IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
76 - 100 of 1280 Matches Previous Page  |  Next Page
XtremIO Data Protection
sponsored by EMC Corporation
WHITE PAPER: This white paper highlights a data protection strategy and reveals its benefits and advantages over RAID (Redundant Array of Independent Disks), with special consideration given to the unique requirements of enterprise flash storage arrays.
Posted: 16 Jun 2015 | Published: 01 Jul 2014

EMC Corporation

Solving Today's Top 5 Security and Risk Challenges
sponsored by Commvault
WHITE PAPER: This white paper presents the top 5 data security and risk challenges that hinder compliance. Access this exclusive resource to learn how to overcome each issue.
Posted: 16 Jun 2015 | Published: 03 Jun 2015

Commvault

5 Reasons to Buy – Not Build – Backup Capabilities
sponsored by Datto, Inc.
WHITE PAPER: Read this white paper to discover five reasons why buying backup may be a better idea than building your own, and how you can take the first steps in purchasing a reliable backup solution for your clients.
Posted: 11 Jun 2015 | Published: 11 Jun 2015

Datto, Inc.

5 Reasons Every MSP Should Sell SaaS Data Protection
sponsored by Datto, Inc.
WHITE PAPER: This white paper gives five reasons why MSPs need to take advantage of the growing need for SaaS environment data protection.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Datto, Inc.

5 Ways to Meet Today's Data Management Challenges with a Single Platform
sponsored by Commvault
WHITE PAPER: This resource describes how investing in a platform that integrates data backup, retention, search and access can provide a more holistic and integrated data management system.
Posted: 03 Jun 2015 | Published: 31 Dec 2014

Commvault

5 Important Questions to Ask Before You Renew with Your Legacy Backup Software
sponsored by Commvault
WHITE PAPER: This resource discusses the five questions every storage professional needs to ask themselves before deciding to renew their old data backup software.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Commvault

How to Sync, Share & Control Data Securely
sponsored by Commvault
WHITE PAPER: Access this resource to learn about a solution to data security in the world of cloud file sharing.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Commvault

5 Strategies For Email Data Loss Prevention
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper outlines 5 best practices for preventing sensitive information leakage while staying compliant with rapidly evolving regulations. Continue reading to learn how to bolster your email security strategy.
Posted: 01 Jun 2015 | Published: 27 May 2015

BAE Systems Applied Intelligence (formerly SilverSky)

The 2015 Cyber Risk Report
sponsored by Hewlett-Packard Company
WHITE PAPER: The HP Cyber Risk Report 2015 provides a broad view of the 2014 threat landscape and gives you the insight you need to protect your business from both known vulnerabilities and unknown exploits.
Posted: 29 May 2015 | Published: 30 Apr 2015

Hewlett-Packard Company

10 Essential Steps to Web Security
sponsored by Clearswift
WHITE PAPER: In this white paper, explore the 10 web security best practices to mitigate insider, outsider, and human error threats.
Posted: 28 May 2015 | Published: 13 May 2015

Clearswift

Next Generation Data Loss Prevention
sponsored by Clearswift
WHITE PAPER: In this white paper, discover a content-aware data loss prevention (DLP) solution that offers stronger security for your mission critical information. Click through for a simple 8-step implementation strategy.
Posted: 26 May 2015 | Published: 22 Apr 2015

Clearswift

Dissecting the Foundation of an Adaptive Data Loss Prevention Strategy
sponsored by Clearswift
WHITE PAPER: This white paper reveals the foundation of adaptive data loss prevention strategy.
Posted: 26 May 2015 | Published: 30 Apr 2015

Clearswift

Today's Microsoft Office 365 Security Hurdles
sponsored by Clearswift
WHITE PAPER: This white paper outlines today's 11 Microsoft Office 365 security challenges and how to modify your email security strategy to secure content and data.
Posted: 22 May 2015 | Published: 06 May 2015

Clearswift

DLP Defense for Insider Threats
sponsored by Clearswift
WHITE PAPER: This white paper examines a DLP approach to remove content that breaks policy or industry GRC requirements. Continue reading to learn how to mitigate risks and secure communication in the collaboration or sharing processes.
Posted: 22 May 2015 | Published: 05 May 2015

Clearswift

Next-Gen DLP: Can It Protect Your Organization?
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen DLP that is adaptive and content/context aware and how it mitigates internal and external data theft and/or leaks. Continue reading to learn what is on the horizon for next-gen DLP and how it will evolve in the coming years.
Posted: 21 May 2015 | Published: 06 May 2015

Clearswift

Addressing Compliance Issues Around Public Cloud for Content Collaboration with Box for Financial Services
sponsored by Box
WHITE PAPER: This white paper explores how content collaboration with Box for Finanical Services addresses compliance issues. Read now to learn how providing enterprise-class content collaboration capabilities can tackle compliance risk.
Posted: 20 May 2015 | Published: 20 May 2015

Box

How Adaptive DLP is Securing the Agile Enterprise
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen adaptive DLP and compares the two technologies, highlighting 5 vital areas in which adaptive DLP surpasses its aging predecessor.
Posted: 20 May 2015 | Published: 06 May 2015

Clearswift

Case Study: Cloud Content Management Investments
sponsored by Box
WHITE PAPER: This infographic depicts the anatomy of a decision for cloud content management investments. Learn about how one law firm successfully leveraged online connectivity to bring together a distributed team of attorneys occupying home and regional offices.
Posted: 20 May 2015 | Published: 20 May 2015

Box

File Sync and Sharing: When Collaboration Gets Complex
sponsored by Box
WHITE PAPER: Today's differing file sync and sharing (FSS) strategies cause decision-makers to scratch their heads. The following white paper explores the growing complexities of the FSS market. Discover key functionalities as you weigh various available offerings.
Posted: 20 May 2015 | Published: 31 Dec 2014

Box

Expert Analysis: Enterprise File Synchronization and Sharing
sponsored by Box
WHITE PAPER: This study, conducted by Gartner research analysts, highlights significant changes that will impact users and providers in the EFSS sector. Less than 10% of today's EFSS vendors will offer standalone products by 2017, so get a head-start on your strategy and investigate up-and-coming capabilities.
Posted: 20 May 2015 | Published: 02 Jul 2014

Box

Benefit from Collaboration without Compromising Security
sponsored by Clearswift
WHITE PAPER: This informative whitepaper outlines a strategy for facilitating collaboration without compromising your IT security.
Posted: 19 May 2015 | Published: 03 Jun 2014

Clearswift

Manage "Lots" of Documents within a Secure Business Process
sponsored by Nuance
WHITE PAPER: This brief white paper pinpoints how Toyota Industries North America met the above goals and saved money and time in the process. Access this resource now to realise the success you can gain from capturing and securing documents.
Posted: 14 May 2015 | Published: 14 May 2015

Nuance

Case Study: Coca-Cola Reduces its Migration Timeline by 33%
sponsored by Dell Software
WHITE PAPER: This brief white paper pinpoints savvy strategies for email migration, using CCBCC as an example. Discover ways to transition with ease of installation, technical support and cost-cutting migration technology.
Posted: 13 May 2015 | Published: 28 Sep 2012

Dell Software

Print Management Receives Top Marks at Edinburgh College
sponsored by Nuance
WHITE PAPER: This brief case study pinpoints the advantages of an effective MFP strategy, using Edinburgh College as an example. Discover the ways deploying and standardizing your print infrastructure drives budget-friendly solutions and prevents breaches.
Posted: 12 May 2015 | Published: 31 Dec 2014

Nuance

Case Study: A Swiss Bank Modernizes its Print Fleet
sponsored by Nuance
WHITE PAPER: This brief case study pinpoints the benefits of updating your print infrastructure, using a major Swiss bank as an example. Discover how reducing your printer fleet can save green in more ways than one.
Posted: 12 May 2015 | Published: 12 May 2015

Nuance
76 - 100 of 1280 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement