IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
51 - 75 of 1263 Matches Previous Page  |  Next Page
Analyzing the Malware Threat
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Find out how malware is evolving to circumvent commonly used defensive measures by learning to avoid behavior detection. Learn more about how this advanced malware functions, how to identify it, and how to neutralize it with cloud generation malware analysis.
Posted: 14 Jun 2017 | Published: 28 Feb 2017

Symantec & Blue Coat Systems

The App is the Endpoint
sponsored by Blue Cedar
WHITE PAPER: Uncover 5 fundamental reasons why security leaders are moving away from a device management paradigm and instead are focusing on treating the app as the endpoint.
Posted: 14 Jun 2017 | Published: 31 Dec 2016

Blue Cedar

Solving Fundamental Data Quality Challenges
sponsored by BDNA
WHITE PAPER: Data quality is one of the most important requirements for IT asset management (ITAM) and IT service management (ITSM). Find out what you need to do in the rationalization, refresh, security, automation and planning steps to improve your data quality, and your overall quality of life.
Posted: 01 Jun 2017 | Published: 31 May 2017

BDNA

Transform IT and Reduce Risk With Converged Infrastructure and Availability Software
sponsored by Veeam Software
WHITE PAPER: This white paper discusses how converged infrastructure systems can be leveraged in tandem with availability tools to significantly enhance application availability, improve business agility, simplify IT operational management, lower costs, and mitigate risk.
Posted: 31 May 2017 | Published: 31 May 2017

Veeam Software

Reliable Data Protection Designed for Virtualized Environments
sponsored by Veeam Software
WHITE PAPER: Modernizing your data center can seem overwhelming, especially when you consider the exponential data growth you can expect to realize every year. Access this white paper to learn about data protection and backup for virtualized environments.
Posted: 31 May 2017 | Published: 29 Apr 2016

Veeam Software

Information Protection in the Web and Cloud Era
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Explore a modern approach to data protection in the web and cloud era. Uncover 5 requirements for a modern DLP tool.
Posted: 26 May 2017 | Published: 31 Dec 2016

Symantec & Blue Coat Systems

Safe Adoption of Cloud Applications
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Gartner predicts that nearly 40% of enterprise IT application spend will be shifted to cloud versus on-premise by 2020. Access this white paper for major considerations you will need to focus on when looking for cloud app security.
Posted: 26 May 2017 | Published: 26 May 2017

Symantec & Blue Coat Systems

Managing Machine Data from POS, IoT, Sensors, and Other Data Sources
sponsored by Splunk
WHITE PAPER: This white paper explores how to enhance your big data strategies so that you can derive actionable intelligence from your organization's machine data. Discover how to optimize the value of your machine data from point-of-sales (POS) systems, IoT sensors, smart devices, and more to support analytics and data security.
Posted: 23 May 2017 | Published: 23 May 2017

Splunk

Do You Know Where Your Data Is? Three Common Data Management Problems & How to Fix Them
sponsored by Globalscape
WHITE PAPER: Knowing the location of your data plays a crucial role with keeping it secure. When you find yourself jumping through hoops in order to protect, monitor, or report on your data, then you're not getting the most out of your IT infrastructure. Is your current IT infrastructure helping you—or hurting you? Access this e-book to find out.
Posted: 23 May 2017 | Published: 23 May 2017

Globalscape

Middleware and Operating System Machine Data
sponsored by Splunk
WHITE PAPER: This white paper explores how to enhance your big data strategies so that you can derive actionable intelligence from your organization's machine data. Find out how to optimize the value you get from the machine data created by middleware and OS and support data security, analytics, and more.
Posted: 23 May 2017 | Published: 23 May 2017

Splunk

The Internet of Relevant Things
sponsored by Aruba Networks
WHITE PAPER: The Internet of Things (IoT) term itself can be misleading, so it is important to consider one thing before going into a project: relevancy. Access this white paper to learn how to evaluate your IoT projects for business relevancy and better manage projects with secure networking without compromising usability.
Posted: 17 May 2017 | Published: 18 Jan 2017

Aruba Networks

5-Step Data Quality Framework For Data In Motion
sponsored by Infogix
WHITE PAPER: 6 out of 10 users don't trust their data – and this is all the more strengthened when data is flowing through a myriad of systems prior to analysis. The truth is, if your data is in motion, you may have data quality issues. Learn a 5-step data quality framework for data in motion.
Posted: 15 May 2017 | Published: 15 May 2017

Infogix

Citrix ShareFile eases IT migration to Windows 10®
sponsored by Citrix
WHITE PAPER: Access this white paper to discover a technology that eases OS migrations making future updates simpler. And, find out how the technology allows user data to be freed from devices, protected from overwrites and under your control.
Posted: 09 May 2017 | Published: 09 May 2017

Citrix

Hybrid Cloud & Data Fabric For Dummies
sponsored by NetApp
WHITE PAPER: Hybrid clouds are seeing a growth in adoption rates, but we're also seeing data management challenges arise. This guide explores these challenges to the hybrid cloud model and how a data fabric addresses them.
Posted: 09 May 2017 | Published: 31 Dec 2015

NetApp

MobileIron and iOS: The Security Backbone for the Modern Enterprise
sponsored by MobileIron
WHITE PAPER: Download this white paper to discover an EMM solution that provides a comprehensive platform that protects enterprise information wherever it lives: in the datacenter, in the cloud, in mobile apps, on mobile devices, and in motion between them.
Posted: 09 May 2017 | Published: 09 May 2017

MobileIron

The Developer's Guide to the DevSecOps Galaxy
sponsored by Veracode, Inc.
WHITE PAPER: Bringing developers and operations staff together under the singular DevOps roof means trying to mesh contradictory approaches, leaving open security concerns. DevSecOps to the rescue! Access this white paper to learn about DevSecOps challenges, best practices, and more!
Posted: 03 May 2017 | Published: 03 May 2017

Veracode, Inc.

Beware the Beastly Threats of IT security
sponsored by Lenovo
WHITE PAPER: It's essential that IT professionals have the right tools to build safeguards against them as battling threats is more critical for organizations than ever— in dollars and in brand reputation. This eBook explores 6 beastly threats scratching at the perimeter of your company's computers and IT networks, and where these threats are trending.
Posted: 01 May 2017 | Published: 01 May 2017

Lenovo

How Transactional Analytics is Enabling Digital Payments Transformation
sponsored by Aerospike
WHITE PAPER: Learn how transactional analytics can help you keep up with the rapid changes wrought on eCommerce by technologies like mobile payment apps and non-banking payment service providers (FinTech). Discover how to leverage a database with a hybrid memory architecture and machine learning to transform digital payments.
Posted: 20 Apr 2017 | Published: 20 Apr 2017


Don't Settle, Choose the Best Mobile Security Platform for Your Mobile Transformation
sponsored by MobileIron
WHITE PAPER: This white paper explores how to leverage a modern, scalable EMM platform to bolster your mobile security strategy. Access a comparison guide between AirWatch and MobileIron and learn how to enhance your strategy for securing all things mobile, from apps to emails and beyond.
Posted: 05 Apr 2017 | Published: 31 Dec 2016

MobileIron

Information Governance: Protect Your Company's Assets
sponsored by Box
WHITE PAPER: This white paper explores how to leverage the cloud content management platform from Box to implement a sound information governance program for you organization. Discover how to reduce risks and gain control over who can see and use information and how it is kept.
Posted: 22 Mar 2017 | Published: 22 Mar 2017

Box

What GDPR Means for Your Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: Due to the GDPR, compliance is mandatory by 25th May 2018. Access this whitepaper to discover what data security requirements are laid down by the GDPR, and how to ensure your organization is ready.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Dell SecureWorks

Why Organizations Still Struggle to Digitally Transform & Innovate
sponsored by TechData - Veeam
WHITE PAPER: Over 80% of enterprises deal with a data availability gap. Do you know how many millions that gap is costing you? Access this white paper to learn how to close the availability and protection gaps, quantify your availability goals, see how these challenges are impacting your digital transformation strategies, and more.
Posted: 09 May 2017 | Published: 09 May 2017


SaaS Analytics: Safe and Certain Reporting
sponsored by IBM
WHITE PAPER: In this white paper, learn how one multi-national firm was able to maintain Cognos while keeping sensitive data on premises. Plus, discover how 2 more companies were able to access data wherever it resides, create efficiencies and cost savings, and more.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

IBM

Empower Innovation with the Right Unified Collaboration Strategy
sponsored by IBM
WHITE PAPER: Not only can effective collaboration tools better meet standards for enterprise security, but the business benefits are profound and well-documented. Discover integrated, cloud-based tools that can improve ROI, lower TCO, increase efficiency and user satisfaction, and more.
Posted: 05 Apr 2017 | Published: 05 Apr 2017

IBM

The Essential Guide Data Protection and Disaster Recovery
sponsored by Tintri
WHITE PAPER: Download this guide to understand the must-have storage features that are essential to modern DP and DR practices;provided are specific guidelines on what to look for, how to strategize DR in your organization, and more.
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Tintri
51 - 75 of 1263 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement