IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2649 Matches Previous Page  |  Next Page
Analyzing the Top 8 Indicators of Threat Traffic
sponsored by LogRhythm, Inc.
WHITE PAPER: While endpoint security tools assist with the detection of a compromised endpoint, the analysis of anomalous network traffic is critical to detecting ongoing compromised systems. Read on for details on the top 8 indicators of compromise in network traffic.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

LogRhythm, Inc.

Clayton Utz Achieves Information Security and Data Protection Goals
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this case study, you'll learn how one law firm ensured simple administration of the rapid growth in data for them and their clients. Read on and discover ways to support business and IT requirements for cost-effective data storage.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

Hewlett-Packard Enterprise

An MSP Guide to Selling IT Security
sponsored by LogicNow
WEBCAST: Discover a roadmap to enhance your MSP offering with security services, a detailed methodology in taking a layered security approach, and 5 tips for selling IT security. Access now to unveil how to expand upon your existing toolkit and evolve your MSP to an MSSP.
Posted: 07 Dec 2016 | Premiered: Dec 7, 2016

LogicNow

Turning Data Protection into a Game Changer for MSPs
sponsored by LogicNow
WHITE PAPER: Learn how to not only manage customers' hardware and software but also their data as well, protecting customer's confidential or regulated data, managing their vulnerabilities and demonstrating the value of these activities in easy to understand formats.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

LogicNow

StorageCraft Cloud Backup for Office 365
sponsored by StorageCraft Technology Corporation
WHITE PAPER: This white paper describes a cloud backup product designed for Office 365. The article explains key features and benefits of this flexible, easy-to-use solution for the protection, management and recovery of Office 365 data.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

StorageCraft Technology Corporation

Ransomware: Mitigating the Threat
sponsored by Zerto
WHITE PAPER: Discover more about recent advancements in ransomware, where it's going and what you can do you protect your files. Learn steps you must take before a ransomware attack hits to ensure its crippling affects don't threaten your business.
Posted: 07 Dec 2016 | Published: 30 Nov 2016

Zerto

StorageCraft Cloud Backup at a Glance
sponsored by StorageCraft Technology Corporation
WHITE PAPER: This white paper describes a cloud backup product and outlines key features surrounding its ease of use, security, recoverability and customization.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

StorageCraft Technology Corporation

Overcome Storage Capacity Conundrums Created by Data-driven Genomics Approaches
sponsored by Pure Storage
WHITE PAPER: Download this resource to support the massive growth rate of data in precision medicine with a smart storage architecture that enables superior performance in a high-density form factor. Learn how to overcome the capacity constraints of legacy storage with a platform that will improve the clinician experience.
Posted: 07 Dec 2016 | Published: 07 Dec 2016

Pure Storage

The Current State of Data Protection in Midsize Organizations
sponsored by arcserve
WHITE PAPER: Better understand why and how IT strategies are evolving with this survey of 283 IT service providers, resellers and consultants. Discover today's key data protection trends and concerns faced by midsize organizations.
Posted: 06 Dec 2016 | Published: 30 Nov 2016

arcserve

Revitalizing Storage Infrastructure: AUT Tackles Expanding Data Problems
sponsored by Hewlett-Packard Enterprise
CASE STUDY: Follow Aukland University of Technology's journey to discovering a secure storage platform that radically improved their ability to deliver high performance storage capabilities to staff and students. Discover how they enabled better data management, shored up their infrastructure with enhanced backups, and more.
Posted: 06 Dec 2016 | Published: 30 Sep 2016

Hewlett-Packard Enterprise

Case Study: The Yield Transforms Australian Agriculture with IoT
sponsored by Microsoft
VIDEO: Tune into this case study as The Yield demonstrates how they transform agriculture decision-making by delivering the data they garner with IoT strategies to industry regulators for fast and informed decisions. Discover how to leverage IoT in the field to turn usable information into real-time actionable insight.
Posted: 05 Dec 2016 | Premiered: 15 Nov 2016

Microsoft

A Powerful Next-Gen Antivirus Solution
sponsored by Carbon Black
WEBCAST: Traditional AV simply doesn't cut it anymore. Discover how to stop new and emerging malware threats, including zero-day ransomware attacks, from owning your database and holding your data hostage. Empower your security team to stop the most attacks, see more threats and close more security gaps.
Posted: 05 Dec 2016 | Premiered: Nov 30, 2016

Carbon Black

APIs and Mobile: Creating an Integrated Physical-Digital Consumer Experience
sponsored by TIBCO Software Inc.
WHITE PAPER: Learn how retailers are leveraging APIs to improve mobile strategies and enhance consumer engagement. Discover how APIs make your digital assets consumable in any sort of app across a variety of platforms, allowing you to improve customer experiences without sacrificing security for sensitive data.
Posted: 02 Dec 2016 | Published: 03 Oct 2016

TIBCO Software Inc.

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PODCAST: Today's healthcare organizations are struggling to meet the demands of reform while maintaining security and privacy for patients. Tune into this podcast as leaders from the nation's leading health systems discuss why application virtualization is reshaping care delivery and improving security.
Posted: 01 Dec 2016 | Premiered: Nov 17, 2016

Citrix and Pure Storage

How Virtualization is Transforming Technology Delivery in Healthcare
sponsored by Citrix and Pure Storage
PRESENTATION TRANSCRIPT: Today's healthcare organizations are struggling to meet the demands of physicians while maintaining security and privacy for patients. Download this resource as industry leaders demonstrate how application virtualization is reshaping care delivery and improving security.
Posted: 01 Dec 2016 | Published: 01 Dec 2016

Citrix and Pure Storage

Reasonable Security Best Practices: Learning From Notable Data Breaches
sponsored by Global Knowledge
WHITE PAPER: Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a data breach. But what is "reasonable security," and is there a definition?
Posted: 01 Dec 2016 | Published: 28 Nov 2016

Global Knowledge

5 Questions to Ask Data Protection Vendors
sponsored by Commvault
WHITE PAPER: Protecting your data is paramount to your business continuity and success, so you should be asking the tough questions to any data protection vendor you're considering. Discover 5 questions to ask data protection and information management vendors.
Posted: 01 Dec 2016 | Published: 30 Nov 2016

Commvault

8 Decisive Factors For A Successful Employee Engagement Program
sponsored by IBM
WHITE PAPER: Employee engagement programs help both the employee and the organization, and improve the overall chance of success. Access this study to uncover which 8 factors determine an employee engagement program's success.
Posted: 30 Nov 2016 | Published: 29 Apr 2016

IBM

Comparing Data Protection and Information Management Vendors
sponsored by Commvault
WHITE PAPER: Uncover a comparison of two data protection and information management vendors. Learn differences on 5 important factors, such as scalability, innovation, value, and more.
Posted: 30 Nov 2016 | Published: 31 Oct 2016

Commvault

Important Considerations for Comparing Data Protection Vendors
sponsored by Commvault
WHITE PAPER: What should you look for when comparing data protection vendors? Discover how factors like the scope of your data, cloud storage and, most importantly, risk should affect your decision.
Posted: 30 Nov 2016 | Published: 31 Oct 2016

Commvault

Top Reasons Why Customers Deploy Flash Storage
sponsored by TechData - EMC
WHITE PAPER: Discover a modern, all-flash storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver improved flash economics. See the benefits your enterprise can take advantage of with this technology.
Posted: 30 Nov 2016 | Published: 30 Apr 2016

TechData - EMC

Top Reasons Why Customers Deploy Hybrid Storage
sponsored by TechData - EMC
WHITE PAPER: Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology.
Posted: 29 Nov 2016 | Published: 30 Apr 2016

TechData - EMC

Building Better Business Analytics to Improve BI
sponsored by Pyramid Analytics
RESOURCE: Many organizations struggle with inefficient, overly complex business intelligence processes that leave them with fragmented data and incomplete information. Discover a business intelligence platform that empowers users outside of IT to dive into data, with the security of a governed analytics environment.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

Pyramid Analytics

The Evolution of Cloud Security: Perception vs. Reality
sponsored by BitGlass
WHITE PAPER: This survey of over 2,200 cybersecurity professionals offers insight into both the current perception and the reality of cloud security. Access now to learn more about how security is catching up with cloud apps, and affecting areas like shadow IT, legacy security tools, popular business apps like Office 365, and more.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

Protecting the Distributed Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to protect your distributed enterprise without compromising data access. Uncover the 5 requirements for a distributed enterprise firewall.
Posted: 28 Nov 2016 | Published: 31 Oct 2016

Fortinet, Inc.
1 - 25 of 2649 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement