IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2296 Matches Previous Page  |  Next Page
Shadow Data Exposed: Data Risk in the Cloud
sponsored by Elastica
WHITE PAPER: In this white paper, you'll learn how to understand the nature and magnitude of the risk associated with file sharing in the cloud.
Posted: 04 Sep 2015 | Published: 31 Dec 2014

Elastica

Cloud Data Management Gains Ground in the Digital Era
sponsored by Commvault
WHITE PAPER: In this exclusive white paper, you will discover how to leverage your cloud investments with single-vendor solutions, as well as how to manage efficiencies using a single-software cloud platform. Access this review now to simplify your data management, reduce security risk, and unlock value from cloud-managed data.
Posted: 04 Sep 2015 | Published: 31 Dec 2014

Commvault

Maintaining Compliance in the New Era of Cloud Apps and Shadow Data
sponsored by Elastica
WHITE PAPER: This white paper examines how to leverage cloud apps and services while staying safe, secure, and compliant.
Posted: 04 Sep 2015 | Published: 31 Dec 2014

Elastica

How to Virtualize Disaster Recovery with Cloud Computing
sponsored by IBM
WHITE PAPER: This white paper outlines how your business can grow securely and thrive in the expanding data universe, bolstered by one enterprise-grade, cloud-enabled disaster planning platform. Access this white paper to learn more about how cloud-based business resilience can provide an alternative to traditional disaster recovery.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IBM

Protecting Your Data in Microsoft Office 365
sponsored by Elastica
WHITE PAPER: This white paper explains why Office 365 increases the risk of malicious or accidental mission-critical data leakage.
Posted: 04 Sep 2015 | Published: 31 Dec 2014

Elastica

Using The Cloud to Improve Business Resilience
sponsored by IBM
WHITE PAPER: This white paper discusses what cloud computing can do to improve your organization's availability and resiliency operations, and how to choose a third-party provider for managed cloud services. Access this report now to find out why cloud resilience is so effective, and more.
Posted: 04 Sep 2015 | Published: 30 Sep 2014

IBM

7 Essential Business Continuity Management Practices
sponsored by IBM
WHITE PAPER: This white paper examines a tested approach for successfully evolving business continuity into an organization-wide, integrated program. Read on now to access the 7 essential BCM practices to improve consistency across your business units.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IBM

The Critical Need for Enterprise-Grade File Sync and Share
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper introduces methodologies for mitigating risks associated with CFSS and lowering the costs of managing corporate information. Read on to learn how enterprise-grade file sync and sharing (EFSS) will enable continued efficiency for users, while putting IT back in charge of corporate content.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IntraLinks, Inc

Upgrade Your BCM with a New Business-Centric Approach
sponsored by IBM
WHITE PAPER: This white paper details IBM's innovative approach to business continuity management (BCM) and uses their experiences as case studies. Read on to get guidance on how you can apply IBM's approach to your organization and proceed to the next level in continuity management.
Posted: 04 Sep 2015 | Published: 30 Apr 2015

IBM

What Canadian Businesses Stand to Lose from Cybercrime
sponsored by IBM
WHITE PAPER: In this report, data from businesses all over Canada is analyzed to reveal how much your organization stands to lose if breached.
Posted: 04 Sep 2015 | Published: 31 May 2015

IBM

Cloud-to-Cloud Backup: Protecting Data from Malicious Intent
sponsored by Barracuda Networks
WHITE PAPER: This white paper explores the data backup and recovery shortcomings of Office 365 and the steps to take to protect data against accidental or malicious loss.
Posted: 04 Sep 2015 | Published: 19 Aug 2015

Barracuda Networks

SEA-TAC Airport Enterprise Storage Strategy Fosters Sustainability
sponsored by Pivot3
WHITE PAPER: This case study demonstrates how the Seattle-Tacoma International Airport developed a plan to deploy a centralized security management system. Read on here to deliver enterprise-class video surveillance IT infrastructure in a simple-to-deploy and scale-out appliance model.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

Pivot3

Is Your High-Value Data Safe?
sponsored by Imation Corp.
WEBCAST: TBD
Posted: 04 Sep 2015 | Premiered: Sep 3, 2015

TOPICS:  Data Security
Imation Corp.

Edison: IBM Spectrum Scale vs EMC Isilon White Paper
sponsored by IBM
WHITE PAPER: This white paper compares two prominent backup systems in terms of throughout and scalability. Read on to see which one performed better, and how you can achieve faster and more thorough backups.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

IBM

Cybersecurity and Data Protection: What Every Board of Directors Should Know
sponsored by Raytheon|Websense
WHITE PAPER: This document presents a non-technical overview of cybersecurity and provides recommendations for board members wishing to keep their organization safe.
Posted: 03 Sep 2015 | Published: 03 Sep 2015

Raytheon|Websense

IDC MarketScape: Worldwide Hyperconverged Systems 2014 Vendor Assessment
sponsored by Dell, Inc.
WHITE PAPER: This white paper does the legwork for you by providing a hyper-converged systems vendor assessment. Read on to learn about the top players in the market so you can make an informed purchasing decision.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

Dell, Inc.

Are You Getting the Most from Your Hybrid IT Environment?
sponsored by IBM
WHITE PAPER: This white paper demonstrates how to find the right sourcing provider for your organization, and highlights several areas in which providers should be effective in hybrid environments.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

IBM

Build Security into Your Data Center's DNA with Micro-Segmentation
sponsored by VMware, Inc.
WHITE PAPER: This white paper introduces a new method of data center security that's based on integrating security controls with the hypervisors.
Posted: 02 Sep 2015 | Published: 02 Sep 2015

VMware, Inc.

Quantifying the Business Value of Backup Software
sponsored by Dell, Inc.
WHITE PAPER: This white paper details the business value of pairing hyper-converged infrastructure with next-gen backup software can dramatically increase efficiency and bolster data protection. Read on to learn about how you can deploy storage systems faster, reduce unplanned downtime, and more.
Posted: 02 Sep 2015 | Published: 31 Aug 2015

Dell, Inc.

Using Big Data for Data Security
sponsored by Splunk
WEBCAST: This webcast demonstrates how to accurately determine the threat activity your organization faces.
Posted: 02 Sep 2015 | Premiered: Jan 16, 2014

Splunk

Optimized Sourcing in Hybrid IT Environments: Impacts and Improvements
sponsored by IBM
WHITE PAPER: This white paper explains how multiple-sourced, hybrid IT and business reality is developing and accelerating. Read on to find out how to manage your hybrid IT environment, as well as to engage third-party research that will assess sourcing services for your organization.
Posted: 01 Sep 2015 | Published: 30 Apr 2014

IBM

Shadow Data: Why Traditional Security Leaves Your Organization Vulnerable
sponsored by Elastica
WHITE PAPER: This exclusive white paper reviews Shadow Data trends to provide insights into data security and compliance issues.
Posted: 01 Sep 2015 | Published: 29 Jul 2015

Elastica

How Do Enterprise Data Protection Platform Vendors Stack Up?
sponsored by IBM
WEBCAST: In this webcast, Vinny Choinski, Senior Lab Analyst at Enterprise Strategy Group, examines a software solution designed to protect VMware environments by transferring block-level incremental data from snapshots between virtual environments and the TSM server.
Posted: 01 Sep 2015 | Premiered: Sep 8, 2014

IBM

Big Data Needs Big Storage: Deciding on an Optimal Storage Platform
sponsored by IBM
WHITE PAPER: This white paper outlines the 4 important requirements to consider when deciding on the right storage platform for your big data needs. Read on to find out how the following can impact your enterprise's analytics.
Posted: 01 Sep 2015 | Published: 31 Mar 2015

IBM

Top 8 Identity and Access Management Challenges with Your SaaS Applications
sponsored by Okta
WHITE PAPER: Read this whitepaper to learn the eight main IAM challenges associated with cloud and SaaS application deployment and what you can do to address them. Dive in and discover how you can ensure your company is getting the most out of their SaaS investment.
Posted: 01 Sep 2015 | Published: 30 Nov 2012

Okta
1 - 25 of 2296 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement