review the EMC data protection suite, which features the necessary SAP integration and support to make backup and recovery more efficient and easier to manage. Read on to discover the new features this technology can provide to your enterprise's backup solution.
Posted: 10 Mar 2016 | Published: 30 Sep 2015

EMC & NextNet

Backup and Recovery for SAP with Oracle Environments
sponsored by EMC & MicroAge
WHITE PAPER: In this white paper, review the EMC data protection suite, which features the necessary SAP integration and support to make backup and recovery more efficient and easier to manage. Read on to discover the new features this technology can provide to your enterprise's backup solution.
Posted: 10 Mar 2016 | Published: 30 Sep 2013

EMC & MicroAge

Security Intelligence: Efficiently Analyze Big Data Sources
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Access this resource to learn about a strategy for security intelligence that can empower you to correlate data across dozens of platforms, detect and deflect attacks, perform queries faster, and much more.
Posted: 10 Mar 2016 | Published: 31 Dec 2015

Hewlett-Packard Enterprise

A Solutions Guide to Hyperconverged Infrastructure for Enterprise Applications
sponsored by Softchoice Corporation
WHITE PAPER: From this white paper, you will learn why hyperconverged infrastructure is the perfect web-scale infrastructure for enterprise applications, and see how this combo is revolutionizing today's enterprise data centers. Read on to discover how this HCI delivers compromise-free performance.
Posted: 10 Mar 2016 | Published: 31 May 2015

Softchoice Corporation

SAP SYSTEMS ANALYSIS Business Risk Illustration
sponsored by Onapsis
WHITE PAPER: This white paper helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.
Posted: 09 Mar 2016 | Published: 29 Feb 2016

Onapsis

Backup Appliance vs. Build Your Own Media Server
sponsored by Veritas
WHITE PAPER: In this brief data sheet, learn about a backup appliance that eliminates the cumbersome tasks of acquisition, installation and integration, administration, patch and upgrades, and support. With this purpose-build backup appliance, your enterprise can save time and money and eliminate the complexity of building your own backup solution.
Posted: 09 Mar 2016 | Published: 31 Dec 2015

Veritas

Breaking Bad: The Risk of UnsecureFile Sharing
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper explores the link between organizational and individual behavior when using increasingly popular file sync-and-share solutions.
Posted: 09 Mar 2016 | Published: 31 Oct 2014

IntraLinks, Inc

How to Get 10x Better Performance, Scalability, and Efficiency for VM Backups
sponsored by Veritas
WHITE PAPER: This white paper highlights a backup solution that supports and protects VMware environments by integrating with VADP. Learn how this solution can enable your enterprise to quickly backup large numbers of VMs with less processing power as well as simplify your hardware and software management.
Posted: 09 Mar 2016 | Published: 31 Aug 2015

Veritas

Backup and Recovery for Microsoft-based Private Clouds
sponsored by EMC & NextNet
WHITE PAPER: This white paper highlights EMC's data protection suite that delivers enhanced backup and recovery capabilities for private clouds. Read on to discover how this comprehensive solution can provide your enterprise with easier storage management and stronger performance.
Posted: 08 Mar 2016 | Published: 31 Jan 2016

EMC & NextNet

Why Converged Backup Platforms is Your Key to Scalability
sponsored by Veritas
WHITE PAPER: This white paper pits one converged backup platform against other competitors, comparing VADP performance results, storage-array snapshots-based backup, and concurrent application restores. Read on to see how this solution can lower your total backup costs and improve your overall backup performance.
Posted: 08 Mar 2016 | Published: 31 Oct 2015

Veritas

Reducing Cost and Complexity: 7 Reasons Why Backup Appliances Improve your Infrastructure
sponsored by Veritas
WHITE PAPER: This white paper discusses an integrated backup and recovery appliance that simplifies management by eliminating tedious server maintenance and enabling faster, cost-efficient backup. Read on to see the ways in which this appliance can benefit your enterprise, including fast performance and scalability, end-to-end deduplication, and more.
Posted: 08 Mar 2016 | Published: 31 Oct 2015

Veritas

IBM Spectrum Protect: Simplified Data Protection for the Modern Enterprise
sponsored by IBM
WHITE PAPER: This lab report tests an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Read on to see how this solution can enhance your enterprise's data protection by enabling software-defined storage environments, mitigating the risk of data loss, reducing the total cost of data protection, and more.
Posted: 08 Mar 2016 | Published: 31 Dec 2015

IBM

Backup and Recovery for Microsoft-based Private Clouds
sponsored by EMC & MicroAge
WHITE PAPER: This white paper highlights EMC's data protection suite that delivers enhanced backup and recovery capabilities for private clouds. Read on to discover how this comprehensive solution can provide your enterprise with easier storage management and stronger performance.
Posted: 08 Mar 2016 | Published: 31 Jan 2014

EMC & MicroAge

Replace Build-Your-Own Media Servers with Cost-Efficient Backup and Recovery
sponsored by Veritas
WHITE PAPER: This brief white paper highlights an all-in-one appliance for backup and recovery solution. Access now to see how this solution can enable your enterprise to benefit from faster deployments, reduced risk, minimal planned and unplanned downtime, and more.
Posted: 07 Mar 2016 | Published: 31 Jul 2015

Veritas

The Value of Protecting Data in General, and Encrypting It in Particular
sponsored by IBM
WHITE PAPER: This white paper highlights a software-defined storage solution with built-in encryption capabilities that provides a single point of control for encryption throughout the storage layer. Read on and see how this solution can enhance your storage hardware offerings, ease management, and improve your data protection.
Posted: 07 Mar 2016 | Published: 31 Oct 2015

IBM

How to Mobilize your Corporate Content and Apps
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will examine a comprehensive mobile security strategy that will give your employees unparalleled access to resources behind your firewall, while also securing your data. Read on to see how this strategy includes the ability to mobilize SharePoint, Windows File Share, and your intranet sites, and more.
Posted: 07 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Make Endpoint Security Part of Your Client Systems Refresh
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this guide to uncover preloaded, validated and tested endpoint security strategies. Learn ways to extend data protection to employees on all endpoint devices, regardless of where they are located.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

Dell, Inc. and Intel®
126 - 150 of 1423 Matches Previous Page    4 5 6 7 8 9    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement