IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
51 - 75 of 1319 Matches Previous Page  |  Next Page
Secure, Sync and Share Enterprise Files Everywhere
sponsored by Citrix
WHITE PAPER: This white paper shows how to regain control over employee file sharing with an enterprise-class, IT-managed, secure file sync and sharing strategy. Read on for insight on how to revamp your collaboration approach with six key benefits.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

Citrix

Healthcare Security: The Cost of Lost or Stolen Devices
sponsored by Absolute
WHITE PAPER: This white paper discusses the challenges of securing healthcare data in a mobile world, especially when mobile devices are lost or stolen.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

Absolute

Security Report Card: Do You Meet NIST Standards?
sponsored by LogRhythm, Inc.
WHITE PAPER: The collection, management, and analysis of log data is integral to meeting many NIST-CSF requirements, and precautions taken can be summarized in five words: identify, protect, detect, respond, and recover. This white paper outlines the complete updated NIST-CSF guidelines, and highlights one comprehensive log management and analysis solution.
Posted: 04 Aug 2015 | Published: 31 Dec 2014

LogRhythm, Inc.

Enable Secure Remote Access to 3D Data without Sacrificing Visual Performance
sponsored by Citrix
WHITE PAPER: This white paper discusses a technology strategy to enable secure, real-time remote collaboration on design data and model-based deliverables. Discover ways to meet time-to-market goals and keep intellectual property secure while lowering IT costs.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

Citrix

Business Intelligence on Cloud: Operate and Succeed at a New Business Speed
sponsored by IBM
WHITE PAPER: This brief white paper takes you through the benefits of reporting, analysis, dashboards and visualization capabilities offered as SaaS. Access now to learn how to deploy and deliver insights faster without compromising compliance or security.
Posted: 04 Aug 2015 | Published: 31 Mar 2015

IBM

Why IT Professionals Need to Take Responsibility for Data Security
sponsored by Oracle Corporation
WHITE PAPER: This white paper presents the results of a survey that asked IT professionals about their data security practices, revealing the areas where most organizations need to improve.
Posted: 04 Aug 2015 | Published: 31 Oct 2014

Oracle Corporation

Caring for Mission Critical Printing
sponsored by Nuance
WHITE PAPER: Read this case study to discover how one medical center adopted a more streamlined printing strategy that kept sensitive documents from falling into the wrong hands.
Posted: 03 Aug 2015 | Published: 31 Dec 2013

Nuance

Special Report: Compromised Data in the Dark Web
sponsored by SurfWatch Labs
WHITE PAPER: This report reveals the findings of a Dark Web analysis, revealing an alarming amount of compromised data from one company alone.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

SurfWatch Labs

Citrix solutions for healthcare
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about a suite of solutions that help healthcare organizations embrace mobile workstyles and cloud services to improve both patient care and organizational performance.
Posted: 03 Aug 2015 | Published: 28 Feb 2013

Citrix

Remote access your users will love
sponsored by Citrix
WHITE PAPER: Access this white paper to uncover the growing user challenges with remote access. Also, discover the key characteristics of a remote access solution strategy that gives users a remote experience they'll love while meeting IT's requirements for security and manageability.
Posted: 03 Aug 2015 | Published: 29 Mar 2013

Citrix

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones
sponsored by Citrix
WHITE PAPER: Access this white paper to get an in-depth look at the major mobile OS platforms, the security issues and features unique to each, and the measures IT needs to take to maintain control while encouraging productivity and mobility.
Posted: 03 Aug 2015 | Published: 30 Apr 2014

Citrix

Best practices to make BYOD simple and secure
sponsored by Citrix
WHITE PAPER: Access this white paper to explore the features and best practices of a complete BYOD strategy. Also, uncover a line of complete BYOD solutions that address all the key capabilities required to make BYOD simple, secure, and effective for any organization.
Posted: 03 Aug 2015 | Published: 30 Apr 2013

Citrix

Taking Advantage of the General Data Protection Regulation
sponsored by Oracle Corporation
WHITE PAPER: This resource provides a breakdown all of the information you need to navigate the data security changes brought by the upcoming General Data Protection Regulation.
Posted: 03 Aug 2015 | Published: 31 May 2015

Oracle Corporation

5 steps to introducing BYOD in your organization
sponsored by Citrix
WHITE PAPER: Access this informative white paper to explore technologies designed to optimize your BYOD deployment and learn five simple steps to plan and roll out a BYOD initiative in your organization.
Posted: 03 Aug 2015 | Published: 28 Feb 2013

Citrix

3 Strategies to Manage Compliance Mandates
sponsored by Citrix
WHITE PAPER: This white paper focuses on 3 strategies to easily manage compliance. Follow along with these guidelines to prove to senior execs and board members that your company meets all of its requirements and can defensibly prove it.
Posted: 30 Jul 2015 | Published: 09 May 2014

Citrix

Cyber Attack Survival Checklist
sponsored by CrowdStrike
WHITE PAPER: This cyber-attack survival checklist will help you avoid common mistakes and eliminate deficiencies within your existing security measures.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

CrowdStrike

Today's State of Mobile App Security
sponsored by IBM
WHITE PAPER: Mobile devices are at serious risk of being hacked with threat vectors constantly evolving. Organizations should consider mobile app assessments to determine if existing apps are exposed to risks that are unique to mobile environments. This white paper highlights the way to combat these threats.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

IBM

FlexCast technology powers workforce mobility
sponsored by Citrix
WHITE PAPER: Check out this white paper to discover how FlexCast virtualization technology can help IT departments meet all of their virtualization goals, from enabling BYOD to transforming call centers.
Posted: 30 Jul 2015 | Published: 31 Dec 2013

Citrix

Securing Information in the New Digital Economy
sponsored by Oracle Corporation
WHITE PAPER: This white paper teaches you how to build more effective security by focusing your attention on internal vulnerabilities.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Oracle Corporation

Empowering Information Security with Desktop Virtualization
sponsored by Citrix
WHITE PAPER: This white paper explores how desktop virtualization can help improve information security control, optimize overall application and desktop management, and spur initiatives that bring significant new opportunities for business growth.
Posted: 30 Jul 2015 | Published: 30 Jul 2015

Citrix

Virtual Server Protection: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: In this detailed checklist, explore the basic and advanced features you'll need in a virtual server protection solution to safeguard your corporate data.
Posted: 30 Jul 2015 | Published: 31 Dec 2014

Commvault

From BlackBerry to BYOD, CYOD or COPE
sponsored by Citrix
WHITE PAPER: Access this white paper to learn about the security, management, and application delivery features of Blackberry, Apple iOS and Google Android devices. Also, discover a comprehensive enterprise mobility management (EMM) and mobile device management (MDM) platform for BYOD initiatives.
Posted: 30 Jul 2015 | Published: 30 Apr 2015

Citrix

Responding to Unpopular HIPAA Disclosure Requirements
sponsored by Absolute
WHITE PAPER: In this research conducted by Gartner, discover the major findings of the HIPAA-HITECH debate between keeping patient information accessible or fully disclosed. Uncover recommendations on how to choose a side, lobby, and enter the public debate.
Posted: 29 Jul 2015 | Published: 27 Sep 2013

Absolute

10 Vital Questions for Evaluating Your Mobile Security Strategy
sponsored by Citrix
WHITE PAPER: Mobile security concerns continue to abound in the workplace (from passcode enforcement to device encryption). An end-to-end mobile security framework can allay these concerns. This white paper discusses the 10 "must-have" questions when thinking about mobile device management (MDM) at work.
Posted: 29 Jul 2015 | Published: 31 Dec 2013

Citrix

Taking Your Enterprise Mobile The Executive Checklist
sponsored by Citrix
WHITE PAPER: Access this white paper to explore the top mobile security concerns, including three top factors that contribute to enterprises' security concerns. Also, discover a checklist of key considerations of what to look for in a mobile strategy.
Posted: 29 Jul 2015 | Published: 31 May 2013

Citrix
51 - 75 of 1319 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement