IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
26 - 50 of 1250 Matches Previous Page  |  Next Page
How Transactional Analytics is Enabling Digital Payments Transformation
sponsored by Aerospike
WHITE PAPER: Learn how transactional analytics can help you keep up with the rapid changes wrought on eCommerce by technologies like mobile payment apps and non-banking payment service providers (FinTech). Discover how to leverage a database with a hybrid memory architecture and machine learning to transform digital payments.
Posted: 20 Apr 2017 | Published: 20 Apr 2017


How Eurostar Managed Their Mobile Data, Increased Productivity & Reduced Cost
sponsored by Wandera
WHITE PAPER: Eurostar needed its mobile workforce to have access to the tools and data required for work while managing the associated costs. Being an international company, employees were travelling abroad on a daily basis so data roaming bills were excessive. Learn how they reduced bills by 40%, increased roaming productivity, and more.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

Wandera

Building Trust in a Cloudy Sky Executive Summary
sponsored by McAfee, Inc.
WHITE PAPER: Over 90% of organizations worldwide are leveraging cloud services and – faced with a growing skills gap and increasingly advanced threats – can cybersecurity strategies keep up with the demands of the cloud? Uncover the findings of a survey of over 2,000 IT pros to learn about protecting sensitive data and apps in the cloud.
Posted: 11 Apr 2017 | Published: 31 Jan 2017

McAfee, Inc.

Fourth Generation Data Leak Prevention
sponsored by Ghangor Cloud
WHITE PAPER: In this white paper, learn what you need to know about the 4th generation of data leak prevention solutions.
Posted: 05 Apr 2017 | Published: 31 Jan 2017

Ghangor Cloud

Don't Settle, Choose the Best Mobile Security Platform for Your Mobile Transformation
sponsored by MobileIron
WHITE PAPER: This white paper explores how to leverage a modern, scalable EMM platform to bolster your mobile security strategy. Access a comparison guide between AirWatch and MobileIron and learn how to enhance your strategy for securing all things mobile, from apps to emails and beyond.
Posted: 05 Apr 2017 | Published: 31 Dec 2016

MobileIron

Data Governance: Embracing Security and Privacy
sponsored by Tealium
WHITE PAPER: With proper analysis and planning, you can minimize risk, build trust, and protect your brand. This white paper discusses steps to take for building an effective data governance strategy.
Posted: 21 Mar 2017 | Published: 21 Mar 2017

Tealium

5 Steps To Defining Your Data Retention Policies
sponsored by Iron Mountain
WHITE PAPER: Not having a strong data retention plan could end up not only costing you storage space, but could also harm your bottom line. Use this blog post to help you outline your data retention policies in five simple steps.
Posted: 17 Mar 2017 | Published: 13 Jan 2016

Iron Mountain

Digital Innovations and Changing Demographics are Redefining Government by the People, for the People
sponsored by HPE and Intel®
WHITE PAPER: Access this paper to learn about communicating with the different generations of people and how you'll have to handle your data. Learn how to find the right mix of traditional IT, cloud, security and mobility to provide the greatest service possible.
Posted: 07 Mar 2017 | Published: 30 Dec 2016

HPE and Intel®

Ransomware: Everything You Need to Know
sponsored by Cisco Systems, Inc.
WHITE PAPER: Learn about ransomware and the different ways it can attack your systems. Find out how to foil ransomware attacks with disaster recovery strategies, respond to an ongoing ransomware attack, recover from attacks that have already entered your system, and more.
Posted: 01 Mar 2017 | Published: 30 Sep 2016

Cisco Systems, Inc.

Data Protection & Privacy: Next Steps and 5 Best Practices
sponsored by HPE and Intel®
WHITE PAPER: The internet and data privacy laws have been on a collision course for some time now – and it's accelerated by digital transformation sweeping across companies. Inside, explore the challenges that global businesses face when confronting the policy environment, and find 5 best practices to help you meet evolving data privacy and security demands.
Posted: 28 Feb 2017 | Published: 28 Feb 2017

HPE and Intel®

Digital Remote Monitoring and How it Changes Data Center Operations and Maintenance
sponsored by APC by Schneider Electric
WHITE PAPER: A lot happens in 10 years, and data center remote monitoring services have come a long way. Access this white paper to learn about digital remote monitoring services, how they support your data center and mobile technologies, and why it's time to replace any lingering offline monitoring.
Posted: 28 Feb 2017 | Published: 30 Dec 2016

APC by Schneider Electric

Secure Information Exchange in the Digital Age
sponsored by OpenText
WHITE PAPER: Forrester Senior Analyst Heidi Shey answers five questions regarding secure information exchange (SIE) and discusses how digital transformations are changing the way that IT decision-makers have to approach SIE in the digital age.
Posted: 27 Feb 2017 | Published: 31 Jan 2017

OpenText

Your Data on the Move: Taking Back Control of Your Most Precious Asset
sponsored by Globalscape
WHITE PAPER: This white paper examines some of the risk factors organizations face when managing their data and explores best practices for conducting risk assessments. Read on to learn about 3 main risk factors threatening your organization, 3 signs you've lost control of your data, 4 steps to regaining control over your data, and more.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Globalscape

Disaster Recovery Guide: DR in Virtualized Environments
sponsored by Macquarie Cloud Services
WHITE PAPER: Download this essential DR guide to gain insight into the challenges, needs, strategies, and available solutions for disaster recovery and business continuity in 2017, especially for modern, virtualized environments and the public cloud. Additionally, view a BD/DR technology comparison, and fully automated replication architecture.
Posted: 27 Feb 2017 | Published: 27 Feb 2017

Macquarie Cloud Services

Accelerating Your BDR: 7 Ways to Turn Your Turtle into a Cheetah
sponsored by QuorumLabs Inc.
WHITE PAPER: Discover 7 ways you can accelerate your backup and disaster recovery and stay ahead of your competitors.
Posted: 02 Feb 2017 | Published: 02 Feb 2017

QuorumLabs Inc.

Raiders of the Lost File Shares: Defending Enterprise Data Against Destructive Malware
sponsored by BlackBerry
WHITE PAPER: With destructive malware ravaging the networks of governments, Aramco, Sands Corporation, and Sony Pictures, you need to adjust your tactics to ensure your continued safety. In this white paper, discover a deeper look at these recent attacks and potential countermeasures to thwart them.
Posted: 23 Jan 2017 | Published: 17 Oct 2016

BlackBerry

The 5 Rings of Data Integration Hell Impacting Your Security
sponsored by Globalscape
WHITE PAPER: In this guide discover the 5 "rings of hell" that make meeting data integration requirements difficult and threaten the security of your data. Learn about the various scenarios which can cause data integration challenges, methods for data migration worth considering, and more.
Posted: 11 Jan 2017 | Published: 31 Dec 2016

Globalscape

How The US Navy Helped Transform Today's BDR Market
sponsored by QuorumLabs Inc.
WHITE PAPER: This white paper explains how the US Navy helped transform today's BDR market. Discover an agnostic solution that fits into any environment to provide backup and disaster recovery capabilities that now offers the fastest recovery in the market, as well as the easiest backups.
Posted: 10 Jan 2017 | Published: 10 Jan 2017

QuorumLabs Inc.

Best Practices for Enterprise Security
sponsored by Citrix
WHITE PAPER: The modern enterprise workforce calls for deep, comprehensive security to keep data protected no matter how people work. Discover best practices for securing your modern workforce, which include network security, access management, app security, and monitoring and response.
Posted: 21 Dec 2016 | Published: 30 Nov 2016

Citrix

The Essential Guide Data Protection and Disaster Recovery
sponsored by Tintri
WHITE PAPER: Download this guide to understand the must-have storage features that are essential to modern DP and DR practices;provided are specific guidelines on what to look for, how to strategize DR in your organization, and more.
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Tintri

EMM Real Benefits in Today's Mobile World
sponsored by vmware airwatch
WHITE PAPER: The economy isn't standing still. For your business to succeed, your employees shouldn't either. This eBook relays the importance of unifying your infrastructure to deliver apps effectively across multiple devices. Learn how to stay on top of security and consistency with enterprise mobility management.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

Five Key Indicators that You Need to Adopt EMM Now
sponsored by vmware airwatch
WHITE PAPER: How do you know if your organization is ready to make the move to enterprise mobility management (EMM)? Read this white paper to determine if it is the right time to adopt EMM, especially if your organization experiences: Increased need for security and compliance, device expansion or rapid growth.
Posted: 08 Mar 2017 | Published: 08 Mar 2017

vmware airwatch

The Massive Mobile Migration
sponsored by IBM
WHITE PAPER: The move to mobile devices, data and apps to make work happen anytime, anywhere is continuing to experience massive adoption. Download this infographic to see the numbers you can't ignore this year.
Posted: 03 Mar 2017 | Published: 27 Apr 2016

IBM

Cloud Security and Content Management: Box Case Study
sponsored by IBM
WHITE PAPER: Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

Box: Securing Business Information in the Cloud
sponsored by IBM
WHITE PAPER: Learn how to address content security challenges with Box on the cloud and enable productivity and collaboration with anyone, anywhere, and at any time, while maintaining control and compliance over your business content.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM
26 - 50 of 1250 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement