IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
26 - 50 of 1247 Matches Previous Page  |  Next Page
The App is the Endpoint
sponsored by Blue Cedar
WHITE PAPER: Uncover 5 fundamental reasons why security leaders are moving away from a device management paradigm and instead are focusing on treating the app as the endpoint.
Posted: 14 Jun 2017 | Published: 31 Dec 2016

Blue Cedar

Information Protection in the Web and Cloud Era
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This white paper explores the challenges associated with protecting data in today's enterprise. Discover how a modern data loss prevention (DLP) strategy , delivered as part of a cloud-based web security gateway, can provide continuous protection of sensitive data.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

Symantec & Blue Coat Systems

Compliance: The 'Privacy By Design' Approach To Secure Personal Data
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how implementing security best practices with "Privacy by Design" built-in will make businesses more prepared while reducing risks and costs. Plus, discover 6 recommendations for organizations that have to comply with GDPR.
Posted: 13 Jun 2017 | Published: 13 Jun 2017

Symantec & Blue Coat Systems

Universal Storage for Data Lakes: An ESG Evaluation
sponsored by Dell EMC and Intel®
WHITE PAPER: This ESG paper challenges the de facto standard of direct-attached storage, and in it you will discover how scale-out NAS mitigates the challenges associated with data lake storage. Read on to see outlined the storage selection criteria for data lakes, which includes in-place analytics, accessibility by multiple app types, and more.
Posted: 06 Jun 2017 | Published: 30 Nov 2017

Dell EMC and Intel®

Solving Fundamental Data Quality Challenges
sponsored by BDNA
WHITE PAPER: Data quality is one of the most important requirements for IT asset management (ITAM) and IT service management (ITSM). Find out what you need to do in the rationalization, refresh, security, automation and planning steps to improve your data quality, and your overall quality of life.
Posted: 01 Jun 2017 | Published: 31 May 2017

BDNA

Transform IT and Reduce Risk With Converged Infrastructure and Availability Software
sponsored by Veeam Software
WHITE PAPER: This white paper discusses how converged infrastructure systems can be leveraged in tandem with availability tools to significantly enhance application availability, improve business agility, simplify IT operational management, lower costs, and mitigate risk.
Posted: 31 May 2017 | Published: 31 May 2017

Veeam Software

Reliable Data Protection Designed for Virtualized Environments
sponsored by Veeam Software
WHITE PAPER: Modernizing your data center can seem overwhelming, especially when you consider the exponential data growth you can expect to realize every year. Access this white paper to learn about data protection and backup for virtualized environments.
Posted: 31 May 2017 | Published: 29 Apr 2016

Veeam Software

Information Protection in the Web and Cloud Era
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Explore a modern approach to data protection in the web and cloud era. Uncover 5 requirements for a modern DLP tool.
Posted: 26 May 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Safe Adoption of Cloud Applications
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Gartner predicts that nearly 40% of enterprise IT application spend will be shifted to cloud versus on-premise by 2020. Access this white paper for major considerations you will need to focus on when looking for cloud app security.
Posted: 26 May 2017 | Published: 26 May 2017

Symantec & Blue Coat Systems

Offline Access Is the Key to Unlocking Mobility's Promise
sponsored by OnBase by Hyland
WHITE PAPER: Discover the importance of incorporating offline capabilities into the business critical apps, platforms, and systems that mobile workers access to execute the key functions of their day-to-day jobs. Find out how to overcome the offline challenge and answer the demand for mobile access with the OnBase ECM offering.
Posted: 24 May 2017 | Published: 24 May 2017

OnBase by Hyland

Managing Machine Data from POS, IoT, Sensors, and Other Data Sources
sponsored by Splunk
WHITE PAPER: This white paper explores how to enhance your big data strategies so that you can derive actionable intelligence from your organization's machine data. Discover how to optimize the value of your machine data from point-of-sales (POS) systems, IoT sensors, smart devices, and more to support analytics and data security.
Posted: 23 May 2017 | Published: 23 May 2017

Splunk

Do You Know Where Your Data Is? Three Common Data Management Problems & How to Fix Them
sponsored by Globalscape
WHITE PAPER: Knowing the location of your data plays a crucial role with keeping it secure. When you find yourself jumping through hoops in order to protect, monitor, or report on your data, then you're not getting the most out of your IT infrastructure. Is your current IT infrastructure helping you—or hurting you? Access this e-book to find out.
Posted: 23 May 2017 | Published: 23 May 2017

Globalscape

Middleware and Operating System Machine Data
sponsored by Splunk
WHITE PAPER: This white paper explores how to enhance your big data strategies so that you can derive actionable intelligence from your organization's machine data. Find out how to optimize the value you get from the machine data created by middleware and OS and support data security, analytics, and more.
Posted: 23 May 2017 | Published: 23 May 2017

Splunk

The Internet of Relevant Things
sponsored by Aruba Networks
WHITE PAPER: The Internet of Things (IoT) term itself can be misleading, so it is important to consider one thing before going into a project: relevancy. Access this white paper to learn how to evaluate your IoT projects for business relevancy and better manage projects with secure networking without compromising usability.
Posted: 17 May 2017 | Published: 18 Jan 2017

Aruba Networks

5-Step Data Quality Framework For Data In Motion
sponsored by Infogix
WHITE PAPER: 6 out of 10 users don't trust their data – and this is all the more strengthened when data is flowing through a myriad of systems prior to analysis. The truth is, if your data is in motion, you may have data quality issues. Learn a 5-step data quality framework for data in motion.
Posted: 15 May 2017 | Published: 15 May 2017

Infogix

4 Mobile Security Insights for CISOs
sponsored by Lookout
WHITE PAPER: Discover the four mobile security insights that you must know, about reducing mobile risks and the business value associated with fast remediation of mobile security incidents.
Posted: 12 May 2017 | Published: 12 May 2017

Lookout

Bracing for Digital Disruption: What the CIO Needs to Know
sponsored by Infor
WHITE PAPER: This white paper is the CIO's strategy guide to bracing for digital disruption. Learn how to shepherd the launch of new implementations and step into the future with confidence.
Posted: 10 May 2017 | Published: 28 Feb 2017

Infor

Citrix ShareFile eases IT migration to Windows 10®
sponsored by Citrix
WHITE PAPER: Access this white paper to discover a technology that eases OS migrations making future updates simpler. And, find out how the technology allows user data to be freed from devices, protected from overwrites and under your control.
Posted: 09 May 2017 | Published: 09 May 2017

Citrix

Hybrid Cloud & Data Fabric For Dummies
sponsored by NetApp
WHITE PAPER: Hybrid clouds are seeing a growth in adoption rates, but we're also seeing data management challenges arise. This guide explores these challenges to the hybrid cloud model and how a data fabric addresses them.
Posted: 09 May 2017 | Published: 31 Dec 2015

NetApp

MobileIron and iOS: The Security Backbone for the Modern Enterprise
sponsored by MobileIron
WHITE PAPER: Download this white paper to discover an EMM solution that provides a comprehensive platform that protects enterprise information wherever it lives: in the datacenter, in the cloud, in mobile apps, on mobile devices, and in motion between them.
Posted: 09 May 2017 | Published: 09 May 2017

MobileIron

The Developer's Guide to the DevSecOps Galaxy
sponsored by Veracode, Inc.
WHITE PAPER: Bringing developers and operations staff together under the singular DevOps roof means trying to mesh contradictory approaches, leaving open security concerns. DevSecOps to the rescue! Access this white paper to learn about DevSecOps challenges, best practices, and more!
Posted: 03 May 2017 | Published: 03 May 2017

Veracode, Inc.

Beware the Beastly Threats of IT security
sponsored by Lenovo
WHITE PAPER: It's essential that IT professionals have the right tools to build safeguards against them as battling threats is more critical for organizations than ever— in dollars and in brand reputation. This eBook explores 6 beastly threats scratching at the perimeter of your company's computers and IT networks, and where these threats are trending.
Posted: 01 May 2017 | Published: 01 May 2017

Lenovo

Unified Data Protection Vendor Comparison
sponsored by Veritas
WHITE PAPER: The digital transformation of business requires enterprise data management that delivers protection, availability and insights. See how Veritas and NetBackup provide the easy foundation for enterprise data management. Download this document to learn how Veritas compares to other vendors in the field.
Posted: 27 Apr 2017 | Published: 30 Dec 2016

Veritas

Vendor Comparison Based on Top 8 Data Protection Needs
sponsored by Veritas
WHITE PAPER: NetBackup unified data protection protects all data no matter where it lives: virtual, physical or in the cloud. See how NetBackup provides scale, performance and extensive workload integration from a single console.Download this document to learn how Veritas compares to other vendors in the field.
Posted: 27 Apr 2017 | Published: 31 Oct 2016

Veritas

Why Organizations Still Struggle to Digitally Transform & Innovate
sponsored by TechData - Veeam
WHITE PAPER: Over 80% of enterprises deal with a data availability gap. Do you know how many millions that gap is costing you? Access this white paper to learn how to close the availability and protection gaps, quantify your availability goals, see how these challenges are impacting your digital transformation strategies, and more.
Posted: 09 May 2017 | Published: 09 May 2017

26 - 50 of 1247 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement