IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2315 Matches Previous Page  |  Next Page
Computer Weekly – 16 February 2016: How AstraZeneca saved $350m by insourcing IT
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to pharmaceutical giant AstraZeneca to find out why it brought its outsourced IT back in-house, saving $350m per year as a result. We ask if the new EU/US Privacy Shield agreement will protect citizens' data. And we examine the relative merits of datacentre colocation and the cloud. Read the issue now.
Posted: 12 Feb 2016 | Published: 12 Feb 2016

ComputerWeekly.com

Solution Brief: Satisfying Today's Bandwidth Hungry Consumers
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights a high performance next generation firewall solution that protects information and applications without slowing down your network or affecting availability. Read on to see how this firewall solution can provide your enterprise with in-depth visibility and reporting, highly effective intrusion prevention system, and more.
Posted: 12 Feb 2016 | Published: 31 Dec 2014

Fortinet, Inc.

Top 5 Solution Requirements for Account Takeover Protection
sponsored by Imperva
WHITE PAPER: Download this playbook and learn five solution requirements for effective account takeover protection.
Posted: 12 Feb 2016 | Published: 30 Dec 2015

Imperva

Unstructured Data: Friend or Foe?
sponsored by DataGravity
WHITE PAPER: This white paper teaches you how to unlock the value of unstructured data through file analysis, text analysis and visualization.
Posted: 12 Feb 2016 | Published: 27 Jan 2016

DataGravity

Why Every IT Organization Needs Software Defined Storage Automation and Management
sponsored by EMC
JOURNAL ARTICLE: This article discusses how software defined storage (SDS) automation and management enables efficient, fast provisioning and ensures your data is secure. Learn how SDS technology can allow your enterprise to provision your storage more rapidly and cost-effectively, and enforce best practices to help you meet service-level commitments.
Posted: 12 Feb 2016 | Published: 12 Feb 2016

EMC

Is your sensitive data lurking on the ‘dark Web’?
sponsored by Digital Shadows
WHITE PAPER: This white paper helps you identify and react to the loss or exposure of important information after the fact.
Posted: 12 Feb 2016 | Published: 06 Nov 2015

Digital Shadows

Storage: Cutting Through the White Noise
sponsored by Icomm Technologies
WHITE PAPER: This whitepaper examines the current trends and influences around storage options, specifically the pros and cons of cloud storage vs. on premise solutions. Read on to learn what solution is the right fit for your enterprise so that you can address the challenges of your expanding data volumes.
Posted: 12 Feb 2016 | Published: 12 Feb 2016

Icomm Technologies

There's More to Backing Up VMs Than Meets the Eye
sponsored by Veeam Software
WHITE PAPER: This whitepaper highlights a built-in infrastructure for application backups that can enable the full backups of virtual environments. Read on to see how this infrastructure, combined with Veeam's backup and recovery solutions, can provide your virtual environments with a wide array of backup, recovery, and replication functionalities.
Posted: 12 Feb 2016 | Published: 12 Feb 2016

Veeam Software

Security Checkup: Diagnose PCI DSS Compliance for Your Hadoop
sponsored by Hortonworks
WHITE PAPER: In this white paper, you will learn how to build PCI compliance into your Hadoop environment. Read this paper to gain all you need to know about Hadoop authentication, perimeter security, customer data protection, and more.
Posted: 12 Feb 2016 | Published: 31 Oct 2015

Hortonworks

Choosing an Online Backup Tool: Why Speed Should Be a Key Consideration
sponsored by LogicNow
WHITE PAPER: This whitepaper explores an online backup solution that speeds up the process of identifying what files have been changed so that backup windows can focus on actual backups, making them faster and more efficient. Read on to see how this solution can allow your enterprise to eliminate the hassle of slow backups.
Posted: 12 Feb 2016 | Published: 31 Dec 2015

LogicNow

Maximize Performance and Data Availability for Virtualized Environments
sponsored by Quantum Corporation
WHITE PAPER: This brief whitepaper highlights a backup and restoration software combined with a tiered storage infrastructure that allows the use of any combination of disk, cloud, or tape for data protection. Read on to see the benefits these technologies can provide to your enterprise, including maximized data availability, faster data recovery, and more.
Posted: 12 Feb 2016 | Published: 31 Jan 2016

Quantum Corporation

Keep Your Data Secure in the Wake of the Heartbleed OpenSSL Vulnerability
sponsored by Symantec Website Security
EGUIDE: In this e-guide, learn about the web security implications of Heartbleed, the security defect found in several OpenSSL versions. View now to find out whether your enterprise should be concerned and how to protect your data from this bug.
Posted: 11 Feb 2016 | Published: 09 Feb 2016

Symantec Website Security

Five Keys to Big Data Audit and Protection
sponsored by Imperva
WHITE PAPER: Read this white paper to learn how multi-layer big data architectures increase vulnerabilities and what requirements are essential for big data audit and protection.
Posted: 11 Feb 2016 | Published: 29 Dec 2015

Imperva

3 Steps to Implementing an Effective BYOD Mobile Security Strategy
sponsored by Kingpin Communications
WHITE PAPER: This white paper identifies three key steps that help to secure your mobility in a way that maximizes its benefits. Download now to get access to a checklist of capabilities you can use when evaluating mobile security solutions to ensure you can get the most out of your mobility initiatives.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Kingpin Communications

The Top 4 Most Pressing Android Mobile Cybersecurity Threats
sponsored by Kingpin Communications
WHITE PAPER: In this paper, you will break down the most common types of attacks that impact Android mobile devices. Read on to enact comprehensive protection against threats to Android, and prepare your mobile endpoints against mRATS, zero-day attacks, and more.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Kingpin Communications

Exposing the Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Kingpin Communications
WHITE PAPER: This white paper takes a look at the modern threat landscape, including zero-day attacks and advanced persistent threats (APT), and the consequences of not protecting your company's data and networks. Access now to learn how traditional sandboxing compares to advanced sandbox solutions.
Posted: 11 Feb 2016 | Published: 30 Jun 2015

Kingpin Communications

Using Veeam and VMware vSphere Tags for Advanced Policy-driven Data Protection
sponsored by Veeam Software
WHITE PAPER: This white paper defines activities that will protect workloads based on the “desired state” that their users will define for their workloads.
Posted: 11 Feb 2016 | Published: 31 Dec 2015

Veeam Software

How Mobile Malware Compromises Your Secure Containers and Enterprise Content
sponsored by Kingpin Communications
WHITE PAPER: Mobile operating systems contain a large number of exploitable vulnerabilities related to access privileges. In this white paper, you will learn how mobile malware could compromise your secure containers and enterprise content, and discover how to detect suspicious mobile activity.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Kingpin Communications

DataGravity and Continuous Sensitive Data Monitoring
sponsored by DataGravity
WHITE PAPER: This white paper discusses tools and technologies that will help in the mitigation, detections and response to risks within your network.
Posted: 11 Feb 2016 | Published: 31 Jul 2015

DataGravity

Checkpoint: Demystifying Mobile Security Attacks
sponsored by Kingpin Communications
WHITE PAPER: In the following white paper, you will examine some of the most common mobile attacks, and moreover demystify how the attacks work and the damage they can cause.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Kingpin Communications

Data Management in the Modern World
sponsored by DataGravity
WHITE PAPER: This white paper will help you get a handle on securing your data. It offers guidance and solutions to the vexing challenges of managing and protecting all of your organization's important information.
Posted: 11 Feb 2016 | Published: 27 Jan 2016

DataGravity

Physical vs. Virtual Desktop Security: It's Just Not The Same
sponsored by Dell
EGUIDE: This e-guide shows you the difference in security methods for virtual and physical desktops. Learn about different techniques and audiences each platform is catered to.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell

Virtual Desktop Security: Exploring VDI Features
sponsored by Dell
EGUIDE: This white paper discusses various virtual desktop security capabilities offered by VDI products. Some of the capabilities described within include encryption, application and role-based policy management and virtual sandboxing.
Posted: 10 Feb 2016 | Published: 02 Feb 2016

Dell

Gartner Market Guide for Data-Centric Audit and Protection
sponsored by Imperva
WHITE PAPER: New Gartner Market Guide for Data-Centric Audit and Protection describes the 5 DCAP capabilities that CISOs need for databases, files, big data, SaaS and IaaS. Download the guide for key findings and recommendations – and find out what Gartner has to say about Imperva DCAP capabilities across data silos.
Posted: 10 Feb 2016 | Published: 15 Dec 2015

Imperva

Seven Keys to a Secure Data Solution: How to Choose the Right Data Centric Audit and Security Solution
sponsored by Imperva
WHITE PAPER: Read this paper to learn how real-time visibility and blocking maximize protection, why intelligent automation lowers TCO, and what key solution features enable fast time to value.
Posted: 12 Feb 2016 | Published: 16 Dec 2015

Imperva
1 - 25 of 2315 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement