IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
26 - 50 of 1500 Matches Previous Page  |  Next Page
Beyond Application Visibility and Control: What an NGFW Must Be
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore the ways in which digital transformation is changing businesses' security, and discover why typical NGFWs that focus primarily on app visibility offer an incomplete approach to threat defense. Read on to employ a NGFW that protects across the entire attack continuum, and integrates with existing security investments.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Next-Generation Firewalls: An Investment Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs; read on now to determine the benefits a truly effective NGFW can deliver, and find a NGFW that will provide actionable indications of compromise to identify malicious activity, and more.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Future-Proofing Storage with Scale-Out Storage Software
sponsored by Red Hat
WHITE PAPER: Discover an open, scale-out storage software solution that allows enterprises to deploy cost-effective, highly available storage without compromising scale or performance. See how this storage architecture can enable your enterprise to easily share and integrate your data without risking security.
Posted: 09 Sep 2016 | Published: 09 Sep 2016

Red Hat

3 Steps to Getting Data Access Governance off Your To Do List
sponsored by STEALTHbits
WHITE PAPER: Data Access Governance (DAG) has been that to-do item IT Security has had for years, but they just kept pushing it aside for other goals. Today, however, there are strategies which can make DAG more approachable. In this free White Paper we are going to break DAG down into 3 steps that you can use to finally check this big one off your list.
Posted: 09 Sep 2016 | Published: 31 Dec 2015

STEALTHbits

Build a Data Access Governance Program to Control Unstructured Data
sponsored by STEALTHbits
WHITE PAPER: Following this 5 step plan will help ensure your organization has its data secured. By the end, you will know how to survey all your organization's data, focus attention where it matters most, get the right stakeholders involved, review and remediate access, and arrive at a working security model to meet both security and compliance needs.
Posted: 09 Sep 2016 | Published: 31 Dec 2015

STEALTHbits

314 Day Battle Plan - The Modern Cybercriminal's Attempt to Stay Undetected
sponsored by Dell SecureWorks
WHITE PAPER: This short infographic gives you an in-depth look at the timeline of the average data breach from penetration to detection. Learn the game plan of a cybercriminal looking to steal your data and prepare a defensive scheme of your own to stop hackers in any phase of the breach lifecycle.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

Dell SecureWorks

NGFW Requirements for SMBs and Distributed Enterprises
sponsored by Cisco Systems, Inc.
WHITE PAPER: Within this informative white paper, you'll discover NGFWs specifically tailored for your SMB as well as distributed enterprises. Learn how to achieve next generation security with advanced threat protection, low TCO, and flexible management.
Posted: 08 Sep 2016 | Published: 01 Aug 2016

Cisco Systems, Inc.

The New Security Paradigm for Digital Government: Securing Data and Assets within an IT Ecosystem that Extends Beyond Agency Walls
sponsored by Unisys
WHITE PAPER: This white paper details why federal agencies are transitioning to digital environments, the new security risks these environments present, and how to protect sensitive information from unauthorized access.
Posted: 06 Sep 2016 | Published: 30 Jun 2016

Unisys

Architecture Overview: SAP HANA with Lenovo System x and NetApp FAS/AFF Systems with NFS
sponsored by SAP/Lenovo/Intel
WHITE PAPER: This document outlines an integrated SAP HANA architecture, built with tailored data center integration, Lenovo servers, and NetApp data storage systems. Read on to utilize this architecture's data protection for business-critical SAP applications; also illustrated are guidelines for implementation, DR, development, and testing.
Posted: 02 Sep 2016 | Published: 31 Mar 2016

SAP/Lenovo/Intel

File Sync and Share with Backup and Recovery Functionality
sponsored by Intermedia
WHITE PAPER: Explore an enterprise file sync and share strategy with additional backup and recovery features to ensure an extra level of file resilience. See how this cost-effective solution can protect your enterprise data against any data-loss case, including both user error and threats to the environment.
Posted: 02 Sep 2016 | Published: 18 Mar 2016

Intermedia

2016 Cost of Data Breach Study United States
sponsored by IBM
WHITE PAPER: This Ponemon Institute Study includes data breach information over the past year from 64 organizations in 16 industry sectors located in the United States.
Posted: 01 Sep 2016 | Published: 01 Jun 2016

IBM

2016 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This Ponemon Institute study encapsulates the results of 383 organizations from 12 countries gathering recent data breach trends and costs of remediation.
Posted: 01 Sep 2016 | Published: 01 Jun 2016

IBM

2016 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This in-depth analysis outlines what IT and security professionals learned from 2015's cyberattacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrophic data loss.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

Trends in SAP Cybersecurity
sponsored by IBM
WHITE PAPER: The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 29 Aug 2016 | Published: 01 Feb 2016

IBM

Help Minimize Impact to Patient Care in the Event of a Disaster
sponsored by McKesson Corporation
WHITE PAPER: Disaster recovery (DR) services can keep your critical patient data and systems safe and accessible with cost-efficient replication and infrastructure recovery for virtual environments. Discover how a DR service can help your health care organization limit disruptions to patient care, reduce infrastructure, storage and staffing costs, and more.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

McKesson Corporation

Tolly Test Report: Evaluating a Web Protection Vendor
sponsored by IBM
WHITE PAPER: In this test report, The Tolly Group evaluates a top web protection vendor to see how they stack up in the highly vulnerable web threat landscape. Learn how you can gain flexible risk-based access with strong authentication capabilities while protecting against a wide range of application exploits.
Posted: 29 Aug 2016 | Published: 01 Jun 2016

IBM

Ransomware Multi-layered Approach
sponsored by TrendMicro
WHITE PAPER: Discover four ways you can prepare your corporate network for ransomware attacks to prevent data and financial losses. Learn how a layered approach to security can minimize your malware risk and educate your users on how exactly ransomware can attack your data.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

TrendMicro

7 Key Challenges to Value-Based Care: Ensuring Patient-Centered Care With Information Management
sponsored by Information Builders
WHITE PAPER: This white paper explores how to address some of the challenges of moving towards value-based healthcare with a strategy for improving the way patient data is collected, managed, and exchanged. Access now to find out more about an integrated approach to master data management, data quality, information management, and more.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Information Builders

5 Ways to Safeguard Sensitive Data from Insider Threats and External Attacks
sponsored by IBM
WHITE PAPER: A modular security strategy that allows you to deploy defense capabilities as you need them is the key to future protection. Discover how you can monitor your entire network continuously to prevent the 5 most harmful occurrences.
Posted: 25 Aug 2016 | Published: 01 Nov 2015

IBM

The Right Backup and Recovery Solution Can be a Business Enabler
sponsored by Veritas
WHITE PAPER: Your data protection strategy needs to deliver the quality and service levels required to enable your digital business. Discover a backup solution built on a converged platform that enables efficient and cost-effective data management that will truly help put your data to good use.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Veritas

Uncovering the Risk of SAP Cyber Breaches
sponsored by Onapsis
WHITE PAPER: The purpose of this Ponemon Institue study is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

Onapsis

Threat Report: Exploitation & Cyberattacks on SAP Business Applications
sponsored by Onapsis
WHITE PAPER: Your SAP applications are under attack. Access this in-depth threat report to learn about a specific vulnerability being actively exploited, the types of SAP systems affected, and how you can mitigate this vulnerability to minimize business risk.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

Onapsis

Frost & Sullivan Best Practices Research: Network Security Forensics
sponsored by RSA
WHITE PAPER: This white paper shows you a comprehensive set of technologies for incident detection and network security forensics that will greatly improve you security posture. Learn how to achieve depth and real-time visibility into the inbound and outbound communications traversing your network.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

RSA

Choosing the Right Public Cloud for Better Data Protection
sponsored by Dell, Inc.
WHITE PAPER: Integrating infrastructure-as-a-service (IaaS) and data protection software can help your enterprise solve the complexity and cost challenges of protecting data. Discover what public cloud capabilities and data protection software capabilities your enterprise should focus on when choosing a solution for your needs.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Dell, Inc.

Protecting Critical Data in Virtual Environments
sponsored by IBM
WHITE PAPER: VMware and Hyper-V admins need to know their data is properly protected, but requirements vary widely, with some VMs managing little or no data and others hosting core business applications. Access this paper to automate data protection for all VM and server environments, and adjust protection as needed.
Posted: 25 Aug 2016 | Published: 31 Dec 2015

IBM
26 - 50 of 1500 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement