IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security White Papers (View All Report Types)
76 - 100 of 1390 Matches Previous Page  |  Next Page
Your Legal Liability Following a Cybersecurity Breach
sponsored by SurfWatch Labs
WHITE PAPER: This resource explores recent legal rulings that put more pressure on organizations to develop a comprehensive cyber risk management program. Read on to discover how an effective threat intelligence strategy can enable you to defend against the growing litigation that inevitably results from being the victim of a cyberattack.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

SurfWatch Labs

Electronic Privacy Screens: Protect Your Data at the Source
sponsored by OptioLabs
WHITE PAPER: This white paper discusses how display security and breach detection solutions can protect against disclosures of information caused by over-the-shoulder observation and unattended workstations. Read on to discover the key features that you need to look for in a display security solution.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

OptioLabs

Faster Backups Mean Better Data Protection
sponsored by Sempre Technologies Ltd
WHITE PAPER: This white paper focuses on the limitations of traditional backup systems and dives into the many benefits of Data Domain Boost as formidable solution to this issue.
Posted: 31 Mar 2016 | Published: 31 Mar 2015

Sempre Technologies Ltd

How to Secure Health Records on the Screen
sponsored by OptioLabs
WHITE PAPER: This white paper describes the unique challenges and privacy of data in the healthcare domain where every display represents a potential point of leakage.
Posted: 31 Mar 2016 | Published: 29 Feb 2016

OptioLabs

Solving Data Protection: HGST Active Archive System & Commvault Value of Data Protection at Scale
sponsored by HGST
WHITE PAPER: This white paper shows you how to meet a variety of your organization's demands including software to manage data and a target storage system with the ability to ensure integrity, scale and high availability. Access now to learn how you can simplify your data security.
Posted: 31 Mar 2016 | Published: 01 Jan 2016

HGST

Performance and Efficiency for VMware Data Protection
sponsored by EMC
WHITE PAPER: This white paper highlights backup solutions that deliver higher deduplication rates than traditional integrated backup appliances and delivers the scalability, flexibility, and agility necessary to protect entire VM environments. Read on to see how this solution can enable you to simplify and consolidate your data protection while reducing costs.
Posted: 30 Mar 2016 | Published: 31 Oct 2015

EMC

Some Deduplication Solutions Skimp on Security – Yours Doesn't Have To
sponsored by Sempre Technologies Ltd
WHITE PAPER: This white paper highlights security features in data deduplication, and why it matters to you. Access this resource now and learn about encryption capabilities that protect data being replicated from one system to another, while preserving deduplication bandwidth.
Posted: 30 Mar 2016 | Published: 30 Sep 2015

Sempre Technologies Ltd

The Human Factor Report
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.
Posted: 29 Mar 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

Case Study: Financial Services Firm Implements Cloud DRaaS
sponsored by Cirrity
WHITE PAPER: This case study highlights how one financial services firm was able to prevent loss of revenue after a disaster occurred by implementing a cloud disaster recovery as a service (DRaaS) solution. Read on and discover how this DRaaS platform can enable a safer and more scalable data storage system and complete disaster recovery solution.
Posted: 29 Mar 2016 | Published: 29 Mar 2016

Cirrity

Cloud Security: The Five Fears
sponsored by UKFast
WHITE PAPER: This white paper reviews and debunks the top 5 fears of migrating to the cloud. Inside, discover how to protect data and users in the cloud as well as best practices checklists to ensure a smooth migration.
Posted: 28 Mar 2016 | Published: 09 Mar 2016

UKFast

EMC Configures VNXe: A Unified Storage Platform for SMBs and ROBOs
sponsored by EMC
WHITE PAPER: This white paper highlights a unified storage platform that supports highly available block storage functionalities and can be flexibly configured and scaled for any SMB or ROBO IT requirement. Read on to see how you can solve your storage dilemmas with this easy to manage, cost-effective storage platform.
Posted: 28 Mar 2016 | Published: 26 Aug 2015

EMC

Credit Union Infographic
sponsored by SurfWatch Labs
WHITE PAPER: This white paper shows you exactly why you need cyber threat intelligence to defend your sensitive data. With continuous monitoring technology, you'll learn about breaches the moment they occur and be able to mitigate risk accordingly.
Posted: 28 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

How Memory and Storage Technologies Are Transforming Enterprise Computing
sponsored by Micron Technology
WHITE PAPER: The ability to successfully manipulate, analyze, utilize and protect data is the key competitive differentiator of today's business era. Learn how you can leverage innovation to your advantage and current trends in memory and storage.
Posted: 28 Mar 2016 | Published: 16 Mar 2016

Micron Technology

Defining Data Security
sponsored by CyrusOne
WHITE PAPER: In this white paper, learn how to take care of physical data security, secure all points of entry to your network, plan for when disaster does strike, and more. Additionally, learn how an enterprise data center colocation provider can play a key role in your specific data security strategy.
Posted: 25 Mar 2016 | Published: 31 Dec 2015

CyrusOne

How Integrated Services Reduce Risk and the Impact of a Security Breach to Organizations
sponsored by Dell SecureWorks
WHITE PAPER: This white paper presents the advantages of a single-outsourced solution for managed security services and incident response. Discover how combining your capabilities with an MSSP can enable you to improve your overall security by reducing investigation time with real-time data access and enhancing remediation solutions with cyberintelligence.
Posted: 25 Mar 2016 | Published: 25 Mar 2016

Dell SecureWorks

IT Security and Cloud Technology Predictions 2016
sponsored by UKFast
WHITE PAPER: This white paper examines data sovereignty and unveils the top 3 emerging security trends
Posted: 25 Mar 2016 | Published: 02 Mar 2016

UKFast

Privacy Shield: The New Data Transfer Agreement
sponsored by UKFast
WHITE PAPER: In this white paper, you will learn how to take advantage of cloud versatility, best-of-breed technology and enterprise-grade infrastructure without opening up customer data to the uncertainties of global entangled hosting infrastructures.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

UKFast

Building a Business Case for Cyber Threat Intelligence
sponsored by SurfWatch Labs
WHITE PAPER: This white paper gives you 5 main reasons for a risk-based approach to cybersecurity. Access now to learn how you can know the specific cyber threats targeting your business redirect your cyber tactics for the most effective defense and bring cybersecurity into the broader risk discussion.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Drive Performance Up and the Cost of Hybrid Flash Down with Deduplication
sponsored by EMC
WHITE PAPER: This white paper highlights a solution that offers simple and flexible data deduplication management while providing efficient storage utilization to the applications that can take advantage of the technology. Learn how this solution can improve your enterprise's overall data center efficiency and storage infrastructure management.
Posted: 24 Mar 2016 | Published: 31 Aug 2015

EMC

Top 10 Reasons to Choose an Integrated Data Protection Solution
sponsored by Avnet Technology Solutions
WHITE PAPER: This white paper outlines ten reasons why organizations are choosing integrated data protection solutions over other data protection strategies on the market. Download now to discover how an integrated data protection solution can enable your organization to meet performance and retention requirements without additional infrastructure.
Posted: 24 Mar 2016 | Published: 31 Dec 2015

Avnet Technology Solutions

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 Mar 2016 | Published: 02 Mar 2016

Dell SecureWorks

Determining the True Costs of a Data Breach
sponsored by Dell SecureWorks
WHITE PAPER: This white paper takes an in-depth look at the true costs of a data breach. Keep reading to learn steps and tips you may take to determine and reduce the cost of your next breach.
Posted: 23 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Oracle’s Engineered Systems Approach to Maximizing Database Protection
sponsored by Oracle, in association with Intel
WHITE PAPER: Access this white paper and discover how your organization can gain better backup and recovery performance to meet stringent RPO and RTO SLAs, reduced data loss exposure, increased data integrity, and greater application user satisfaction.
Posted: 22 Mar 2016 | Published: 01 Jan 2016

Oracle, in association with Intel

Market Overview: Customer Identity and Access Management Solutions
sponsored by Gigya
WHITE PAPER: How can you balance a seamless customer experience with a strong security strategy to protect customers' privacy? This Forrester report evaluates 7 customer identity and access management (CIAM) solution vendors, revealing the major strengths of each choice. Discover the key features to look for when deciding on a CIAM solution.
Posted: 21 Mar 2016 | Published: 04 Aug 2015

Gigya

Oracle's Zero Data Loss Recovery Appliance
sponsored by Oracle, in association with Intel
WHITE PAPER: This white paper overviews Oracle's zero data loss recovery appliance that offers a new approach to database protection by virtually eliminating data loss and backup overhead with cloud-ready scalability. Discover how this appliance can provide your enterprise with continuous real-time protection and ensure fast recovery and shortened RTO.
Posted: 21 Mar 2016 | Published: 31 Dec 2015

Oracle, in association with Intel
76 - 100 of 1390 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement