IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2383 Matches Previous Page  |  Next Page
How to Manage Oracle E-Business Suite Apps and Databases
sponsored by Data Intensity
ESSENTIAL GUIDE: In this expert e-guide, explore how to simplify and achieve a number of tasks that go into managing Oracle E-Business Suite (EBS) and databases, including patch updates, improving security, and managing cost-based optimizer stats.
Posted: 26 Apr 2017 | Published: 20 Apr 2017

Data Intensity

SaaS Analytics: Safe and Certain Reporting
sponsored by IBM
WHITE PAPER: In this white paper, learn how one multi-national firm was able to maintain Cognos while keeping sensitive data on premises. Plus, discover how 2 more companies were able to access data wherever it resides, create efficiencies and cost savings, and more.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

IBM

The currency of trust: why banks and insurers must make customer data safer and more secure
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

ComputerWeekly.com

What to Consider Before Buying Database Performance Monitoring Tools
sponsored by SearchDataManagement
EBOOK: To help you select the right tool, or tools, to meet your organization's particular database needs, this buyer's handbook offers advice from Mullins on the key features and functions to look for across the different product categories.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

SearchDataManagement

Three Verticals, One Data Backup Solution: A Revolutionary Unified Approach to Data Protection
sponsored by Druva Software
EBOOK: Your organization has evolved to keep up with a rapidly changing business landscape. It's time to renew your data protection strategy. This e-book explores the single, unified data protection platform was implemented in 3 different vertical industries and its impact on each organization.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

Druva Software

The No-Compromise Safety Net for Mission-Critical Data in the Cloud
sponsored by SoftNAS
EBOOK: Access this e-book to learn about the technical aspects of what a NAS cloud for AWS can do for your organization's data center, how it provides the security your data requires, and more.
Posted: 21 Apr 2017 | Published: 21 Apr 2017

SoftNAS

How Transactional Analytics is Enabling Digital Payments Transformation
sponsored by Aerospike
WHITE PAPER: Learn how transactional analytics can help you keep up with the rapid changes wrought on eCommerce by technologies like mobile payment apps and non-banking payment service providers (FinTech). Discover how to leverage a database with a hybrid memory architecture and machine learning to transform digital payments.
Posted: 20 Apr 2017 | Published: 20 Apr 2017


How Eurostar Managed Their Mobile Data, Increased Productivity & Reduced Cost
sponsored by Wandera
WHITE PAPER: Eurostar needed its mobile workforce to have access to the tools and data required for work while managing the associated costs. Being an international company, employees were travelling abroad on a daily basis so data roaming bills were excessive. Learn how they reduced bills by 40%, increased roaming productivity, and more.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

Wandera

Manage & Secure Your Mobile Data Effectively
sponsored by Wandera
WHITE PAPER: Mobile has been one of the most disruptive forces in business. Enterprises have been scrambling to get the right systems in place to equip employees with the best quality data plans and effectively manage that usage centrally. Learn how to tighten your mobile data security and data usage management.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

Wandera

Understanding AIOps & Probable Root Cause Analysis
sponsored by Moogsoft
WEBCAST: Algorithmic IT operations (AIOps) is being combined with probable root cause analytics to deliver a new approach to root cause analysis. Download this webinar to learn about this new approach, why it is important, and how to utilize it to meet your IT needs.
Posted: 19 Apr 2017 | Premiered: Oct 12, 2016

Moogsoft

Mobile Data Research Report
sponsored by Wandera
RESEARCH CONTENT: Mobile data continues to change and grow each year – and because of this frequency of change, it's important to know how your data may be affected. Learn about new mobile threats, compare security and data usage between Samsung Galaxy and Apple devices, as well as between roaming and domestic data usage, and more.
Posted: 19 Apr 2017 | Published: 19 Apr 2017

Wandera

Leading Media Provider Leverages Cloud Storage
sponsored by SoftNAS
CASE STUDY: In this case study, a leading media provider found that they were running out of storage space, but adding to their existing on-premise set up was only a temporary solution. Learn how they were able to move hundreds of terabytes of video content to and from a cloud-based environment.
Posted: 19 Apr 2017 | Published: 19 Apr 2017

SoftNAS

Hybrid Cloud for the Smart Company: Migrating from On-Prem to Cloud
sponsored by Moogsoft
WEBCAST: Cloud isn't just a computing platform, but an entirely new way of doing business. Why are so many organizations pushing a cloud migration if it means changing how they operate? Watch this brief webcast to learn how enterprises are managing their cloud migration.
Posted: 18 Apr 2017 | Premiered: Apr 4, 2017

Moogsoft

Data protection: Not just about personal data and compliance
sponsored by ComputerWeekly.com
EGUIDE: Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
Posted: 18 Apr 2017 | Published: 18 Apr 2017

ComputerWeekly.com

Don't Rush into Cloud Databases without a Well-Grounded Plan
sponsored by Data Intensity
EGUIDE: In this expert e-guide, DBA Brian Peasland helps you weigh the benefits of moving to the cloud. Discover how to take a strategic approach to implementing an Oracle cloud database that anticipates a variety of challenges from legal regulations to data security.
Posted: 17 Apr 2017 | Published: 07 Apr 2017

Data Intensity

Rethinking Enterprise Data Management: A 360-Degree View
sponsored by Veritas
RESOURCE: Download to discover a strategy for navigating the enterprise data management slalom with data backup and protection tools as the foundation. Learn more about this 360-degree approach here, which digs into unstructured data and executes intelligent decisions on how to treat each data type.
Posted: 14 Apr 2017 | Published: 31 Dec 2016

Veritas

Dell EMC Data Protection in the Cloud
sponsored by Dell EMC
VIDEO: What if you could get data protection in the cloud ans save on storage costs? Watch this 5 minute video to learn about a service enables you to move data from your data domain platform to another object storage platform.
Posted: 14 Apr 2017 | Premiered: 14 Apr 2017

Dell EMC

Cloud Data Management Tailor-Made For Your Business
sponsored by Veritas
RESOURCE: 74% of organizations have a multi-cloud strategy and 71% operate in a hybrid cloud model. As this trend continues to grow, data visibility, protection, and simplified cloud migration are all taking center stage. Access this infographic to learn about these 3 cloud data management focus areas and how to factor them into your cloud strategy.
Posted: 14 Apr 2017 | Published: 30 Dec 2016

Veritas

Some Deduplication Solutions Skimp on Security – Yours Doesn't Have To
sponsored by Dell EMC
WHITE PAPER: This white paper highlights must-have data security features deduplication should encompass. Access this resource now and learn about encryption capabilities that back up and protect data being replicated from one system to another, while preserving deduplication bandwidth.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Dell EMC

Ransomware Detection and Prevention Tools You Need Now
sponsored by SearchSecurity.com
EBOOK: Fighting today's malware threats requires a range of ransomware prevention tools. Learn how to tweak the tools you have and identify what new tools you need.
Posted: 13 Apr 2017 | Published: 05 Mar 2017

SearchSecurity.com

Building Trust in a Cloudy Sky Executive Summary
sponsored by McAfee, Inc.
WHITE PAPER: Over 90% of organizations worldwide are leveraging cloud services and – faced with a growing skills gap and increasingly advanced threats – can cybersecurity strategies keep up with the demands of the cloud? Uncover the findings of a survey of over 2,000 IT pros to learn about protecting sensitive data and apps in the cloud.
Posted: 11 Apr 2017 | Published: 31 Jan 2017

McAfee, Inc.

Array Networks Secure Remote Access Case Study: City of Santa Barbara
sponsored by Array Networks
CASE STUDY: The City of Santa Barbara needed a way to provide anytime, anywhere access to documents, files and email from any device, while maintaining the security of confidential information, regardless of the device used to access it. Download this case study to find out how the City of Santa Barbara solved these challenges.
Posted: 11 Apr 2017 | Published: 11 Apr 2017

Array Networks

Dell EMC Global Data Protection Index: The Global Maturity of Data Protection
sponsored by Dell EMC
WHITE PAPER: In this infographic, learn what 2,200 IT decision makers from 18 countries had to say about their backup and recovery experiences, strategies, and infrastructure. Access now to see where you stand in comparison.
Posted: 10 Apr 2017 | Published: 10 Apr 2017

Dell EMC

Dell EMC Data Protection: Your choice is simple
sponsored by Dell EMC
WHITE PAPER: This white paper explores a data protection suite that can provide you protection based on your business specific needs. Learn how you can gain integrated data protection within a variety of environments, deduplication speeds at up to 58.7 terabytes an hour, and more.
Posted: 07 Apr 2017 | Published: 07 Apr 2017

Dell EMC

Integrated Cloud Storage Solutions for Modern Data Management
sponsored by Commvault AWS
WHITE PAPER: Managing your data is one of the most important things you will do over the course of the next few years, especially as you put your big data strategies into action. Access this white paper to learn how to utilize cloud storage platforms to optimize your data management and find where the actionable insights are hiding.
Posted: 07 Apr 2017 | Published: 29 Dec 2016

Commvault AWS
1 - 25 of 2383 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement