IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
151 - 175 of 1256 Matches Previous Page  |  Next Page
Changing the Economics of Long Term Data Retention and Archiving with LTO
sponsored by LTO
WHITE PAPER: This product specification sheet highlights LTO Ultrium format, a powerful, scalable, adaptable open tape format that can help address the growing demands of data protection. Access now to see how your enterprise can benefit from implementing LTO into your tiered storage management plan.
Posted: 22 Feb 2016 | Published: 14 Sep 2015

LTO

LTO for the Next Generation Data Center
sponsored by LTO
WHITE PAPER: This white paper uncovers the misconception that tape is unreliable and slow and highlights how LTO technology can be used to meet the performance needs of the most demanding streaming workloads. Access now to explore LTO tape's new features and use cases including linear tape file system, tape-as-NAS, deep and active archiving, and more.
Posted: 18 Feb 2016 | Published: 30 Nov 2015

LTO

Accelerating Big Data Collection and DataFlow Management
sponsored by Hortonworks
WHITE PAPER: This white paper highlights a data management platform that combines data acquisition, simple event processing, and transport and delivery to accommodate highly diverse and complicated dataflow. Tap into how you can enable your enterprise to simplify your big data ingestion and increase security for data collection and sharing.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Hortonworks

The Security Performance of 6 Key Industries
sponsored by BitSight
WHITE PAPER: Discover the security performance of six key industry sectors, how they prepare for cyberattacks, and the commonalities of their experiences in defending their data.
Posted: 02 Feb 2016 | Published: 30 Sep 2015

BitSight

40 Questions You Should Have in Your Vendor Security Assessment
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn how to get started with your VRM security program and by accessing the most important questions to ask third-party businesses.
Posted: 02 Feb 2016 | Published: 30 Apr 2014

BitSight

5 Ways Your Vendor Risk Management Program Leaves You in the Dark
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn the steps it takes to protect your data and implement a solid vender risk management (VRM) program.
Posted: 29 Jan 2016 | Published: 02 Dec 2015

BitSight

AWS & Alert Logic Case Study
sponsored by Alert Logic
WHITE PAPER: This case study shows you the results of Concep and how they gained comprehensive network threat and intrusion detection capabilities.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Alert Logic

7 Best Practices of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper give you steps you should take and point of interest you should review in your network security.
Posted: 17 Feb 2016 | Published: 27 Jan 2016

Alert Logic

A Guide to Easing Your Big Data and Hadoop Management
sponsored by Rackspace
WHITE PAPER: In this white paper, you will discover how to reap the benefits of big data without getting bogged down in deployment, optimization and maintenance challenges—by utilizing a big data management platform. Read on key into Hadoop management challenges and how to overcome them.
Posted: 17 Feb 2016 | Published: 17 Feb 2016

Rackspace

Simplify Data Management and Monitoring
sponsored by Quantum Corporation
WHITE PAPER: This white paper highlights a deduplication backup appliance that reduces OPEX, management time, and unpredictability associated with other backup appliances and self-monitoring tools. Access now to see how this appliance can enable your enterprise to improve your data management with active monitoring, reliability, and speedy resolution time.
Posted: 16 Feb 2016 | Published: 31 Jul 2014

Quantum Corporation

Artico NAS Storage Appliance: Improve Access to More Data
sponsored by Quantum Corporation
WHITE PAPER: This white paper discusses how a NAS archiving solution with policy-based tiering to cloud, object storage, and tape can alleviate archive data management challenges and improve the efficiency of backup storage. Read on to see how this solution can lower costs of storing more data, automate data preservation and protection, and more.
Posted: 16 Feb 2016 | Published: 31 Jan 2016

Quantum Corporation

Maximize Performance and Availability at the Lowest TCO for Your Virtual Environment
sponsored by Quantum Corporation
WHITE PAPER: This brief white paper highlights a storage solution that can efficiently protect data in virtual environments with high-performance deduplication and hybrid flash storage. Read on to see how this solution can enable your enterprise to maximize performance and availability and lower your TCO in your virtual environment.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

Quantum Corporation

Trade up Your Aging Primary Storage Systems With Hybrid Storage
sponsored by Quantum Corporation
WHITE PAPER: In this brief white paper, discover a hybrid storage solution with real-time tiering. Learn how this storage system can provide your enterprise with robust data management, effective data protection, and the ability to expand seamlessly.
Posted: 16 Feb 2016 | Published: 31 Jan 2016

Quantum Corporation

Maximize Performance and Data Availability for Virtualized Environments
sponsored by Quantum Corporation
WHITE PAPER: This brief whitepaper highlights a backup and restoration software combined with a tiered storage infrastructure that allows the use of any combination of disk, cloud, or tape for data protection. Read on to see the benefits these technologies can provide to your enterprise, including maximized data availability, faster data recovery, and more.
Posted: 12 Feb 2016 | Published: 31 Jan 2016

Quantum Corporation

Protect Privileged Credentials Across Traditional and Virtual Data Centers, and all Cloud Environments
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights a solution for privileged credential management that reduces IT risk and drives operational efficiency by supporting traditional, virtualized, and hybrid-cloud infrastructures. Access now to discover how your enterprise can protect and manage all of its credentials.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

CA Technologies.

The Business Value of Integrated Backup Appliances
sponsored by Veritas
WHITE PAPER: This white paper explores integrated backup appliances that enable efficient, storage-optimized data protection for data centers, remote offices, and virtual environments. Read on and learn how these appliances can simplify your enterprise's backup and deduplication strategy and maximize your IT staff time, operations, and storage investment.
Posted: 27 Jan 2016 | Published: 31 Aug 2015

Veritas

Transform Backup to Transform Your Business
sponsored by Veritas
WHITE PAPER: This detailed white paper highlights a backup and recovery software that protects a variety of platforms, applications, and infrastructures. Discover how this software can integrate with your infrastructure to provide your enterprise with reliable, consistent data protection and keep your storage secure.
Posted: 27 Jan 2016 | Published: 31 Aug 2015

Veritas

Delivering More Efficiency and Productivity With Modernized Data Protection
sponsored by HPE and Veeam
WHITE PAPER: This white paper teaches you about new, hyper-converged solutions, based on virtualization software that can transform your data center. Gain a more cost efficient solution with a smaller management footprint.
Posted: 27 Jan 2016 | Published: 30 Sep 2014

HPE and Veeam

Network protection: The untold story
sponsored by IBM
WHITE PAPER: This white paper explores the growing need for next-generation network protection, focusing on the advances that can help combat today’s advanced threats. It introduces how you can gain the critical insight, visibility and control you need to protect the network against emerging threats and targeted attacks.
Posted: 25 Jan 2016 | Published: 16 Sep 2015

IBM

Forward Thinking Backup: Data Protection for the Digital Business
sponsored by HDS and Veritas
WHITE PAPER: This white paper discusses the challenges of protecting data in today's digital world and highlights a converged backup and recovery platform with scalable storage appliances that enable cost savings and simplified management. Access now to see the benefits this platform can provide, including instant data recovery, cloud integration, and more.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

HDS and Veritas

Top 5 Pitfalls to Avoid in Your Data Protection Strategy
sponsored by Veritas
WHITE PAPER: This white paper uncovers five common, critical pitfalls to avoid when building a data protection strategy. Read on to learn how to navigate through these pitfalls so that your enterprise can implement a data protection solution that eliminates complexity, reduces staff inefficiencies, enables faster decisions, and accelerates your ROI.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

Veritas

New Rules of Data Security Virtual Portal
sponsored by IBM
WHITE PAPER: This portal is your hub for the latest data security strategies and best practices. Watch this series of informative videos to help shed light on the real world implications of data breaches, the importance of ensuring regulatory compliance and how to leverage best breed security solutions.
Posted: 22 Jan 2016 | Published: 09 Dec 2015

IBM

Realizing the Value of Test Data Management
sponsored by CA Technologies.
WHITE PAPER: This paper describes common problems and potential benefits of Test Data Management (TDM) in a testing and development environment. Debunk assumptions that could be holding you back from better TDM, learn why masking production data is not a simple solution, and discover a more efficient and easier TDM policy.
Posted: 18 Jan 2016 | Published: 31 Aug 2015

CA Technologies.

Compliant Calling: How Mobile Industry Regulations Influence Financial Services
sponsored by BlackBerry
WHITE PAPER: In this white paper, you will discover how to enforce the highest standard of call compliance in your enterprise by ensuring mobile calls are recorded and under the control of network administrators. Access this white paper to understand how financial organizations are addressing the challenges of mobile call recording compliance.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

BlackBerry

SSL/TLS Visibility: Determining Your Network Security Blind Spot Cost
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This white paper will assist you in calculating the cost of leaving the SSL/TLS network security blind spot open to hackers and presents strategies to mitigate risks.
Posted: 08 Jan 2016 | Published: 16 Dec 2015

Symantec & Blue Coat Systems
151 - 175 of 1256 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement