IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
151 - 175 of 1264 Matches Previous Page  |  Next Page
Covering the Security Aspect of Software Asset Management
sponsored by Snow Software
WHITE PAPER: Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.
Posted: 14 Mar 2016 | Published: 09 Dec 2015

Snow Software

The Role of SAM in Information Security
sponsored by Snow Software
WHITE PAPER: Software asset management (SAM) provides an organization not just with the resources it needs to generate audit and reconciliation reports, but also to support information security initiatives. Learn ways information security can be more effectively addressed with the aid of SAM.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

Snow Software

Maximizing Tape Capacities with LTO-7 Technology
sponsored by LTO
WHITE PAPER: In this brief white paper, discover how you can successfully manage and protect your data growth with LTO-7 technology. With LTO-7, your enterprise can benefit from improved capacity, performance, compatibility, interchange and cost control in an open format.
Posted: 23 Feb 2016 | Published: 23 Feb 2016

LTO

Changing the Economics of Long Term Data Retention and Archiving with LTO
sponsored by LTO
WHITE PAPER: This product specification sheet highlights LTO Ultrium format, a powerful, scalable, adaptable open tape format that can help address the growing demands of data protection. Access now to see how your enterprise can benefit from implementing LTO into your tiered storage management plan.
Posted: 22 Feb 2016 | Published: 14 Sep 2015

LTO

LTO for the Next Generation Data Center
sponsored by LTO
WHITE PAPER: This white paper uncovers the misconception that tape is unreliable and slow and highlights how LTO technology can be used to meet the performance needs of the most demanding streaming workloads. Access now to explore LTO tape's new features and use cases including linear tape file system, tape-as-NAS, deep and active archiving, and more.
Posted: 18 Feb 2016 | Published: 30 Nov 2015

LTO

Next-Generation IPS in the Era of Targeted Attacks
sponsored by IBM
WHITE PAPER: This white paper talks about the future of IPS and gives you statistics from the current IPS market. Access now to learn about the features, capabilitie, costs and impacts of next-generation IPS and the future of cyberattacks in general.
Posted: 21 Apr 2016 | Published: 01 Jan 2016

IBM

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: This white paper teaches you about managed file transfer and how it can help you meet increasing customer demands. Access now and learn how to create seamless customer experiences across your value chain and synchronize your business to become more secure, compliant and efficient.
Posted: 14 Apr 2016 | Published: 31 Dec 2013

IBM

Future Proof your Data Storage with the Hybrid Cloud
sponsored by Equinix
WHITE PAPER: This white paper highlights one hybrid cloud platform with customizable end-to-end data center and cloud storage solutions. Read on and discover how this solution can provide your enterprise with secure storage for your mission-critical data and simplified backup and archiving.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

Equinix

Cyber Liability: Risks, Ramifications, and Mitigation
sponsored by eSentire
WHITE PAPER: Find out how you can better defend your organization against external attack and limit exposure by reducing your attack profile available to attackers by accessing this resource.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

eSentire

Replacing Antivirus, and Doing it Right: A CISO Response
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper shows you how to successfully execute a complete antivirus replacement. Access now and learn how to make a daunting task into a simple project with the right careful planning, frequent communication and stakeholder buy-in.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

Backup Appliance vs. Build Your Own Media Server
sponsored by Veritas
WHITE PAPER: In this brief data sheet, learn about a backup appliance that eliminates the cumbersome tasks of acquisition, installation and integration, administration, patch and upgrades, and support. With this purpose-build backup appliance, your enterprise can save time and money and eliminate the complexity of building your own backup solution.
Posted: 09 Mar 2016 | Published: 31 Dec 2015

Veritas

Why Converged Backup Platforms is Your Key to Scalability
sponsored by Veritas
WHITE PAPER: This white paper pits one converged backup platform against other competitors, comparing VADP performance results, storage-array snapshots-based backup, and concurrent application restores. Read on to see how this solution can lower your total backup costs and improve your overall backup performance.
Posted: 08 Mar 2016 | Published: 31 Oct 2015

Veritas

Reducing Cost and Complexity: 7 Reasons Why Backup Appliances Improve your Infrastructure
sponsored by Veritas
WHITE PAPER: This white paper discusses an integrated backup and recovery appliance that simplifies management by eliminating tedious server maintenance and enabling faster, cost-efficient backup. Read on to see the ways in which this appliance can benefit your enterprise, including fast performance and scalability, end-to-end deduplication, and more.
Posted: 08 Mar 2016 | Published: 31 Oct 2015

Veritas

IBM Spectrum Protect: Simplified Data Protection for the Modern Enterprise
sponsored by IBM
WHITE PAPER: This lab report tests an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Read on to see how this solution can enhance your enterprise's data protection by enabling software-defined storage environments, mitigating the risk of data loss, reducing the total cost of data protection, and more.
Posted: 08 Mar 2016 | Published: 31 Dec 2015

IBM

The Value of Protecting Data in General, and Encrypting It in Particular
sponsored by IBM
WHITE PAPER: This white paper highlights a software-defined storage solution with built-in encryption capabilities that provides a single point of control for encryption throughout the storage layer. Read on and see how this solution can enhance your storage hardware offerings, ease management, and improve your data protection.
Posted: 07 Mar 2016 | Published: 31 Oct 2015

IBM

Backup More, Store Less, Perform Better: Dell Data Protection
sponsored by DellEMC and Intel®
WHITE PAPER: This datasheet highlights Dell's data protection series with backup and recovery appliances as well as built-in, variable, block-based deduplication and compression. Read on to see the how these solutions can enable your enterprise to trim your storage and data protection costs and benefit from scalability, management simplicity, and more.
Posted: 01 Mar 2016 | Published: 01 Mar 2016

DellEMC and Intel®

Transcript: Protecting Your Crown Jewels from Devastating Data Breaches
sponsored by Lancope
WHITE PAPER: Gain deeper visibility into your network using anomaly detection alongside compliance/segmentation monitoring. Identify advanced attacks and protect the crown jewels on your network.
Posted: 25 Feb 2016 | Published: 27 Jan 2016

Lancope

Understanding the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper outlines your responsibilities in managing your data in your cloud and gives you seven best practices to keep it secure.
Posted: 22 Feb 2016 | Published: 30 Dec 2015

Alert Logic

AWS & Alert Logic Case Study
sponsored by Alert Logic
WHITE PAPER: This case study shows you the results of Concep and how they gained comprehensive network threat and intrusion detection capabilities.
Posted: 17 Feb 2016 | Published: 31 Dec 2015

Alert Logic

7 Best Practices of Cloud Security
sponsored by Alert Logic
WHITE PAPER: This white paper give you steps you should take and point of interest you should review in your network security.
Posted: 17 Feb 2016 | Published: 27 Jan 2016

Alert Logic

A Guide to Easing Your Big Data and Hadoop Management
sponsored by Rackspace
WHITE PAPER: In this white paper, you will discover how to reap the benefits of big data without getting bogged down in deployment, optimization and maintenance challenges—by utilizing a big data management platform. Read on key into Hadoop management challenges and how to overcome them.
Posted: 17 Feb 2016 | Published: 17 Feb 2016

Rackspace

Simplify Data Management and Monitoring
sponsored by Quantum Corporation
WHITE PAPER: This white paper highlights a deduplication backup appliance that reduces OPEX, management time, and unpredictability associated with other backup appliances and self-monitoring tools. Access now to see how this appliance can enable your enterprise to improve your data management with active monitoring, reliability, and speedy resolution time.
Posted: 16 Feb 2016 | Published: 31 Jul 2014

Quantum Corporation

Artico NAS Storage Appliance: Improve Access to More Data
sponsored by Quantum Corporation
WHITE PAPER: This white paper discusses how a NAS archiving solution with policy-based tiering to cloud, object storage, and tape can alleviate archive data management challenges and improve the efficiency of backup storage. Read on to see how this solution can lower costs of storing more data, automate data preservation and protection, and more.
Posted: 16 Feb 2016 | Published: 31 Jan 2016

Quantum Corporation

Maximize Performance and Availability at the Lowest TCO for Your Virtual Environment
sponsored by Quantum Corporation
WHITE PAPER: This brief white paper highlights a storage solution that can efficiently protect data in virtual environments with high-performance deduplication and hybrid flash storage. Read on to see how this solution can enable your enterprise to maximize performance and availability and lower your TCO in your virtual environment.
Posted: 16 Feb 2016 | Published: 31 Dec 2015

Quantum Corporation

Trade up Your Aging Primary Storage Systems With Hybrid Storage
sponsored by Quantum Corporation
WHITE PAPER: In this brief white paper, discover a hybrid storage solution with real-time tiering. Learn how this storage system can provide your enterprise with robust data management, effective data protection, and the ability to expand seamlessly.
Posted: 16 Feb 2016 | Published: 31 Jan 2016

Quantum Corporation
151 - 175 of 1264 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement