IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
126 - 150 of 1242 Matches Previous Page  |  Next Page
The Role of SAM in Information Security
sponsored by Snow Software
WHITE PAPER: Software asset management (SAM) provides an organization not just with the resources it needs to generate audit and reconciliation reports, but also to support information security initiatives. Learn ways information security can be more effectively addressed with the aid of SAM.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

Snow Software

Maximizing Tape Capacities with LTO-7 Technology
sponsored by LTO
WHITE PAPER: In this brief white paper, discover how you can successfully manage and protect your data growth with LTO-7 technology. With LTO-7, your enterprise can benefit from improved capacity, performance, compatibility, interchange and cost control in an open format.
Posted: 23 Feb 2016 | Published: 23 Feb 2016

LTO

Stress Testing: A View from the Trenches
sponsored by SAS
WHITE PAPER: In this white paper, you will learn about various financial institutions and how well they are rising to the stress test challenge. See what areas are progressing and what areas still need to get up to speed.
Posted: 22 Feb 2016 | Published: 30 Dec 2015

SAS

Financial Instruction Advantage and the Optimization of Information Processing
sponsored by SAS
WHITE PAPER: This white paper shows you a greater capability of model risk assessment. Avoid headline-grabbing risks and pressure from regulators by anticipating what's coming.
Posted: 22 Feb 2016 | Published: 30 Dec 2015

SAS

Changing the Economics of Long Term Data Retention and Archiving with LTO
sponsored by LTO
WHITE PAPER: This product specification sheet highlights LTO Ultrium format, a powerful, scalable, adaptable open tape format that can help address the growing demands of data protection. Access now to see how your enterprise can benefit from implementing LTO into your tiered storage management plan.
Posted: 22 Feb 2016 | Published: 14 Sep 2015

LTO

LTO for the Next Generation Data Center
sponsored by LTO
WHITE PAPER: This white paper uncovers the misconception that tape is unreliable and slow and highlights how LTO technology can be used to meet the performance needs of the most demanding streaming workloads. Access now to explore LTO tape's new features and use cases including linear tape file system, tape-as-NAS, deep and active archiving, and more.
Posted: 18 Feb 2016 | Published: 30 Nov 2015

LTO

Accelerating Big Data Collection and DataFlow Management
sponsored by Hortonworks
WHITE PAPER: This white paper highlights a data management platform that combines data acquisition, simple event processing, and transport and delivery to accommodate highly diverse and complicated dataflow. Tap into how you can enable your enterprise to simplify your big data ingestion and increase security for data collection and sharing.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Hortonworks

The Security Performance of 6 Key Industries
sponsored by BitSight
WHITE PAPER: Discover the security performance of six key industry sectors, how they prepare for cyberattacks, and the commonalities of their experiences in defending their data.
Posted: 02 Feb 2016 | Published: 30 Sep 2015

BitSight

40 Questions You Should Have in Your Vendor Security Assessment
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn how to get started with your VRM security program and by accessing the most important questions to ask third-party businesses.
Posted: 02 Feb 2016 | Published: 30 Apr 2014

BitSight

5 Ways Your Vendor Risk Management Program Leaves You in the Dark
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn the steps it takes to protect your data and implement a solid vender risk management (VRM) program.
Posted: 29 Jan 2016 | Published: 02 Dec 2015

BitSight

Backup More, Store Less, Perform Better: Dell Data Protection
sponsored by DellEMC and Intel®
WHITE PAPER: This datasheet highlights Dell's data protection series with backup and recovery appliances as well as built-in, variable, block-based deduplication and compression. Read on to see the how these solutions can enable your enterprise to trim your storage and data protection costs and benefit from scalability, management simplicity, and more.
Posted: 01 Mar 2016 | Published: 01 Mar 2016

DellEMC and Intel®

Transcript: Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WHITE PAPER: Gain deeper visibility into your network using anomaly detection alongside compliance/segmentation monitoring. Identify advanced attacks and protect the crown jewels on your network.
Posted: 25 Feb 2016 | Published: 27 Jan 2016

Lancope

Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper outlines your responsibilities in managing your data in your cloud and gives you seven best practices to keep it secure.
Posted: 22 Feb 2016 | Published: 30 Dec 2015

Alert Logic

AWS & Alert Logic Case Study
sponsored by Alert Logic
WHITE PAPER: This case study shows you the results of Concep and how they gained comprehensive network threat and intrusion detection capabilities.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Alert Logic

7 Best Practices of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper give you steps you should take and point of interest you should review in your network security.
Posted: 17 Feb 2016 | Published: 27 Jan 2016

Alert Logic

A Guide to Easing Your Big Data and Hadoop Management
sponsored by Rackspace
WHITE PAPER: In this white paper, you will discover how to reap the benefits of big data without getting bogged down in deployment, optimization and maintenance challenges—by utilizing a big data management platform. Read on key into Hadoop management challenges and how to overcome them.
Posted: 17 Feb 2016 | Published: 17 Feb 2016

Rackspace

Simplify Data Management and Monitoring
sponsored by Quantum Corporation
WHITE PAPER: This white paper highlights a deduplication backup appliance that reduces OPEX, management time, and unpredictability associated with other backup appliances and self-monitoring tools. Access now to see how this appliance can enable your enterprise to improve your data management with active monitoring, reliability, and speedy resolution time.
Posted: 16 Feb 2016 | Published: 31 Jul 2014

Quantum Corporation

Artico NAS Storage Appliance: Improve Access to More Data
sponsored by Quantum Corporation
WHITE PAPER: This white paper discusses how a NAS archiving solution with policy-based tiering to cloud, object storage, and tape can alleviate archive data management challenges and improve the efficiency of backup storage. Read on to see how this solution can lower costs of storing more data, automate data preservation and protection, and more.
Posted: 16 Feb 2016 | Published: 31 Jan 2016

Quantum Corporation

Maximize Performance and Availability at the Lowest TCO for Your Virtual Environment
sponsored by Quantum Corporation
WHITE PAPER: This brief white paper highlights a storage solution that can efficiently protect data in virtual environments with high-performance deduplication and hybrid flash storage. Read on to see how this solution can enable your enterprise to maximize performance and availability and lower your TCO in your virtual environment.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

Quantum Corporation

Trade up Your Aging Primary Storage Systems With Hybrid Storage
sponsored by Quantum Corporation
WHITE PAPER: In this brief white paper, discover a hybrid storage solution with real-time tiering. Learn how this storage system can provide your enterprise with robust data management, effective data protection, and the ability to expand seamlessly.
Posted: 16 Feb 2016 | Published: 31 Jan 2016

Quantum Corporation

Maximize Performance and Data Availability for Virtualized Environments
sponsored by Quantum Corporation
WHITE PAPER: This brief whitepaper highlights a backup and restoration software combined with a tiered storage infrastructure that allows the use of any combination of disk, cloud, or tape for data protection. Read on to see the benefits these technologies can provide to your enterprise, including maximized data availability, faster data recovery, and more.
Posted: 12 Feb 2016 | Published: 31 Jan 2016

Quantum Corporation

Protect Privileged Credentials Across Traditional and Virtual Data Centers, and all Cloud Environments
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights a solution for privileged credential management that reduces IT risk and drives operational efficiency by supporting traditional, virtualized, and hybrid-cloud infrastructures. Access now to discover how your enterprise can protect and manage all of its credentials.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

CA Technologies.

The Business Value of Integrated Backup Appliances
sponsored by Veritas
WHITE PAPER: This white paper explores integrated backup appliances that enable efficient, storage-optimized data protection for data centers, remote offices, and virtual environments. Read on and learn how these appliances can simplify your enterprise's backup and deduplication strategy and maximize your IT staff time, operations, and storage investment.
Posted: 27 Jan 2016 | Published: 31 Aug 2015

Veritas

Transform Backup to Transform Your Business
sponsored by Veritas
WHITE PAPER: This detailed white paper highlights a backup and recovery software that protects a variety of platforms, applications, and infrastructures. Discover how this software can integrate with your infrastructure to provide your enterprise with reliable, consistent data protection and keep your storage secure.
Posted: 27 Jan 2016 | Published: 31 Aug 2015

Veritas

Delivering More Efficiency and Productivity With Modernized Data Protection
sponsored by HPE and Veeam
WHITE PAPER: This white paper teaches you about new, hyper-converged solutions, based on virtualization software that can transform your data center. Gain a more cost efficient solution with a smaller management footprint.
Posted: 27 Jan 2016 | Published: 30 Sep 2014

HPE and Veeam
126 - 150 of 1242 Matches Previous Page    4 5 6 7 8 9    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement