IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
151 - 175 of 1246 Matches Previous Page  |  Next Page
5 Ways Your Vendor Risk Management Program Leaves You in the Dark
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn the steps it takes to protect your data and implement a solid vender risk management (VRM) program.
Posted: 29 Jan 2016 | Published: 02 Dec 2015

BitSight

Overcome Office 365 Security and Archiving Challenges
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover the limitations of Office 365's built in security features and how you can augment your email security strategy to block advanced threats and spear phishing attacks. Learn how to improve compliance capabilities in office 365 with several insider tips found inside this white paper.
Posted: 04 Nov 2015 | Published: 23 Jul 2014

Proofpoint, Inc.

Best Practices to Make BYOD, CYOD and COPE Simple and Secure
sponsored by Citrix
WHITE PAPER: This white paper provides guidance to develop a complete strategy for BYOD or CYOD, addressing requirements for security, simplicity, and cost reduction. Learn the EMM best practices for BYOD and enable your organization to reduce costs through self-service provisioning.
Posted: 26 Oct 2015 | Published: 30 Jun 2015

Citrix

Accelerate Office 365 Adoption with Security and Compliance Controls
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how you can address security and compliance gaps in Office 365 to make your Office 365 adoption faster, easier and, most importantly, safer.
Posted: 21 Oct 2015 | Published: 10 Mar 2015

Proofpoint, Inc.

Technology Offers Convenience, Privacy Pays the Price
sponsored by Global Knowledge
WHITE PAPER: Technology is a wonderful thing, but it comes with a price: your privacy. This white paper can help you learn more about what kind of personal data is collected by web sites and applications, and how to secure your information online.
Posted: 20 Oct 2015 | Published: 20 Oct 2015

Global Knowledge

The Business Value of Integrated Backup Appliances
sponsored by Veritas
WHITE PAPER: This white paper explores integrated backup appliances that enable efficient, storage-optimized data protection for data centers, remote offices, and virtual environments. Read on and learn how these appliances can simplify your enterprise's backup and deduplication strategy and maximize your IT staff time, operations, and storage investment.
Posted: 27 Jan 2016 | Published: 31 Aug 2015

Veritas

Transform Backup to Transform Your Business
sponsored by Veritas
WHITE PAPER: This detailed white paper highlights a backup and recovery software that protects a variety of platforms, applications, and infrastructures. Discover how this software can integrate with your infrastructure to provide your enterprise with reliable, consistent data protection and keep your storage secure.
Posted: 27 Jan 2016 | Published: 31 Aug 2015

Veritas

Delivering More Efficiency and Productivity With Modernized Data Protection
sponsored by HPE and Veeam
WHITE PAPER: This white paper teaches you about new, hyper-converged solutions, based on virtualization software that can transform your data center. Gain a more cost efficient solution with a smaller management footprint.
Posted: 27 Jan 2016 | Published: 30 Sep 2014

HPE and Veeam

Network protection: The untold story
sponsored by IBM
WHITE PAPER: This white paper explores the growing need for next-generation network protection, focusing on the advances that can help combat today’s advanced threats. It introduces how you can gain the critical insight, visibility and control you need to protect the network against emerging threats and targeted attacks.
Posted: 25 Jan 2016 | Published: 16 Sep 2015

IBM

Forward Thinking Backup: Data Protection for the Digital Business
sponsored by HDS and Veritas
WHITE PAPER: This white paper discusses the challenges of protecting data in today's digital world and highlights a converged backup and recovery platform with scalable storage appliances that enable cost savings and simplified management. Access now to see the benefits this platform can provide, including instant data recovery, cloud integration, and more.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

HDS and Veritas

Top 5 Pitfalls to Avoid in Your Data Protection Strategy
sponsored by Veritas
WHITE PAPER: This white paper uncovers five common, critical pitfalls to avoid when building a data protection strategy. Read on to learn how to navigate through these pitfalls so that your enterprise can implement a data protection solution that eliminates complexity, reduces staff inefficiencies, enables faster decisions, and accelerates your ROI.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

Veritas

New Rules of Data Security Virtual Portal
sponsored by IBM
WHITE PAPER: This portal is your hub for the latest data security strategies and best practices. Watch this series of informative videos to help shed light on the real world implications of data breaches, the importance of ensuring regulatory compliance and how to leverage best breed security solutions.
Posted: 22 Jan 2016 | Published: 09 Dec 2015

IBM

Realizing the Value of Test Data Management
sponsored by CA Technologies.
WHITE PAPER: This paper describes common problems and potential benefits of Test Data Management (TDM) in a testing and development environment. Debunk assumptions that could be holding you back from better TDM, learn why masking production data is not a simple solution, and discover a more efficient and easier TDM policy.
Posted: 18 Jan 2016 | Published: 31 Aug 2015

CA Technologies.

Compliant Calling: How Mobile Industry Regulations Influence Financial Services
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will discover how to enforce the highest standard of call compliance in your enterprise by ensuring mobile calls are recorded and under the control of network administrators. Access this white paper to understand how financial organizations are addressing the challenges of mobile call recording compliance.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

BlackBerry

SSL/TLS Visibility: Determining Your Network Security Blind Spot Cost
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This white paper will assist you in calculating the cost of leaving the SSL/TLS network security blind spot open to hackers and presents strategies to mitigate risks.
Posted: 08 Jan 2016 | Published: 16 Dec 2015

Symantec & Blue Coat Systems

Don't Get Lost in the Cloud: 10 Tips for Protecting Data in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: As organizations embrace more as-a service offerings, data visibility in the cloud becomes foggy. Relying on providers for compliance and protection simply isn't enough, but you shouldn't write off the cloud just yet. This white paper offers 10 tips for protecting data in the cloud to avoid breaches, loss, or theft.
Posted: 07 Jan 2016 | Published: 11 Nov 2015

Symantec & Blue Coat Systems

Stop Attacks Hiding Under the Cover of SSL Encryption
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This brief infographic lays out sobering statistics about encrypted traffic attacks and describes how encrypted traffic management can help mitigate these risks.
Posted: 07 Jan 2016 | Published: 09 Dec 2013

Symantec & Blue Coat Systems

Top 5 Questions Answered on How to Best Protect Your Data in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover the top 5 questions (and answers) you need to consider when crafting your cloud security strategy. The sad truth is there is no silver bullet to keep your data safe, but there are simple steps to keep hackers out. View now to find out what they are.
Posted: 05 Jan 2016 | Published: 18 Nov 2015

Symantec & Blue Coat Systems

Hybrid Storage Arrays: Solution Overview
sponsored by Microsoft
WHITE PAPER: This white paper uncovers a hybrid storage array that automates time-consuming data protection and storage capacity scaling so that you can spend less time tending to your storage infrastructures. Read on to learn the benefits this array can provide for your storage.
Posted: 14 Dec 2015 | Published: 31 Jul 2014

Microsoft

Hybrid Cloud Storage Security Brief
sponsored by Microsoft
WHITE PAPER: This brief white paper explores 4 common scenarios of hybrid cloud security concerns for StorSimple hybrid cloud storage solution and how security measures address these scenarios. Read on to learn more.
Posted: 11 Dec 2015 | Published: 31 Mar 2014

Microsoft

Hybrid Cloud Storage Solution for Unstructured Data
sponsored by Microsoft
WHITE PAPER: This white paper highlights a hybrid cloud storage solution that addresses the complexities of unstructured data commonly associated with file shares. Access now to see how this solution can help you better manage the growth of your unstructured data.
Posted: 07 Dec 2015 | Published: 07 Dec 2015

Microsoft

How Business Continuity Management Can Improve Risk Exposure
sponsored by IBM
WHITE PAPER: This expert resource discusses the key elements that your business continuity strategy needs in order to minimize the cost of security incidents. Read on to discover how to lower the probability of a data breach and reduce the impact if a breach occurs.
Posted: 04 Dec 2015 | Published: 26 Nov 2015

IBM

Predictive Mobile Threat Defense
sponsored by Skycure
WHITE PAPER: This white paper explains the 3 reasons why traditional mobile security approaches can no longer protect users and organizations. Access this resource now to learn how to advance mobile security into a next-gen mobile threat defense to protect networks, apps, and users.
Posted: 03 Dec 2015 | Published: 11 Nov 2015

Skycure

Add Value to your Business with Mobile Working from Any Device, Anytime, Anywhere
sponsored by Vodafone
WHITE PAPER: Access this white paper to learn about a mobility service that allows your employees to work more efficiently and effectively from anytime, anywhere, on any device – without any constraints. You'll also explore the five key features of this strategy.
Posted: 23 Nov 2015 | Published: 23 Nov 2015

Vodafone

Don't Believe the Hype - All Containers are Not Equal
sponsored by Good Technology
WHITE PAPER: This white paper identifies various data leakage vulnerabilities and presents the questions IT needs to ask when choosing a containerization strategy.
Posted: 11 Nov 2015 | Published: 11 Jun 2015

Good Technology
151 - 175 of 1246 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement