IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
26 - 50 of 1321 Matches Previous Page  |  Next Page
Hybrid Storage for Backup and Data Protection
sponsored by Quantum Corporation
WHITE PAPER: This white paper introduces the convenience and flexibility of using hybrid storage for your data backups.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Quantum Corporation

Strong Authentication for Secure Employee Access
sponsored by SafeNet, Inc.
WHITE PAPER: This white paper describes how to enable two-factor authentication to all users and resources using a single automated backend—either from the cloud or on-premises. Download now to see how your organization could benefit from strong authentication.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

Strong Authentication: Securing Identities and Enabling Productivity
sponsored by SafeNet, Inc.
WHITE PAPER: Access this informative white paper to learn how strong authentication methods like USB tokens and smart cards are helping organizations to stay ahead of the security curve.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

SafeNet, Inc.

Solutions enhance compliant digital identity protection for healthcare
sponsored by VASCO Data Security International
WHITE PAPER: Learn the key building blocks of a secure, compliant healthcare system, and how to solve security problems such as identity proofing, HIPAA and HITECH Act compliance, secure access to data, and more.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

VASCO Data Security International

Urgency Grows for Automated Archiving Capabilities
sponsored by Commvault
WHITE PAPER: This white paper outlines the importance for automated archiving, and how it can help reduce the resources used to manage data. Read on to learn about what options organizations are considering for archiving, and why archiving should be incorporated into a comprehensive, enterprise-wide information management framework.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

Commvault

What You Need to Know Now About Next Generation Data Protection Architecture
sponsored by arcserve
WHITE PAPER: This white paper walks you through the driving forces behind rapidly evolving data protection architectures, the trends you'll want to keep an eye on, and more.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

arcserve

Data Sovereignty and the Cloud
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper discusses the complex issue of achieving data sovereignty without sacrificing the benefits of the cloud.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

IntraLinks, Inc

Five Fundamentals of Virtual Server Protection
sponsored by Commvault
WHITE PAPER: Server virtualization has its benefits – and consequences. Learn how to deal with storage and preservation problems that can arise, and how to revamp your data protection strategy.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

Commvault

Case Study: Strong Authentication Provides Intellectual Property Security
sponsored by SafeNet, Inc.
WHITE PAPER: This case study describes how outerwear company O'Neill adopted a new authentication solution to heighten the security of its valuable intellectual property.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

SafeNet, Inc.

Safeguarding Access in the Distributed Network
sponsored by HID
WHITE PAPER: This white paper introduces a method of identity management that will safeguard any access point, even mobile and virtual ones.
Posted: 18 Aug 2015 | Published: 12 Feb 2013

HID

Authentication That Keeps Your Mobile Devices Secure
sponsored by HID
WHITE PAPER: This white paper introduces a way for you to boost mobile security by enhancing your authentication practices.
Posted: 18 Aug 2015 | Published: 20 Feb 2013

HID

Securing the Cloud
sponsored by Symantec Corporation
WHITE PAPER: Download this white paper to learn how to successfully secure your enterprise in the cloud and see why this is important for customer retention.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Symantec Corporation

Content Is the New Perimeter: The Security and Regulatory Drivers for IRM
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper discusses the challenges of securing digital information, even when that information resides outside the perimeter.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

IntraLinks, Inc

The State Of Data Security: 2014 Through 2015
sponsored by Digital Guardian
WHITE PAPER: In this webinar transcript, a Forrester researcher discusses the state of data security, how things have changed in the past year, and what can be done going forward.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Digital Guardian

Secure Remote Data Collection for Better Data Use
sponsored by Splunk
WHITE PAPER: This white paper describes how a secure method of remote data collection can enable your enterprise to better analyze and leverage all the data in your network, not just the data generated in a central location.
Posted: 17 Aug 2015 | Published: 31 Dec 2014

Splunk

Managing Threats and Remediating Risk for State of Vermont Applications
sponsored by Core Security Technologies
WHITE PAPER: In this case study, the Vermont state government struggles to detect and mitigate all vulnerabilities in the applications that handle its sensitive data.
Posted: 17 Aug 2015 | Published: 17 Aug 2015

Core Security Technologies

Adapt Your Security to Today's Threats
sponsored by Digital Guardian
WHITE PAPER: This white paper discusses why changes in security strategies are necessary and how you can make these changes.
Posted: 14 Aug 2015 | Published: 14 Aug 2015

Digital Guardian

Keeping Your Data Safe: Protecting Corporate Information in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: This white paper explores the challenges of securing data in the cloud. Continue reading to explore the strategies that have worked for other organizations; the issues presented by human error; and more.
Posted: 14 Aug 2015 | Published: 05 Aug 2015

Symantec Corporation

Big Data SIEM on the Horizon
sponsored by Splunk
WHITE PAPER: In this white paper, you will learn the three SIEM trends that call for a big data SIEM approach as well as the limitations of traditional SIEM strategies.
Posted: 12 Aug 2015 | Published: 05 Aug 2015

Splunk

Fraud Detection for All of Your Data
sponsored by Splunk
WHITE PAPER: This white paper discusses how you can adopt an anti-fraud strategy that protects all your data, even unstructured data and big data.
Posted: 12 Aug 2015 | Published: 31 Dec 2014

Splunk

Mobile File Sharing: Balancing Productivity, Security, and Control
sponsored by Acronis
WHITE PAPER: This white paper describes what users look for in an EFSS solution, including the top five corporate EFSS security requirements. Read on to learn about a solution that enables organizations to keep employees productive while meeting IT security and compliance requirements.
Posted: 11 Aug 2015 | Published: 29 May 2015

Acronis

Data Breaches: What Can and Cannot Be Done
sponsored by Global Knowledge
WHITE PAPER: This white paper discusses the inevitability of data breaches and gives tips for staying as secure as possible in an insecure threat environment.
Posted: 11 Aug 2015 | Published: 11 Aug 2015

Global Knowledge

The Data Loss Prevention Market by the Numbers
sponsored by Digital Guardian
WHITE PAPER: This research report reveals the just how much the data loss prevention (DLP) market has grown in the wake of recent data breaches, and how organizations are incorporating it into a holistic data security strategy.
Posted: 07 Aug 2015 | Published: 07 Aug 2015

Digital Guardian

Case Study: Four Organizations Enable Productivity for Remote Employees
sponsored by Citrix
WHITE PAPER: In this white paper, you'll discover possibilities for providing remote access to centrally hosted company data. Learn how to gain positive outcomes when you enable users to access and share data from anywhere in a secure fashion.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Citrix

Data protection: Time-Proven Truths for Your Virtual World
sponsored by Datalink
WHITE PAPER: This white paper presents four steps you can take to make the right data protection and backup decisions for your environment.
Posted: 06 Aug 2015 | Published: 06 Aug 2015

Datalink
26 - 50 of 1321 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement