IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2688 Matches Previous Page  |  Next Page
Trusted Backup and Recovery Software Solutions Simplify Administration
sponsored by IBM
DATA SHEET: Discover how to take the pressure off your backup admins by simplifying data protection, whether it is hosted in physical, virtual, software-defined or cloud environments. Read on to optimize data protection and recovery for core apps and critical workstations.
Posted: 30 Aug 2016 | Published: 30 Aug 2016

IBM

IBM Data Protection Modernization and Strategy: An ESG Webinar
sponsored by IBM
VIDEO: In order to meet a wide variety of SLAs, you need a continuum of backup technologies suitable for every type of data protection instance. Tune into this webinar as ESG Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, analyze today's vast range of data protection modernization issues and strategies.
Posted: 30 Aug 2016 | Premiered: 31 Mar 2016

IBM

2016 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This white paper outlines what IT and security professionals learned from 2015's cyber attacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrohpic data loss.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

Trends in SAP Cybersecurity
sponsored by IBM
WHITE PAPER: The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 29 Aug 2016 | Published: 01 Feb 2016

IBM

ESG Video Interview: Virtualization-Driven Data Protection Modernization
sponsored by IBM
VIDEO: ESG Principal Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, hash out the essentials of modern virtualization-driven data protection. Tune in now to learn how to modernize continuous protection that keeps up with your accelerated production.
Posted: 29 Aug 2016 | Premiered: 31 Mar 2016

IBM

Help Minimize Impact to Patient Care in the Event of a Disaster
sponsored by McKesson Corporation
WHITE PAPER: Disaster recovery (DR) services can keep your critical patient data and systems safe and accessible with cost-efficient replication and infrastructure recovery for virtual environments. Discover how a DR service can help your health care organization limit disruptions to patient care, reduce infrastructure, storage and staffing costs, and more.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

McKesson Corporation

Simplified Data Protection for the Modern Enterprise: An Expert Evaluation
sponsored by IBM
VIDEO: Tune into this video as ESG Senior Lab Analyst Vinny Choinski breaks down an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Watch now to enhance your enterprise's data protection by mitigating the risk of data loss, reducing total cost of protection, and more.
Posted: 29 Aug 2016 | Premiered: 30 Mar 2016

IBM

Tolly evaluation: IBM Security Access Manager
sponsored by IBM
WHITE PAPER: In this white paper, Tolly evaluates a top web protection vendor to see how they stack up in the highly vulnerable web threat landscape. Learn how you can gain flexible risk-based access with strong authentication capabilities while protecting against a wide range of application exploits.
Posted: 29 Aug 2016 | Published: 01 Jun 2016

IBM

Ransomware Multi-layered Approach
sponsored by TrendMicro
WHITE PAPER: Discover four ways you can prepare your corporate network for ransomware attacks to prevent data and financial losses. Learn how a layered approach to security can minimize your malware risk and educate your users on how exactly ransomware can attack your data.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

TrendMicro

Simplify Your Google Apps Collaboration and Management with IDaaS
sponsored by OneLogin
WEBCAST: This informative webinar is designed to get you through the most complex of Google App deployments.
Posted: 29 Aug 2016 | Premiered: Jul 1, 2016

OneLogin

7 Key Challenges to Value-Based Care: Ensuring Patient-Centered Care With Information Management
sponsored by Information Builders
WHITE PAPER: This white paper explores how to address some of the challenges of moving towards value-based healthcare with a strategy for improving the way patient data is collected, managed, and exchanged. Access now to find out more about an integrated approach to master data management, data quality, information management, and more.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Information Builders

Engineering Company's Multi Cloud Success Story
sponsored by TrendMicro
CASE STUDY: Lacking security in your AWS can leave your data and your customers' data at risk. This case study examines how one engineering company was able to secure their workloads on AWS by implementing a comprehensive server security platform. Access now to learn about this platform and how it closes security gaps and controls costs
Posted: 26 Aug 2016 | Published: 31 May 2016

TrendMicro

The Executive’s Guide to the 2016 Global Threat Intelligence Report
sponsored by Dimension Data
WHITE PAPER: In this 2016 executive guide, find out the latest information on the top attack source countries, attacks by sectors, the types of attacks and more. As bonus, read 3 additional articles about the state of incident response, weakness of end-point security and how cybercriminals are upping their game.
Posted: 26 Aug 2016 | Published: 26 Aug 2016

Dimension Data

Computer Weekly – 30 August 2016: Get protected
sponsored by ComputerWeekly.com
EZINE: It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
Posted: 26 Aug 2016 | Published: 30 Aug 2016

ComputerWeekly.com

Manufacturing Company's AWS Success Story
sponsored by TrendMicro
CASE STUDY: If you're migrating to AWS then you need to have comprehensive security in place if you want to protect confidential data. Access this case study that details how one, large manufacturing company was able to secure their move to AWS by implementing a complete server security platform with a wealth of advanced functionality.
Posted: 26 Aug 2016 | Published: 31 Dec 2015

TrendMicro

Modernizing Data Protection
sponsored by IBM
WEBCAST: Should you store all data forever? What should the life-cycle of data be? What, if anything, can you learn from old data? How do you modernize your data protection? Watch this episode of #Cubeconversations, where 3 industry veterans address these questions by discussing the cloud, dealing with data growth, and the systems of insight into data.
Posted: 26 Aug 2016 | Premiered: Jan 26, 2016

IBM

Clearing the Confusion of Modern Data Protection
sponsored by IBM
WEBCAST: One aspect of IT that everyone agrees upon is the need for better data protection. But what they don't always agree on is how to provide it. View this webcast where Jason Buffington, senior analyst at ESG, takes an in-depth look at modern data protection and explains why when you modernize production, you must modernize protection.
Posted: 26 Aug 2016 | Premiered: Jan 7, 2016

IBM

Protecting Data is a Snap with Cloud-Based Replication
sponsored by Dell, Inc.
TECHNICAL ARTICLE: In this tech brief, explore how to replicate on-premises backups from a rapid recovery core to the cloud for simplified data protection and disaster recovery. See how your enterprise can benefit from easy scalability, redundancy, and cost savings, by replicating to the cloud.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Dell, Inc.

IDaaS: Modernize Your IAM in the Cloud
sponsored by OneLogin
WEBCAST: Through this webina, you'll learn what you can do to make an impact on your business with identity management as a service (IDaaS).
Posted: 25 Aug 2016 | Premiered: Jul 12, 2016

OneLogin

The Right Backup and Recovery Solution Can be a Business Enabler
sponsored by Veritas
WHITE PAPER: Your data protection strategy needs to deliver the quality and service levels required to enable your digital business. Discover a backup solution built on a converged platform that enables efficient and cost-effective data management that will truly help put your data to good use.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Veritas

Protecting Large Scale Environments with Veritas NetBackup
sponsored by Veritas
DATA SHEET: In this resource, discover a comprehensive, converged backup platform that supports both physical and virtual infrastructures. This solution can support your present and future data protection needs with benefits such as lower ongoing operating costs, greater scalability, simplified maintenance, and more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Veritas

Uncovering the Risk of SAP Cyber Breaches
sponsored by Onapsis
WHITE PAPER: The purpose of this Ponemon Institue study is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

Onapsis

The Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business ApplicationsThe Tip of the Iceberg:Wild Exploitation & Cyber-attacks on SAP Business Applications
sponsored by Onapsis
WHITE PAPER: Discover how SAP implementations have transformed through each technology trend such as cloud, mobile, big data and IoT. Learn why securing SAP applications is critical to accelerate the adoption of these new technology paradigms and to enable companies to realize the maximum value from their investment in SAP solutions.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

Onapsis

Choosing the Right Public Cloud for Better Data Protection
sponsored by Dell, Inc.
WHITE PAPER: Integrating infrastructure-as-a-service (IaaS) and data protection software can help your enterprise solve the complexity and cost challenges of protecting data. Discover what public cloud capabilities and data protection software capabilities your enterprise should focus on when choosing a solution for your needs.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Dell, Inc.

5 Ways to Safeguard Sensitive Data from Insider Threats and External Attacks
sponsored by IBM
WHITE PAPER: A modular security strategy that allows you to deploy defense capabilities as you need them is the key to future protection. Discover how you can monitor your entire network continuously to prevent 5 harmful occurrences.
Posted: 25 Aug 2016 | Published: 01 Nov 2015

IBM
1 - 25 of 2688 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement