IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
51 - 75 of 1418 Matches Previous Page  |  Next Page
Top Reasons to Choose EMC Isilon Scale-Out NAS
sponsored by EMC
WHITE PAPER: This white paper highlights 8 reasons why your enterprise should consider investing in a scale-out NAS solution with a single volume, single file system architecture. Access now and discover how you can improve your storage scalability, efficiency, and flexibility, and expand your data lake.
Posted: 21 Apr 2016 | Published: 31 Jan 2016

EMC

Next-Generation IPS in the Era of Targeted Attacks
sponsored by IBM
WHITE PAPER: This white paper talks about the future of IPS and gives you statistics from the current IPS market. Access now to learn about the features, capabilitie, costs and impacts of next-generation IPS and the future of cyberattacks in general.
Posted: 21 Apr 2016 | Published: 01 Jan 2016

IBM

Data Center Applications Standards Reference Guide: Networking and Storage
sponsored by CommScope
WHITE PAPER: In this technical white paper, discover a detailed overview of the most prevalent networking and storage applications in today's modern data centers. Additionally, read on to get instruction on computer clustering, SAN and server cabling, data security, and more.
Posted: 21 Apr 2016 | Published: 21 Apr 2016

CommScope

The Power of Collaboration with an Expiration Date
sponsored by BlackBerry
WHITE PAPER: This white paper teaches you about data-centric security which embeds persistent controls in your files so they are always protected no matter where they are shared. Access now and find out how you can protect your most important assets – your privacy and your business data.
Posted: 20 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Six Tools Users Need for Mobile Files And How to Provide Them Securely
sponsored by BlackBerry
WHITE PAPER: This white paper identifies and details the key tools users need and outlines what IT should consider in evaluating these products. Access now to discover how you can safely access, share, sync and collaborate on even the most sensitive files through any device.
Posted: 20 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Securing the Internet of Things: 6 Crucial Steps
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Although a majority of large companies are actively working on Internet of Things (IoT) initiatives, data security continues to be a low priority for boards of directors. This resource explores the new security risks prompted by the IoT and reveals 6 crucial actions that CIOs need to take to counteract them.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

Hewlett-Packard Enterprise

Software-Defined Scale-Out NAS: Simple and Efficient Storage for Enterprise Edge Locations
sponsored by EMC
WHITE PAPER: This white paper discusses a software-defined storage solution with scale-out NAS that extends the data lake to enterprise edge locations. Read on to learn how this solution can reduce your costs and simplify management by consolidating your unstructured data, eliminating inefficient storage silos, and streamlining data protection.
Posted: 20 Apr 2016 | Published: 31 Jan 2016

EMC

Traditional Backup Vs. Modern Data Protection
sponsored by Commvault
WHITE PAPER: From this resource, you will compare traditional backup versus modern data protection, and discover a holistic, single platform approach that will protect your company's vital data. Read on to examine the advantages modern data protection offers over traditional backup.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

Commvault

Cybersecurity for the Digital Age: The Essential Guide
sponsored by Dimension Data
WHITE PAPER: In this resource, discover what the future of cybersecurity has in store, as well as how it's catalyzing significant transformation in today's digital enterprises. Read on to learn why organizations are shifting their cybersecurity strategies from reactive to agile, and more.
Posted: 19 Apr 2016 | Published: 12 Apr 2016

Dimension Data

Deploying an EFSS Solution: Six Steps for Success
sponsored by BlackBerry
WHITE PAPER: This white paper outlines the shortest path to implementing Enterprise File Synchronization and Sharing (EFSS) while protecting your organization against loss incidents. You'll learn that the process, not the technology, drives successful EFSS implementation and six steps to deploy EFSS with optimal security controls.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Why Enterprises Need Trustworthy Data
sponsored by IBM
WHITE PAPER: In this e-book, information governance expert Paula Wiles Sigmon discusses what enterprises are doing to improve the quality of their data, who should be responsible for data that goes in and out of an enterprise data warehouse, and the emerging role of the chief data officer. Gain tips on how you can foster confidence in your data.
Posted: 18 Apr 2016 | Published: 30 Jun 2014

IBM

Developing Data Integration and Lifecycle Management Strategy for a Hybrid Environment
sponsored by IBM
WHITE PAPER: Examine the four pillars for successful information governance in hybrid environments and how to implement a successful integration and lifecycle strategy. Access now to see how you can improve the reliability, flexibility, and scalability of your data integration, management, security, and analytics solutions.
Posted: 18 Apr 2016 | Published: 30 Apr 2015

IBM

HEIDELBERG Simplifies Backups and Restores Flexibility
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Access this case study to learn how one printing press manufacturer combined hardware and software to better align its IT and business goals with its backup needs.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

Hewlett Packard Enterprise

Backup Solution Vendors: Reviews from the Tech Community
sponsored by Hewlett Packard Enterprise
WHITE PAPER: With enterprise technology, you can't simply rely on the word of vendors. Access this list of user reviews to hear what your peers objectively think about various data backup and protection solutions.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

Hewlett Packard Enterprise

Avoid becoming the catch of the day: Four steps to combat phishing attacks
sponsored by Imprivata
WHITE PAPER: Phishing has emerged as the top security threat facing healthcare organizations. Access this white paper now for 4 steps you can take to better prepare for and defend against phishing attacks while maintaining a balance between security and clinical workflow efficiency.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

Imprivata

Visual Analytics: Easily Explore Data to Make Decisions You Can Trust
sponsored by TIBCO Software Inc.
WHITE PAPER: Many organizations are looking to invest in analytics tools to empower business users, but expert users still need analytics capabilities to fulfill more complex tasks. Discover a visual analytics platform that can support the needs of business users, advanced data scientists, and everyone in between.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

TIBCO Software Inc.

Case Study: NTT Communicatiosn Delivers Object Storage to Enterprise Cloud Service
sponsored by Cloudian
WHITE PAPER: This case study highlights a telecom company's decision to replace their outdated distributed file storage system with a robust object storage platform designed for hybrid cloud infrastructures. Read on to discover the benefits this solution could provide your enterprise, including reduced acquisition costs, configurable replication, and more.
Posted: 15 Apr 2016 | Published: 31 Dec 2015

Cloudian

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: This white paper teaches you about managed file transfer and how it can help you meet increasing customer demands. Access now and learn how to create seamless customer experiences across your value chain and synchronize your business to become more secure, compliant and efficient.
Posted: 14 Apr 2016 | Published: 31 Dec 2013

IBM

Three Considerations for Modernizing Data Protection
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this report, you'll learn why backup is the cornerstone of a data protection strategy. Access now to uncover what you can do to ensure top security initiatives are met with solid data protection and backup policies, along with other top IT concerns.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

Hewlett Packard Enterprise

Future Proof your Data Storage with the Hybrid Cloud
sponsored by Equinix
WHITE PAPER: This white paper highlights one hybrid cloud platform with customizable end-to-end data center and cloud storage solutions. Read on and discover how this solution can provide your enterprise with secure storage for your mission-critical data and simplified backup and archiving.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

Equinix

MIMIX Availability: The easy way to protect the availability of even the most complex IBM i environments
sponsored by Vision Solutions
WHITE PAPER: In this white paper, you will learn about a simple, yet robust protection platform that efficiently backs up business applications in the event of a production server failure. Access now for 24/7 availability and storage of all your organization's application data.
Posted: 13 Apr 2016 | Published: 31 Jan 2016

Vision Solutions

Cyber Liability: Risks, Ramifications, and Mitigation
sponsored by eSentire
WHITE PAPER: Find out how you can better defend your organization against external attack and limit exposure by reducing your attack profile available to attackers by accessing this resource.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

eSentire

The Truth Behind Why DRaaS is Gaining Popularity
sponsored by Vision Solutions
WHITE PAPER: This white paper reveals why disaster recovery as a service (DRaaS) is gaining popularity among organizations looking to enhance their disaster recovery strategy. Read on and you'll gain insight into this rapidly growing service and discover 5 reasons to consider DRaaS, 6 must-have features to look for in a DRaaS provider, and more.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

Vision Solutions

How Cloud Services Giant Exostar Protected Sensitive Data and Applications
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, you'll learn how micro-segmentation helps you move beyond perimeter security to contain and halt threats inside your data center in order to keep your data safe. Access now to learn whether a software-defined data center architecture is right for your business.
Posted: 12 Apr 2016 | Published: 12 Apr 2016

VMware, Inc.

9 Best Practices to Build a Digital Business Architecture
sponsored by Axway
WHITE PAPER: APIs can help you leverage third-party development talent and encourage collaboration, but there are several security and performance issues you have to address in order to ensure responsible, effective use of APIs. Discover 9 best practices to optimize your digital business architecture with APIs.
Posted: 12 Apr 2016 | Published: 31 Dec 2015

Axway
51 - 75 of 1418 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement