IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2279 Matches Previous Page  |  Next Page
Backup is Broken
sponsored by LogicNow
WHITE PAPER: This white paper discusses modern ways to backup up data, including a disk-to-disk-to-cloud (D2D2C) backup strategy. Read on to discover how to find the right architecture and vendor partner to help your enterprise deliver fast, secure, and reliable backup in a cloud-based environment.
Posted: 10 Feb 2016 | Published: 31 Dec 2014

LogicNow

4 Business Continuity Best Practices Every MSP Should Follow
sponsored by LogicNow
WHITE PAPER: This whitepaper highlights four business continuity and data backup best practices to help ensure reliable disaster recovery and minimal downtime. In addition, explore how employing a holistic business continuity strategy with virtual disaster recovery services can enable your enterprise to keep your data secure and improve your RTO.
Posted: 10 Feb 2016 | Published: 31 Dec 2014

LogicNow

Accelerating Big Data Collection and DataFlow Management
sponsored by Hortonworks
WHITE PAPER: This white paper highlights a data management platform that combines data acquisition, simple event processing, and transport and delivery to accommodate highly diverse and complicated dataflow. Read on to see how this platform can enable your enterprise to simplify your big data ingest and increase security for collection and sharing of your data.
Posted: 10 Feb 2016 | Published: 31 Dec 2015

Hortonworks

Data-Aware Storage: Introducing a New Era of Data Management
sponsored by DataGravity
RESOURCE CENTER: This white paper shows you a new way to store data: data-aware storage. This storage architecture combines state-of-the-art primary storage with integrated data services to create an entirely new method of storage.
Posted: 09 Feb 2016 | Published: 31 Dec 2015

DataGravity

Tips and Tricks for Leveraging NetApp Storage
sponsored by Veeam Software
WHITE PAPER: This white paper discusses a backup & replication technology that can be integrated with NetApp storage platforms to reduce the RPO and RTO of your data operations. Read on for some expert tips and tricks to leverage this technology so that your enterprise can benefit from faster backups and simplified recovery.
Posted: 08 Feb 2016 | Published: 31 Dec 2015

Veeam Software

Making the Business Case for Moving to the Cloud
sponsored by Carbonite
WHITE PAPER: This white paper acts as a comprehensive guide to cloud backup and data protection. Discover expert tips and best practices to help you build the strongest business case for moving to the cloud, and also learn more about cloud backup, its customizability and hybrid capabilities.
Posted: 08 Feb 2016 | Published: 08 Feb 2016

Carbonite

Comparing Security Features of Old and New Operating System Rollouts
sponsored by Microsoft
WHITE PAPER: This quick guide offers a side-by-side comparison of what to expect between legacy and emerging operating systems. Discover details on how important security features have evolved.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Microsoft

Security Operations in the Cloud
sponsored by TrendMicro
WHITE PAPER: This white paper discusses some best practices to adopt in securing workloads in Amazon Web Services.
Posted: 05 Feb 2016 | Published: 31 Jan 2016


Cisco Advanced Malware Protection Leads Again in NSS Test
sponsored by Cisco
WHITE PAPER: In this white paper, you will learn how to reduce both detection time and remediation time. Go beyond point-in-time detection with your security solutions.
Posted: 05 Feb 2016 | Published: 31 Dec 2015

Cisco

Cisco Advanced Malware Protection for Networks
sponsored by Cisco
WHITE PAPER: This white paper shows you an advanced malware protection solution that detects, blocks, tracks and contains malware threats across multiple threat vectors.
Posted: 05 Feb 2016 | Published: 31 Dec 2015

Cisco

Infographic: Are You Doing All You Can To Protect Your Critical Business Information?
sponsored by Citrix
DATA SHEET: This infographic details seven best practices to protect your critical business information. Read on to find out how a policy-driven approach to information security can boost security for your mobile workforce.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Citrix

Safeguarding Your Endpoints: How Can Holistic Data Protection Help You?
sponsored by Commvault
RESOURCE CENTER: In this series of brief videos, you will learn how to transform your data into a powerful strategic asset with a holistic data protection platform—enabling you to access all of your data safely from any endpoint. Tune in to ensure your data is accessible, compliant, and ready to share across all lines of your business.
Posted: 05 Feb 2016 | Published: 05 Feb 2016

Commvault

Protect Privileged Credentials Across Traditional and Virtual Data Centers, and all Cloud Environments
sponsored by CA Technologies.
WHITE PAPER: This white paper highlights a solution for privileged credential management that drives IT risk reduction and operational efficiency by supporting traditional, virtualized, and hybrid-cloud infrastructures. Read on to discover how this platform can allow your enterprise to protect and manage all your credentials.
Posted: 04 Feb 2016 | Published: 04 Feb 2016

CA Technologies.

Forrester: Tips to Build Your Data Protection Business Case
sponsored by Digital Guardian
WEBCAST: This video will teach you how to establish success factors for data protection programs.
Posted: 04 Feb 2016 | Premiered: Nov 30, 2015

Digital Guardian

Compensating Security Controls for Windows Server 2003 Security
sponsored by TrendMicro
WHITE PAPER: This white paper shows you a solution while you're in the process of migration. Learn how you can get network, system and anti-malware security controls across physical, virtual and cloud systems running W2K3.
Posted: 04 Feb 2016 | Published: 31 May 2015


Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This white paper defines Big Data Security and its underlining security analytics and malware analysis technology.
Posted: 04 Feb 2016 | Published: 31 Dec 2015

Blue Coat Systems

SECURITY ANALYTICS MOVES TO REAL-TIME PROTECTION
sponsored by Blue Coat Systems
WHITE PAPER: This white paper shows you how you can add real-time threat detection and protection to your secure network.
Posted: 04 Feb 2016 | Published: 31 Dec 2014

Blue Coat Systems

Cisco Advanced Malware Protection for Endpoints
sponsored by Cisco
WHITE PAPER: This white paper shows you endpoint security that goes beyond point-in-time detection to provide the level of visibility and control you need to stop advanced threats.
Posted: 04 Feb 2016 | Published: 27 Jan 2016

Cisco

Thrive in the Era of Data Growth: Maximize Backup Performance
sponsored by Veeam Software
WHITE PAPER: This brief white paper highlights the combination of a backup and replication solution with a high-density storage server to manage high data volumes. Read on to see how these solutions can provide your enterprise with fast backups and granular, item-level recovery capabilities and improve your data center's overall performance.
Posted: 04 Feb 2016 | Published: 11 Dec 2015

Veeam Software

Innovation Cubed: Security, Management and Productivity
sponsored by Microsoft
WHITE PAPER: This enterprise brochure highlights technology designed to help you respond to modern security and management challenges. Discover what intelligent mobile options for your employees and customers can do for your organization.
Posted: 03 Feb 2016 | Published: 03 Feb 2016

Microsoft

Searching for Better Big Data Business Value? Look to the Cloud
sponsored by Oracle Corporation
VIDEO: In this brief video, you will discover a big data cloud service that utilizes the latest advances in big data processing and unifies these processes with Oracle's Big Data SQL. Tune in to access the benefits of cloud-enabled data management.
Posted: 03 Feb 2016 | Premiered: 03 Feb 2016

Oracle Corporation

Integrating Big Data Systems with Enterprise Data Warehouses
sponsored by Oracle Corporation
WHITE PAPER: In this white paper, you will learn how to both maximize the business benefits of big data and minimize the risk of adopting new technologies with a unified query system. Read on to allow a single query to access data in multiple stores—be they Hadoop, NoSQL or relational databases.
Posted: 03 Feb 2016 | Published: 31 Jan 2015

Oracle Corporation

The 10 Step Action Plan: Meeting Your Shared Security Responsibility with Microsoft Azure
sponsored by TrendMicro
WHITE PAPER: In this white paper, discover how to address cloud security with comprehensive administrative, physical and logical controls.
Posted: 03 Feb 2016 | Published: 31 Dec 2015


Multination Banking Company
sponsored by Digital Guardian
WHITE PAPER: This white paper shares the security story of a bank with over 50,000 employees and who serves over 50 million credit card customers.
Posted: 03 Feb 2016 | Published: 31 Dec 2014

Digital Guardian

Trends in Data Management: Unlock the True Value Proposition of Big Data
sponsored by Oracle Corporation
RESOURCE: In this resource, you will key into the most current data management trends, and learn how to leverage these trends to unlock the true value of big data and analytics in your enterprise. Read on now to examine the growth of predictive analytics in today's data environs, and more.
Posted: 03 Feb 2016 | Published: 03 Feb 2016

Oracle Corporation
1 - 25 of 2279 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement