IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2690 Matches Previous Page  |  Next Page
Facing Network Breach Threats, Visibility Is Key
sponsored by Intel
EGUIDE: If the past three years have taught network managers anything, it's that everyone is vulnerable to a network breach by cybercriminals. Andy McInerney, data network and voice manager at Penn Mutual, one of the oldest mutual life insurance companies in the US, reveals what his business is doing to stop it.
Posted: 26 May 2016 | Published: 17 May 2016

Intel

IDC Server Security: Virtualization and Cloud Changes Everything
sponsored by TrendMicro
WHITE PAPER: Server security prevents the injection of malware into servers and protects the servers from attacks. Learn the many functions server security offers you and how to control them all from a single pan of glass.
Posted: 26 May 2016 | Published: 01 Apr 2016

TrendMicro

Complete Data Protection (Advanced) - Data Sheet
sponsored by Intel Security
WHITE PAPER: Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.
Posted: 26 May 2016 | Published: 01 Apr 2016

Intel Security

Data Loss Prevention Best Practices for Health Care
sponsored by Intel Security
WHITE PAPER: Employing sound data loss prevention practices helps ensure the safe handling of data and provides the flexible environment required by clinical staff. Learn how to properly classify data and utilize monitoring technology to continuously track data location and movement across your network.
Posted: 26 May 2016 | Published: 01 Apr 2016

Intel Security

Why Converged Backup Platforms is Your Key to Scalability
sponsored by Veritas
DATA SHEET: Discover how one converged backup platform compares to its competitors, matching up VADP performance results, storage-array snapshots-based backup, and concurrent application restores. Read on to see how this solution can lower your total backup costs, improve your overall backup performance, and create better system utilization.
Posted: 26 May 2016 | Published: 31 Dec 2015

Veritas

Put Time On Your Side: The Heavy Cost Of Putting Off Your Cybersecurity Decisions Enterprise
sponsored by Kaspersky Lab
WHITE PAPER: A lot can happen in a business day. Deals close. Products launch. News items hit the airwaves. In fact, at Kaspersky Lab, we detect 310,000 new pieces of malware every day, which means that every day you put off the decision to upgrade your IT security system is a day that thousands of pieces of new malware can slip through.
Posted: 25 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Modern Storage Strategies for SQL Server
sponsored by Tegile
ESSENTIAL GUIDE: Businesses expect the IT department to keep data online and accessible indefinitely—so how should you manage storage for SQL Server? Discover in this guide how to avoid the common pitfalls of deploying and maintaining SQL Server, and learn the best practices behind leveraging flash storage for it.
Posted: 25 May 2016 | Published: 31 May 2016

Tegile

LIFTING THE VEIL OF SECRECY ON CYBERCRIMINALS.
sponsored by Kaspersky Lab
WHITE PAPER: In this eBook, we'll look closely at cybercrime trends to answer your most pressing questions about cybercriminals. Most important, we will answer what you can do to protect your business from this growing threat.
Posted: 25 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

Cloud Security Requires Shared Responsibility Model
sponsored by CloudPassage
EGUIDE: When enterprises move data to the cloud, they can't brush their hands of security responsibility entirely. Learn how securing data in the cloud requires organizations to use a shared responsibility model, one where both the cloud provider and the organization are accountable for certain aspects of security.
Posted: 25 May 2016 | Published: 17 May 2016

CloudPassage

The Definitive Guide to Data Loss Prevention
sponsored by Digital Guardian
EBOOK: This comprehensive guide provides what you need to understand, evaluate, and succeed with today's DLP. It includes insights from DLP Experts, Forrester Research, Gartner, and Digital Guardian's security analysts
Posted: 25 May 2016 | Published: 25 May 2016

Digital Guardian

Management of Native Encryption for Apple FileVault and Microsoft BitLocker
sponsored by Intel Security
WHITE PAPER: With the adoption of native encryption and other encryption layers across your organization, centralized management ensures that you have consistent policy and compliance enforcement across your encryption technology stack.
Posted: 25 May 2016 | Published: 01 Apr 2016

Intel Security

Data Protection Considerations for Converged Infrastructure
sponsored by Veritas
ANALYST REPORT: Arguably, nothing in the last decade has been more transformative to how IT is delivered than server virtualization. Discover in this analyst report the top 10 challenges in protecting virtual environments, and learn a modern approach to protecting and recovering your converged infrastructure and hyperconverged environments.
Posted: 25 May 2016 | Published: 29 Feb 2016

Veritas

Keep Cloud Applications Secure During The DevOps Process
sponsored by CloudPassage
EGUIDE: To minimize cloud application risks, make sure your security strategy accounts for each phase of a DevOps project. Find out why effective cloud app security starts with building security into every step of the development process and how you can make security a key part in each step of the DevOps process.
Posted: 24 May 2016 | Published: 17 May 2016

CloudPassage

George Washington University Leverages Gigamon’s GigaSECURE to Improve Network Visibility and Security Posture
sponsored by Gigamon
CASE STUDY: Discover how GW was able to reduce the video steaming traffic on its network from one of the top five applications routing data through its security and application performance solutions to one of the top 25. The university is now able to take advantage of centralized security processing and scale across multiple data centers.
Posted: 24 May 2016 | Published: 01 Apr 2016

Gigamon

Three Critical Considerations to Achieve Information Governance
sponsored by Commvault
WHITE PAPER: Discover in this white paper 3 critical considerations to help you unlock the true benefits of information governance. Access now to govern, manage, and secure your data, no matter where it sits, and strategize your protection with geolocation and data sovereignty, and 2 more.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

A Comprehensive Guide to Securing Data with Database Encryption
sponsored by Gemalto
WHITE PAPER: This paper offers an overview of key approaches required to address this increased security demand. See in detail why the demand for database encryption is growing more challenging to content with. Ensure you're using the right tools with outlines of different types of encryption approaches.
Posted: 24 May 2016 | Published: 24 May 2016

Gemalto

IBM Data Protection for Virtual Environments
sponsored by IBM
WHITE PAPER: Server virtualization can be quite beneficial, but it presents just as many challenges. Read on to learn about an independent research group's findings about how one major company's service sets about tackling these challenges to protect data for virtual environments.
Posted: 24 May 2016 | Published: 31 Jul 2015

IBM

Data Sovereignty and Your Path to True Information Governance
sponsored by Commvault
WHITE PAPER: Address requirements for how and where your valuable data is stored, and discover how to overcome data sovereignty risk with a comprehensive approach to information governance. Read on to safely adopt cloud services while keeping in mind the complexity of compliance, and learn 3 strategies for reducing risk.
Posted: 24 May 2016 | Published: 24 May 2016

Commvault

Coalfire: Cloud & Data Center Security Solution to meet PCI DSS 3.1 Compliance
sponsored by TrendMicro
WHITE PAPER: In this paper, Coalfire examines the applicability of a security platform in regards to PCI DSS when used in physical or cloud environments. Access now for deep analysis on this security platform and for more PCI DSS compliance standards.
Posted: 24 May 2016 | Published: 31 Oct 2015

TrendMicro

SANS Top 20 Critical Security Controls for Effective Cyber Defense
sponsored by TrendMicro
WHITE PAPER: Get a comprehensive security framework from SANS Institute that provides you with a prioritized, implementable set of actions that comply with global industry and government requirements. Find out why so many businesses embrace the SANS top 20 and learn how you can adopt these strategies for your organization.
Posted: 24 May 2016 | Published: 01 Feb 2016

TrendMicro

Protecting Valuable Data Assets
sponsored by Intel Security
WHITE PAPER: Fortunately, these technical issues don't have to plague your organization. Today, there are a number of integrated information protection solutions that are purpose-built to address security risks and streamline protection controls. Discover how to allow access to qualified entities while not hindering users with complicated access mechanisms.
Posted: 23 May 2016 | Published: 01 Apr 2016

Intel Security

Streamline Your Financial Data Planning to Improve Efficiency
sponsored by IBM
RESOURCE: As market conditions continue to shift, it's more important than ever to minimize time spent managing data. Discover real-time analytics that allow you to link operational changes to financial results, so you can identify and influence key drivers of costs, sales, and revenue.
Posted: 23 May 2016 | Published: 23 May 2016

IBM

What's Driving the State of Cybersecurity
sponsored by Unisys
WHITE PAPER: The higher the demand for data and devices, the more you need protection against hackers. Discover how managed security services (MSS) can deliver advanced threat management.
Posted: 23 May 2016 | Published: 23 May 2016

Unisys

Add Flexibility to Your Storage with SDS
sponsored by IBM
EGUIDE: This e-guide explores software-defined storage (SDS) as a method for managing and protecting long-term data. Read on to see how SDS can provide your enterprise with an added layer of flexibility for long-term data preservation.
Posted: 23 May 2016 | Published: 19 May 2016

IBM

Complete Data Protection
sponsored by Intel Security
WHITE PAPER: Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Plus learn how to implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.
Posted: 23 May 2016 | Published: 01 Apr 2016

Intel Security
1 - 25 of 2690 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement