IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2283 Matches Previous Page  |  Next Page
Edison: IBM Spectrum Scale vs EMC Isilon White Paper
sponsored by IBM
WHITE PAPER: This white paper compares two prominent backup systems in terms of throughout and scalability. Read on to see which one performed better, and how you can achieve faster and more thorough backups.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

IBM

Cybersecurity and Data Protection: What Every Board of Directors Should Know
sponsored by Raytheon|Websense
WHITE PAPER: This document presents a non-technical overview of cybersecurity and provides recommendations for board members wishing to keep their organization safe.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

Raytheon|Websense

IDC MarketScape: Worldwide Hyperconverged Systems 2014 Vendor Assessment
sponsored by Dell, Inc.
WHITE PAPER: This white paper does the legwork for you by providing a hyper-converged systems vendor assessment. Read on to learn about the top players in the market so you can make an informed purchasing decision.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

Dell, Inc.

Are You Getting the Most from Your Hybrid IT Environment?
sponsored by IBM
WHITE PAPER: This white paper demonstrates how to find the right sourcing provider for your organization, and highlights several areas in which providers should be effective in hybrid environments.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

IBM

Build Security into Your Data Center's DNA with Micro-Segmentation
sponsored by VMware, Inc.
WHITE PAPER: This white paper introduces a new method of data center security that's based on integrating security controls with the hypervisors.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

VMware, Inc.

Quantifying the Business Value of Backup Software
sponsored by Dell, Inc.
WHITE PAPER: This white paper details the business value of pairing hyper-converged infrastructure with next-gen backup software can dramatically increase efficiency and bolster data protection. Read on to learn about how you can deploy storage systems faster, reduce unplanned downtime, and more.
Posted: 02 Sep 2015 | Published: 31 Aug 2015

Dell, Inc.

Using Big Data for Data Security
sponsored by Splunk
WEBCAST: This webcast demonstrates how to accurately determine the threat activity your organization faces.
Posted: 02 Sep 2015 | Premiered: Jan 16, 2014

Splunk

Optimized Sourcing in Hybrid IT Environments: Impacts and Improvements
sponsored by IBM
WHITE PAPER: This white paper explains how multiple-sourced, hybrid IT and business reality is developing and accelerating. Read on to find out how to manage your hybrid IT environment, as well as to engage third-party research that will assess sourcing services for your organization.
Posted: 01 Sep 2015 | Published: 30 Apr 2014

IBM

Shadow Data: Why Traditional Security Leaves Your Organization Vulnerable
sponsored by Elastica
WHITE PAPER: This exclusive white paper reviews Shadow Data trends to provide insights into data security and compliance issues.
Posted: 01 Sep 2015 | Published: 29 Jul 2015

Elastica

How Do Enterprise Data Protection Platform Vendors Stack Up?
sponsored by IBM
WEBCAST: In this webcast, Vinny Choinski, Senior Lab Analyst at Enterprise Strategy Group, examines a software solution designed to protect VMware environments by transferring block-level incremental data from snapshots between virtual environments and the TSM server.
Posted: 01 Sep 2015 | Premiered: Sep 8, 2014

IBM

Big Data Needs Big Storage: Deciding on an Optimal Storage Platform
sponsored by IBM
WHITE PAPER: This white paper outlines 4 selection criteria for deciding on the right storage platform for your big data needs. Read on here to find out how the following can impact your enterprise's analytics and how to select a platform based on the following criteria.
Posted: 01 Sep 2015 | Published: 31 Mar 2015

IBM

Vendor Blueprint for Virtualized Data Protection: Extending to Hyper-V Environments
sponsored by IBM
WHITE PAPER: This ESG Lab Review documents the testing of one data protection solution for virtual environments, with a particular focus on ease of use, flexibility, and architecture efficiency. Access this white paper to protect your VMware and Windows Hyper-V environments.
Posted: 01 Sep 2015 | Published: 31 Jul 2015

IBM

Data Breach Readiness 2.0
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Drawing on insights from more than 400 senior business executives, this research from Experian reveals that many businesses are ill-prepared for data breaches.
Posted: 01 Sep 2015 | Published: 01 Sep 2015

ComputerWeekly.com

How Windows Server 2012 Will Impact Your Windows Storage Pools
sponsored by Dell and Microsoft
EGUIDE: This e-guide describes the steps you need to take to preserve your current storage pools in a Windows Server 2012 environment.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

Dell and Microsoft

Private Cloud: A Compelling Infrastructure Delivery Model
sponsored by Solidfire
WHITE PAPER: Access this white paper to uncover 5 key benefits of building a private cloud and learn why these characteristics make private cloud a compelling infrastructure delivery model to many organizations.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

Solidfire

From the Backroom to the Boardroom: Building A Case for Resiliency and Business Continuity
sponsored by IBM
WHITE PAPER: This white paper serves as a guideline for IT professionals, and explains how to generate investment for resiliency initiatives by linking IT risks to business risk using one resiliency services framework. Access this white paper to learn how to uncover the critical connections between IT and the business.
Posted: 31 Aug 2015 | Published: 31 May 2015

IBM

Build Confidence in Your Resiliency Program Through Functional Validation
sponsored by IBM
WHITE PAPER: This white paper will explore the requirements for a structured approach to exercising the various components of an enterprise resiliency program. Read on here to access the directions for this three-part business resiliency testing process.
Posted: 31 Aug 2015 | Published: 31 Oct 2014

IBM

Accelerate Business Transformation Through IT Innovation: The IT Mandate
sponsored by Dimension Data
WHITE PAPER: This report serves as a comprehensive guide to examine how well enterprise-level companies are embracing a new model of business-responsive data centers and networks to support their innovation.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

Dimension Data

The Price You Pay for a Data Breach
sponsored by IBM
WHITE PAPER: This research report reveals just how much American businesses stand to lose to a cyber-attack, breaking down costs by industry, enterprise size, and more.
Posted: 31 Aug 2015 | Published: 31 May 2015

IBM

Adopt New Enterprise UC Technologies with Speed, Agility, and Security
sponsored by Red Hat
WHITE PAPER: This white paper will introduce you to several third-party collaboration technologies that will help you innovate ahead of business demands. Access this white paper to learn how to select the proper collaboration technologies for you that can foster interoperability in your organization.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

Red Hat

Updated Machine Data Platform Offers Improved Performance
sponsored by Splunk
WEBCAST: This webcast explores a machine data platform that allows organizations to search, navigate, and interact with data that is generated in real time. Watch now to learn more about how all of your data can not only become available and useful, but also how it can be protected with this data platform.
Posted: 31 Aug 2015 | Premiered: Aug 31, 2015

Splunk

Achieving Security Success by Quickly Sifting Through Data
sponsored by Splunk
WEBCAST: This webcast investigates how one company built an analytics-enabled security operations center in less than six months. Watch now to learn more about how this company is able to identify important data points and address security risks in hours rather than days with data monitoring software.
Posted: 31 Aug 2015 | Premiered: Aug 31, 2015

Splunk

What Part Do Service Providers Play In the Cloud?
sponsored by Dell, Inc.
WEBCAST: In this webcast, Stephen Lernihan, EMEA Business Developer at Dell, explains why service providers will play an increasingly key role in defining and evangelizing the possibilities of the cloud. View this webcast here to get a brief look at the role these providers play in the expansion of cloud services.
Posted: 31 Aug 2015 | Premiered: Aug 11, 2015

Dell, Inc.

Coping With the Video “Data Bulge”
sponsored by LTO
WHITE PAPER: This white paper shows how many organizations are turning to updates tape backup technology to protect data from critical apps like video surveillance. Read on to learn more about how the features of this system, like tiered storage, can provide simplified storage management as well as solid protection.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

LTO

Top 8 Identity and Access Management Challenges with Your SaaS Applications
sponsored by Okta
WHITE PAPER: Read this whitepaper to learn the eight main IAM challenges associated with cloud and SaaS application deployment and what you can do to address them. Dive in and discover how you can ensure your company is getting the most out of their SaaS investment.
Posted: 01 Sep 2015 | Published: 30 Nov 2012

Okta
1 - 25 of 2283 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement