IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2305 Matches Previous Page  |  Next Page
Keep Your Data Secure in the Wake of the Heartbleed OpenSSL Vulnerability
sponsored by Symantec Website Security
EGUIDE: In this e-guide, learn about the web security implications of Heartbleed, the security defect found in several OpenSSL versions. View now to find out whether your enterprise should be concerned and how to protect your data from this bug.
Posted: 11 Feb 2016 | Published: 09 Feb 2016

Symantec Website Security

Five Keys to Big Data Audit and Protection
sponsored by Imperva
WHITE PAPER: Read this white paper to learn how multi-layer big data architectures increase vulnerabilities and what requirements are essential for big data audit and protection.
Posted: 11 Feb 2016 | Published: 29 Dec 2015

Imperva

3 Steps to Implementing an Effective BYOD Mobile Security Strategy
sponsored by Kingpin Communications
WHITE PAPER: This white paper identifies three key steps that help to secure your mobility in a way that maximizes its benefits. Download now to get access to a checklist of capabilities you can use when evaluating mobile security solutions to ensure you can get the most out of your mobility initiatives.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Kingpin Communications

The Top 4 Most Pressing Android Mobile Cybersecurity Threats
sponsored by Kingpin Communications
WHITE PAPER: In this paper, you will break down the most common types of attacks that impact Android mobile devices. Read on to enact comprehensive protection against threats to Android, and prepare your mobile endpoints against mRATS, zero-day attacks, and more.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Kingpin Communications

Exposing the Unknown: How Sandboxing Technology Fights Modern Threats
sponsored by Kingpin Communications
WHITE PAPER: This white paper takes a look at the modern threat landscape, including zero-day attacks and advanced persistent threats (APT), and the consequences of not protecting your company's data and networks. Access now to learn how traditional sandboxing compares to advanced sandbox solutions.
Posted: 11 Feb 2016 | Published: 30 Jun 2015

Kingpin Communications

Using Veeam and VMware vSphere Tags for Advanced Policy-driven Data Protection
sponsored by Veeam Software
WHITE PAPER: This white paper defines activities that will protect workloads based on the “desired state” that their users will define for their workloads.
Posted: 11 Feb 2016 | Published: 31 Dec 2015

Veeam Software

How Mobile Malware Compromises Your Secure Containers and Enterprise Content
sponsored by Kingpin Communications
WHITE PAPER: Mobile operating systems contain a large number of exploitable vulnerabilities related to access privileges. In this white paper, you will learn how mobile malware could compromise your secure containers and enterprise content, and discover how to detect suspicious mobile activity.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Kingpin Communications

DataGravity and Continuous Sensitive Data Monitoring
sponsored by DataGravity
WHITE PAPER: This white paper discusses tools and technologies that will help in the mitigation, detections and response to risks within your network.
Posted: 11 Feb 2016 | Published: 31 Jul 2015

DataGravity

Checkpoint: Demystifying Mobile Security Attacks
sponsored by Kingpin Communications
WHITE PAPER: In the following white paper, you will examine some of the most common mobile attacks, and moreover demystify how the attacks work and the damage they can cause. Access this paper to arm yourself and identify how to best detect Android malware applications and rootkits, man-in-the-middle attacks, and more.
Posted: 11 Feb 2016 | Published: 30 Mar 2015

Kingpin Communications

Data Management in the Modern World
sponsored by DataGravity
WHITE PAPER: This white paper will help you get a handle on securing your data. It offers guidance and solutions to the vexing challenges of managing and protecting all of your organization's important information.
Posted: 11 Feb 2016 | Published: 27 Jan 2016

DataGravity

Physical vs. Virtual Desktop Security: It's Just Not The Same
sponsored by Dell
EGUIDE: This e-guide shows you the difference in security methods for virtual and physical desktops. Learn about different techniques and audiences each platform is catered to.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell

Virtual Desktop Security: Exploring VDI Features
sponsored by Dell
EGUIDE: This white paper discusses various virtual desktop security capabilities offered by VDI products. Some of the capabilities described within include encryption, application and role-based policy management and virtual sandboxing.
Posted: 10 Feb 2016 | Published: 02 Feb 2016

Dell

Gartner Market Guide for Data-Centric Audit and Protection
sponsored by Imperva
WHITE PAPER: New Gartner Market Guide for Data-Centric Audit and Protection describes the 5 DCAP capabilities that CISOs need for databases, files, big data, SaaS and IaaS. Download the guide for key findings and recommendations – and find out what Gartner has to say about Imperva DCAP capabilities across data silos.
Posted: 10 Feb 2016 | Published: 15 Dec 2015

Imperva

Layered Security Doesn't Stop Cybercriminals – but VDI Might
sponsored by Dell
EGUIDE: This e-guide discusses ways cybercriminals successfully breach enterprise security and why VDI might be a better approach.
Posted: 10 Feb 2016 | Published: 03 Feb 2016

Dell

Breach Detection System: Detecting the Pros and Cons
sponsored by Fortinet, Inc.
ANALYST REPORT: In this report by NSS Labs, independent experts take a closer look at a breach detection system. Evaluate the strengths, weaknesses, opportunities, and threats of this network security approach to determine if it's the right step for your enterprise.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Fortinet, Inc.

Sandbox Technology: Building an Effective Breach Detection and Response Strategy
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper highlights the use of sandboxes in conjunction with established security infrastructure for threat and data breach protection. Read on to learn the best practices for choosing a sandbox solution that will be successful in protecting your networks and infrastructures.
Posted: 10 Feb 2016 | Published: 31 Oct 2015

Fortinet, Inc.

Backup is Broken
sponsored by LogicNow
WHITE PAPER: This white paper discusses modern ways to backup up data, including a disk-to-disk-to-cloud (D2D2C) backup strategy. Read on to discover how to find the right architecture and vendor partner to help your enterprise deliver fast, secure, and reliable backup in a cloud-based environment.
Posted: 10 Feb 2016 | Published: 31 Dec 2014

LogicNow

4 Business Continuity Best Practices Every MSP Should Follow
sponsored by LogicNow
WHITE PAPER: This whitepaper highlights four business continuity and data backup best practices to help ensure reliable disaster recovery and minimal downtime. In addition, explore how employing a holistic business continuity strategy with virtual disaster recovery services can enable your enterprise to keep your data secure and improve your RTO.
Posted: 10 Feb 2016 | Published: 31 Dec 2014

LogicNow

Accelerating Big Data Collection and DataFlow Management
sponsored by Hortonworks
WHITE PAPER: This white paper highlights a data management platform that combines data acquisition, simple event processing, and transport and delivery to accommodate highly diverse and complicated dataflow. Read on to see how this platform can enable your enterprise to simplify your big data ingest and increase security for collection and sharing of your data.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Hortonworks

Data-Aware Storage: Introducing a New Era of Data Management
sponsored by DataGravity
RESOURCE CENTER: This white paper shows you a new way to store data: data-aware storage. This storage architecture combines state-of-the-art primary storage with integrated data services to create an entirely new method of storage.
Posted: 09 Feb 2016 | Published: 31 Dec 2015

DataGravity

Tips and Tricks for Leveraging NetApp Storage
sponsored by Veeam Software
WHITE PAPER: This white paper discusses a backup & replication technology that can be integrated with NetApp storage platforms to reduce the RPO and RTO of your data operations. Read on for some expert tips and tricks to leverage this technology so that your enterprise can benefit from faster backups and simplified recovery.
Posted: 08 Feb 2016 | Published: 31 Dec 2015

Veeam Software

Making the Business Case for Moving to the Cloud
sponsored by Carbonite
WHITE PAPER: This white paper acts as a comprehensive guide to cloud backup and data protection. Discover expert tips and best practices to help you build the strongest business case for moving to the cloud, and also learn more about cloud backup, its customizability and hybrid capabilities.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

Carbonite

Comparing Security Features of Old and New Operating System Rollouts
sponsored by Microsoft
WHITE PAPER: This quick guide offers a side-by-side comparison of what to expect between legacy and emerging operating systems. Discover details on how important security features have evolved.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Microsoft

Security Operations in the Cloud
sponsored by TrendMicro
WHITE PAPER: This white paper discusses some best practices to adopt in securing workloads in Amazon Web Services.
Posted: 05 Feb 2016 | Published: 31 Jan 2016


Cisco Advanced Malware Protection Leads Again in NSS Test
sponsored by Cisco
WHITE PAPER: In this white paper, you will learn how to reduce both detection time and remediation time. Go beyond point-in-time detection with your security solutions.
Posted: 05 Feb 2016 | Published: 31 Dec 2015

Cisco
1 - 25 of 2305 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement