IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
76 - 100 of 1246 Matches Previous Page  |  Next Page
Beyond Application Visibility and Control: What an NGFW Must Be
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore the ways in which digital transformation is changing businesses' security, and discover why typical NGFWs that focus primarily on app visibility offer an incomplete approach to threat defense. Read on to employ a NGFW that protects across the entire attack continuum, and integrates with existing security investments.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Next-Generation Firewalls: An Investment Checklist
sponsored by Cisco Systems, Inc.
WHITE PAPER: What should you look for in a next-generation firewall? This paper includes a checklist against which you evaluate NGFWs. Read on now to determine the benefits a truly effective NGFW can deliver, and find one that will provide actionable indications of compromise to identify malicious activity, and more.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

2016 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This in-depth analysis outlines what IT and security professionals learned from 2015's cyberattacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrophic data loss.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

Manage Risk by Protecting Apps, Data and Usage
sponsored by Citrix
WHITE PAPER: When it comes to securing vulnerabilities, especially in apps, there are 5 best practices you can follow. This white paper provides and overview of how to ensure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Citrix

Rubrik and VMware Virtual SAN (VSAN)
sponsored by Rubrik
WHITE PAPER: Download this white paper for an introduction to software-defined storage and VMware VSAN, VSAN as an object datastore, Rubrik converged data management, and how Rubrik and VSAN work together to simplify your data center.
Posted: 11 Aug 2016 | Published: 11 Aug 2016

Rubrik

Tech Report: Three Use Cases Demonstrate How Rubrik Rocks Recovery
sponsored by Rubrik
WHITE PAPER: Read through three scenarios that highlight Rubrik's strengths in backup, replication and recovery and how we solve tape-based backup challenges, traditional replication shortcomings, and the problem with archival.
Posted: 10 Aug 2016 | Published: 31 May 2016

Rubrik

4 Steps to a Tapeless Backup Environment: A Guide For Data Management Success
sponsored by Iron Mountain
WHITE PAPER: A tapeless environment can enhance data backup, recovery, and disaster recovery and highlights the critical considerations and decisions that should be made to do so. Read on and access a 4 step outline for successful migration to a tapeless strategy.
Posted: 04 Aug 2016 | Published: 31 Dec 2015

Iron Mountain

Can Secure Cloud Storage Solve the Long-Term Archiving Dilemma?
sponsored by Iron Mountain
WHITE PAPER: Explore the cloud-based archive solutions market, and discover the benefits of object storage as flexible software construct for digital archives. Together, cloud services and object storage can provide your enterprise with the ability to leverage an object storage repository without building a large infrastructure for it.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Iron Mountain

Protecting Your Data in the Digital Transformation Journey
sponsored by HPE and Intel®
WHITE PAPER: Application performance enables competitive advantage by increasing productivity, but could you be wasting time with servers that aren't secure? Discover a number of overarching rules and business attributes to help protect your organization's data.
Posted: 29 Jun 2016 | Published: 29 Feb 2016

HPE and Intel®

Pivot3 Marries Erasure Coding and Hyperconvergence
sponsored by Pivot3
WHITE PAPER: Discover a hyper-converged infrastructure platform that implements scalar erasure codes to deliver higher storage efficiency and greater resilience than data replication. Explore how to enable efficient, resilient data protection in your hyper-converged environment.
Posted: 14 Jun 2016 | Published: 31 Dec 2015

Pivot3

Data Center Applications Standards Reference Guide: Networking and Storage
sponsored by CommScope
WHITE PAPER: In this technical white paper, discover a detailed overview of the most prevalent networking and storage applications in today's modern data centers. Additionally, read on to get instruction on computer clustering, SAN and server cabling, data security, and more.
Posted: 01 Jun 2016 | Published: 21 Apr 2016

CommScope

Advance Enterprise Analytics with Self-Service and Governance
sponsored by Pyramid Analytics
WHITE PAPER: Self-service BI can help business users quickly create data models and enable better decision-making, but this can't be achieved without centralized, managed security. Discover a highly scalable BI platform that can balance self-service BI with complete governance.
Posted: 19 May 2016 | Published: 19 May 2016

Pyramid Analytics

How Strong Is Your Electronic Healthcare Records Storage Strategy?
sponsored by Kaminario
WHITE PAPER: In this brief paper, you will access a checklist for evaluating how well your healthcare data storage strategy holds up to these rising EHR data volumes. Read on to discover if your data storage delivers predictability as EHR data grows, provides resilient data protection, and more.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Kaminario

Preventing Ransomware Threats to Health Data in 10 Steps
sponsored by Cisco Umbrella
WHITE PAPER: Health data has become some of the most sought-after personal data on the black market, making healthcare professionals and hospital systems prime targets for cybercrime – particularly ransomware attacks. This e-guide will provide you with 10 steps to avoid ransomware attacks on your health systems.
Posted: 16 Sep 2016 | Published: 14 Sep 2016

Cisco Umbrella

Best Practices for Your Disaster Recovery/Business Continuity Plan
sponsored by McKesson Corporation
WHITE PAPER: In this expert guide, discover 10 best practice tips to ensure your disaster recovery/business continuity plan meets your enterprise's data security needs. Also learn how backup and disaster recovery, historically treated as separately, are converging to provide a more cohesive data management plan.
Posted: 13 Sep 2016 | Published: 12 Sep 2016

McKesson Corporation

2016 Cost of Data Breach Study United States
sponsored by IBM
WHITE PAPER: This Ponemon Institute Study includes data breach information over the past year from 64 organizations in 16 industry sectors located in the United States.
Posted: 01 Sep 2016 | Published: 01 Jun 2016

IBM

2016 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This Ponemon Institute study encapsulates the results of 383 organizations from 12 countries gathering recent data breach trends and costs of remediation.
Posted: 01 Sep 2016 | Published: 01 Jun 2016

IBM

Trends in SAP Cybersecurity
sponsored by IBM
WHITE PAPER: The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 29 Aug 2016 | Published: 01 Feb 2016

IBM

7 Key Challenges to Value-Based Care: Ensuring Patient-Centered Care With Information Management
sponsored by Information Builders
WHITE PAPER: This white paper explores how to address some of the challenges of moving towards value-based healthcare with a strategy for improving the way patient data is collected, managed, and exchanged. Access now to find out more about an integrated approach to master data management, data quality, information management, and more.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Information Builders

How One Company Integrated Its Infrastructure with Hadoop
sponsored by Intel Corporation
WHITE PAPER: Learn about how one company that used the Kafka Messaging tool with Hadoop to extend its data integration architecture to incorporate big data in real time. Discover how the company was able to improve customer services, security, and data management, and how you can do the same.
Posted: 24 Aug 2016 | Published: 29 Apr 2016

Intel Corporation

Big Data: Securing Apache Hadoop Platform
sponsored by Intel Corporation
WHITE PAPER: While Hadoop does wonders for data management, it was not designed with security in mind. Read about Hadoop security challenges and discover 6 ways to improve Hadoop security. Find out where the balance lies between security and big data flow.
Posted: 24 Aug 2016 | Published: 30 Jun 2016

Intel Corporation

Leading the Data-Driven Transformation: The CIO & The New Age of Data Quality
sponsored by Trillium Software
WHITE PAPER: Discover the top 6 challenges modern CIOs face, and explore how to leverage data quality to propel CIO success. Learn the best practices for sustainable information management strategies, allowing your CIOs to transform your business models through data-driven digitization.
Posted: 15 Aug 2016 | Published: 01 Aug 2016

Trillium Software

The Threat Defense Lifecycle — Why Traditional Security Fails
sponsored by Intel Security
WHITE PAPER: Learn how to navigate the new world of cyber threats and security tools while maintaining an open mind towards new strategies and priorities. Collaborate with business pros and innovate to fortify existing defenses and establish new bulwarks against threats lurking around the corner.
Posted: 08 Aug 2016 | Published: 01 Jul 2016

Intel Security

Data Refinement: Facilitating the data-driven organization
sponsored by IBM
WHITE PAPER: Packed with findings from architecture and app development pros, this Forrester Research report will help development and IT teams better understand why a good data refinement strategy is a business imperative, why architects and developers don't' see data the same way, where the hybrid cloud fits in when defining data refinement success, and more.
Posted: 22 Jun 2016 | Published: 30 Jun 2015

IBM

10 Characteristics of a HIPAA-Compliant ePHI Application
sponsored by Coalfire
WHITE PAPER: The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.
Posted: 19 May 2016 | Published: 19 May 2016

Coalfire
76 - 100 of 1246 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement