IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
151 - 175 of 1574 Matches Previous Page  |  Next Page
Endpoint Encryption Keeps Your Data Safe
sponsored by Intel Security
WHITE PAPER: Discover customizable solutions to keep your enterprise data safe using endpoint encryption. Confidently ensure consistent and persistent data protection across all your network devices with a proven solution that allows you to secure data on office desktop PCs, Macs, mobile laptops, VDI workstations.
Posted: 12 May 2016 | Published: 01 Apr 2016

Intel Security

IT Security Vendor Analysis by Bizety
sponsored by Distil Networks
WHITE PAPER: This white paper examines five major vendors and evaluates their security solutions. Learn how well they can coordinate their systems to successfully secure your web infrastructure and online data.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks

The MSP’s Complete Guide to Cyber Security
sponsored by Intronis
WHITE PAPER: Don't put off security talks until after it's too late. This white paper gathers stats and facts about cybersecurity in regards to SMBs. Learn about common cybersecurity mistakes SMBs constantly make and tips on how to approach cloud security.
Posted: 11 May 2016 | Published: 01 Apr 2016

Intronis

Plan for Hybrid Data Protection Media
sponsored by Druva Software
WHITE PAPER: Learn how to implement a hybrid data protection media strategy that will enable your enterprise to achieve the agility needed to meet today's storage demands - all within your budgetary limits, of course. Read on to discover how the combination of tertiary disk, cloud, and tape can result in a foolproof data protection strategy.
Posted: 11 May 2016 | Published: 31 Jan 2016

Druva Software

IBM QRadar - Sense and Detect Modern Threats with the Most Sophisticated Security Analytics Platform
sponsored by IBM
WHITE PAPER: This white paper shows you how to "sense" chains of malicious activities and rapidly deploy security tools across your entire network including cloud-based resources. Access now to greatly improve your remediation efforts and minimize potential damage to your organization.
Posted: 11 May 2016 | Published: 01 Apr 2016

IBM

Eliminate On-Premise Tape Management with Cloud-Based Data Protection
sponsored by Iron Mountain
WHITE PAPER: This brief white paper highlights a scalable, secure cloud-based data protection solution that eliminates the need for on-premise tape backup. See the benefits this software can provide to your enterprise, such as modernized backup and recovery, cost-efficient data replication, reliable network connection, and more.
Posted: 11 May 2016 | Published: 11 May 2016

Iron Mountain

Snapshot Management & Replication: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: Access this white paper for a checklist that will enable your enterprise to determine the 'must-have" features needed for snapshots to deliver what you require in your application environment or private cloud. See how you can realize the full potential of snapshots.
Posted: 11 May 2016 | Published: 31 Dec 2015

Commvault

A New Approach to Data Center Security
sponsored by VMware
WHITE PAPER: Network perimeter security isn't good enough anymore. Micro-segmentation allows us to secure the data center from the inside and ensure that breaches are stopped before the can spread. Read on to learn more about a security solution that features micro-segmentation and how it will benefit your organization.
Posted: 10 May 2016 | Published: 31 Mar 2016

VMware

Making the Case for a Hybrid Backup Strategy
sponsored by Iron Mountain
WHITE PAPER: This white paper highlights a cost-effective hybrid backup and recovery solution that combines cloud network-based replication with tape-based archiving. Read on to see how you can ensure high levels of security and compliance with a hybrid data protection solution that won't raise your overall data costs.
Posted: 10 May 2016 | Published: 10 May 2016

Iron Mountain

Leveraging the Public Cloud for Enterprise Data Protection
sponsored by Druva Software
WHITE PAPER: In this white paper, discover how to leverage the public cloud for data backup, archiving, and disaster recovery. See how the cloud can enable your enterprise to not only improve the efficiency, reliability, and security of your enterprise, but also boost your total cost of ownership and save on your data protection strategy.
Posted: 10 May 2016 | Published: 10 May 2016

Druva Software

A Secure, IT-approved Alternative to Personal File Sharing Services in the Enterprise
sponsored by Citrix
WHITE PAPER: Personal file sharing invites data leakage and compliance violations by allowing files being shared to escape beyond IT's control. Simply blocking network access of personal file sharing services is no longer a viable option. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Posted: 10 May 2016 | Published: 31 Dec 2015

Citrix

The Ultimate Guide to Selling Cloud Backup
sponsored by Intronis
WHITE PAPER: This e-book outlines steps for guidance and best practices for providing cloud backup as a service. Access now to learn how to lay the foundation for a cloud backup service, how to overcome common security and cost challenges, and how to develop a top sales team that will sell your cloud backup effectively.
Posted: 10 May 2016 | Published: 31 Dec 2013

Intronis

Seven Reasons Why Micro-Segmentation is Powerful to Have and Painless to Add
sponsored by VMware
WHITE PAPER: Data center attacks are on the rise. Physical security and firewalls aren't enough. Micro-segmentation is one of the breakthrough security benefits of network virtualization. Access this white paper to learn about 7 key factors that make micro-segmentation a powerful and painless tool to incorporate.
Posted: 10 May 2016 | Published: 31 Mar 2016

VMware

Server Backup: A Premier, Automated Cloud Backup Solution
sponsored by Iron Mountain
WHITE PAPER: This white paper highlights a cloud backup solution that automates the backup process with features such as continuous data protection, flexible retention settings, security that goes beyond data encryption, and an optional local appliance for faster restorations. Access now to learn how your enterprise can enhance your backup.
Posted: 10 May 2016 | Published: 31 Dec 2014

Iron Mountain

Threat Defense Isn't Just About Detection: It's How Your Respond
sponsored by Intel Security
WHITE PAPER: EDR can mitigate threats before they do their damage. Explore 5 things to look for when researching EDR solutions, so you can determine which are most proactive in helping to prevent attacks.
Posted: 10 May 2016 | Published: 31 Dec 2015

Intel Security

The Risks of Email and the Rewards of Innovative Encryption
sponsored by ZixCorp
WHITE PAPER: This white paper helps you better understand your organization's need for email encryption. It offers a comprehensive look at the types of people inside and outside of your business who may be exchanging sensitive customer or corporate information.
Posted: 10 May 2016 | Published: 01 Apr 2016

ZixCorp

ShareFile Enterprise Security White Paper
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about an enterprise follow-me data solution that enables IT to deliver a robust data sharing and sync service that meets the mobility and collaboration needs of users and the data security requirements of the enterprise.
Posted: 09 May 2016 | Published: 30 Dec 2015

Citrix

Secure file sharing in the enterprise
sponsored by Citrix
WHITE PAPER: As companies grow globally and more dispersed, file sharing becomes more critical. If an organization does not provide a solution, employees will find one -- or more -- for themselves. Access this white paper to learn about ensuring secure data sharing and a file sharing solution that solves several sharing problems.
Posted: 09 May 2016 | Published: 30 Dec 2015

Citrix

Modern Snapshot Management: Enhancing Application Protection and Recovery
sponsored by Commvault
WHITE PAPER: This white paper discusses integrating array-based snapshot technologies with an existing data protection approach to improve manageability, recovery, and protection. Discover how you can deliver faster and more granular application-aware data recovery performance with less effort, complexity, and cost.
Posted: 09 May 2016 | Published: 31 Dec 2015

Commvault

SimpliVity Hyperconverged Infrastructure: Lab Validation Report
sponsored by SimpliVity
WHITE PAPER: In this white paper, you will discover hyperconverged infrastructure that creates backups quickly, efficiently and securely even across data centers. Access now to learn how to backup and restore important files with just two mouse clicks.
Posted: 09 May 2016 | Published: 01 Feb 2016

SimpliVity

Unlock the Key to Repel Ransomware
sponsored by Kaspersky Lab
WHITE PAPER: As cybercriminals realize that victims are often willing to pay for the release of their precious files, the prevalence of ransomware and its variations are on the rise. Learn about the common trends in this type of cybercrime and recommendations to help your organization avoid victimization.
Posted: 09 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Cloud Backup and Disaster Recovery: Keep Your Business Up and Running
sponsored by Iron Mountain
WHITE PAPER: This brief white paper highlights a cloud data protection solution that provides automatic secure cloud backup and fail-proof recovery services. Access now to discover how you can benefit from a solution that keeps your business up and running with your data safe and secure.
Posted: 06 May 2016 | Published: 31 Jan 2016

Iron Mountain

Micro-Segmentation Builds Security Into Your Data Center’s DNA
sponsored by VMware
WHITE PAPER: Micro-segmentation is an adaptive technology that narrows your data center security's focus to overcome threats faster than ever. Access this white paper to learn more about the security and protection micro-segmentation will provide your data center.
Posted: 06 May 2016 | Published: 27 Apr 2016

VMware

How Sarbanes-Oxley Act (SOX) Compliance is Impossible without Privileged Management
sponsored by Dell Software
WHITE PAPER: This white paper addresses IT security compliance from an auditor's perspective. Access now to help your organization achieve and prove compliance with other security mandates as well.
Posted: 06 May 2016 | Published: 31 Dec 2015

Dell Software

Barracuda NG Firewall Model F1000
sponsored by Barracuda Networks
WHITE PAPER: This white paper shows you how to centrally control your security system to prevent it from weakening over time as the infrastructure evolves. Learn how to strengthen your perimeter firewall protection while enabling flexibility to allow for change in the future.
Posted: 06 May 2016 | Published: 01 Apr 2016

Barracuda Networks
151 - 175 of 1574 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement