IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2741 Matches Previous Page  |  Next Page
IT Project: Storage Architecture ANZ
sponsored by ComputerWeekly.com
EGUIDE: When it comes to storage, there are usually two main factors to consider – cost and performance. However, every organisation has its own unique set of requirements and this will inevitably shape their storage strategy. Inside this guide, we look at some examples of the strategies organisations are adopting to effectively store and manage data.
Posted: 29 Sep 2016 | Published: 28 Sep 2016

ComputerWeekly.com

Veritas Enterprise Vault Health Check Tool: Monitor, Analyze and Report on Areas of Critical Importance
sponsored by Globanet Veritas
DATA SHEET: This data sheet highlights an enterprise vault health check tool that provides automated Veritas Enterprise Vault archive analysis and reporting to help with the performance and integrity of your key data archives.
Posted: 29 Sep 2016 | Published: 31 Dec 2015

Globanet Veritas

Compliant Digital Identity Protection for Healthcare
sponsored by VASCO Data Security International
WHITE PAPER: Discover how you can protect identities, safeguard patient records, and enable compliance with regulations - all without disrupting fast access to healthcare applications and patient information. Learn how to make threats less threatening and ensure smooth patient care throughout your organization.
Posted: 29 Sep 2016 | Published: 31 Dec 2015

VASCO Data Security International

Data Archiving Solutions - Archive Data with Industry Leading Systems
sponsored by Globanet Veritas
RESOURCE CENTER: All types of companies rely on their data and need archiving solutions to protect it. This resource center highlights a service provider that deploys industry-leading archive systems and solutions for organizations worldwide. Learn about this provider's professional on-site and remote support that can meet your organization's every need.
Posted: 28 Sep 2016 | Published: 14 Jun 2016

Globanet Veritas

What to Look for in Web Fraud Detection Systems
sponsored by SearchSecurity.com
EBOOK: In this TechTarget Buyer's Guide readers will learn the key features of a Web fraud detection product and how to choose the best product for their company.
Posted: 28 Sep 2016 | Published: 23 Mar 2016

SearchSecurity.com

5 Steps to Keeping Your Data Safe with a Content Mobility Solution
sponsored by Hitachi Data Systems
DATA SHEET: Explore a five step roadmap to help you choose the right content mobility platform for your organization and learn how you can eliminate information silos that handle different regulations, applications, and data types.
Posted: 28 Sep 2016 | Published: 31 Dec 2015

Hitachi Data Systems

The Rising Face of Cyber Crime Ransomware
sponsored by BitSight
WHITE PAPER: Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Download the latest BitSight Insight report to find out how ransomware affects each industry, and what organizations can do to prevent it.
Posted: 28 Sep 2016 | Published: 31 Aug 2016

BitSight

IT Project: Storage Architecture ASEAN
sponsored by ComputerWeekly.com
EGUIDE: When it comes to storage, is cost the critical factor for CIOs in ASEAN? This guide explores the factors that are influencing the adoption of storage technologies in ASEAN and the trends that you can expect to see more of in the next 2-3 years.
Posted: 27 Sep 2016 | Published: 28 Sep 2016

ComputerWeekly.com

Critical Security and Compliance Considerations for Hybrid Cloud Deployments
sponsored by Hewlett Packard Enterprise
ANALYST REPORT: Discover the state of hybrid cloud security and compliance in 2016, and access the most effective approaches to clearing a path for broader hybrid cloud deployments. Read on to overcome compliance challenges in your hybrid cloud infrastructure, including guidance on securing the movement of workloads.
Posted: 27 Sep 2016 | Published: 31 Jul 2016

Hewlett Packard Enterprise

Comparative Overview of File Sync and Share Platforms
sponsored by Hitachi Data Systems
WHITE PAPER: Discover a fully-integrated, on-premises platform for safe, secure file sharing and synchronization to allow employees to safely create and share content from mobile devices without compromising data security. Also, gain access to a comparative guide which looks at key categories of file sync and share tools.
Posted: 27 Sep 2016 | Published: 30 Jan 2015

Hitachi Data Systems

Disaster Recovery’s Treacherous Terrain
sponsored by IBM
RESOURCE: Can your business continuity team navigate today's challenging environment? Access this infographic to take a look at today's DR landscape, and discover how other pros are using analytics to predict service disruptions, all under the pressure of meeting rapidly rising business leaders' expectations of DR capabilities.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

IBM

File Sync and Share: There’s Too Much at Stake to Compromise
sponsored by Hitachi Data Systems
WHITE PAPER: Learn about an enterprise file sync-and-share strategy that gives employees immediate access to files without bandwidth constraints or concerns over file size while giving IT a security control system over every file.
Posted: 27 Sep 2016 | Published: 30 Jan 2015

Hitachi Data Systems

Get the Most out of your SIEM System
sponsored by Trustwave
EGUIDE: SIEM platforms remove a huge burden from your security team and allow them to focus on other analysis-related tasks. However, SIEM systems are not infallible. Discover how to better employ your SIEM system to produce the most accurate event analysis you can hope for.
Posted: 27 Sep 2016 | Published: 23 Sep 2016

Trustwave

Masters of Disaster Recovery: How Highly Resilient Organizations Excel
sponsored by IBM
WHITE PAPER: Why are some companies better at mastering disaster recovery in the face of today's "always-on" expectations? Download this report to discover just that, as evidenced by a survey of 310 BCDR professionals. In addition, learn how to formulate a battle-tested recovery plan based on the expert insights illustrated.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

IBM

Securing & enabling the Mac-empowered enterprise
sponsored by Code42
WHITE PAPER: This white paper explains how you can create a comprehensive security program for your business. Learn to implement self-service restoration, total data visibility for your IT department, integrated management of PC's and Macs, and more.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

Code42

2016 Cost of Data Breach Study: Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: The Ponemon Institute surveyed 383 companies in 16 industry sectors about their experience with data breaches. Learn how the majority of these companies are solving breaches efficiently and cost-effectively with business continuity management (BCM.)
Posted: 26 Sep 2016 | Published: 30 Jun 2016

IBM

Accelerating Digital Transformation with Data-Driven Security
sponsored by Akamai
ANALYST REPORT: This IDC report talks about digital transformation as a top driver for the IT industry and its security implications today. Discover how to keep sensitive files secure and your organization running smoothly even through the shift.
Posted: 26 Sep 2016 | Published: 31 May 2016

Akamai

Battling Malware, Intrusion, and Insider Threats with Endpoint Data Protection
sponsored by Code42
WHITE PAPER: With the growing popularity of third-party apps and BYOD initiatives, it's becoming increasingly difficult to secure your data from malware. Use this white paper to explore the potential ways in which endpoint data protection can help you build a security network focused around saving each piece of data for reliable access and retrieval.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Code42

Two-Factor Authentication Protects Health Data
sponsored by VASCO Data Security International
WHITE PAPER: Discover how strong authentication and digital identity management can increase health data security while making it easier for providers to do their work. This paper also explores how patients can use this method to view and download health records from multiple portals while increasing privacy protection.
Posted: 26 Sep 2016 | Published: 31 Aug 2016

VASCO Data Security International

Situational Awareness Monitoring Helps US Government Agency Meet Cybersecurity Requirements
sponsored by Gigamon
WHITE PAPER: This white paper describes how the HHS was able to meet their rigid security requirements in an era of rising malicious cybersecurity threats. Discover how they were able to achieve pervasive visibility of all network traffic across geographically dispersed locations and keep their massive amount of private information safe.
Posted: 26 Sep 2016 | Published: 31 Dec 2015

Gigamon

Safeguarding Vital Data Is a Battle You Can Win
sponsored by Intel Security
WHITE PAPER: In this resource, uncover what it means to develop data management and protection policies that reach from the core of the business out to mobile devices, the cloud and beyond. Also, learn how to be ready for whatever security challenges the world sends your way.
Posted: 24 Sep 2016 | Published: 24 Sep 2016

Intel Security

Harnessing the Power of Metadata for Security
sponsored by Gigamon
WHITE PAPER: Discover how metadata, rich in context, can help analyze security metrics faster to enable rapid threat remediation.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

Gigamon

Recovering From Ransomware Starts with a Data Protection Strategy
sponsored by Dell Software
EGUIDE: Stopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.
Posted: 27 Sep 2016 | Published: 22 Sep 2016

Dell Software

Reeling in Ransomware Data Protection for You and Your Users
sponsored by Code42
WHITE PAPER: In this white paper, learn how you can protect your devices and negate the effects of ransomware. Explore how continuous endpoint backup enables IT to quickly and easily restore files to minutes before the infection, as well as ensures that those files are healthy with no end-user intervention required.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Code42

Ransomware Protection is Futile, but All Hope is Not Lost
sponsored by Dell Software
EGUIDE: Discover how you can avoid ransomware and save your critical files. Get advice from IT experts Trevor Pott, Michael Stump, and Timothy Warner on ways to fortify Windows systems and throw up roadblocks to make ransomware attacks less dangerous.
Posted: 26 Sep 2016 | Published: 21 Sep 2016

Dell Software
1 - 25 of 2741 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement