IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
101 - 125 of 2438 Matches Previous Page  |  Next Page
Enterprise Data Architecture and Data Governance: Use Metadata to Get to the Starting Gate
sponsored by ERwin
WHITE PAPER: This white paper explores the challenges of bootstrapping a data governance problem and considers key methods for using metadata to establish the starting point for data governance. Discover how a collaborative metadata platform can ensure your enterprise has the right tools to simplify your data governance operations.
Posted: 04 Apr 2016 | Published: 04 Apr 2016

ERwin

Top Ten Reasons Why EMC For VMware
sponsored by Sempre Technologies Ltd
WHITE PAPER: Access this white paper to explore 10 reasons why EMC for VMware is worth considering, including: over 60 technical integrations across storage, backup, security, and management, up to 20 percent more efficient arrays out of the box, enhanced data protection and security, and 7 more.
Posted: 04 Apr 2016 | Published: 31 Mar 2011

Sempre Technologies Ltd

Security Challenges in Healthcare Social Media Usage
sponsored by Actiance
EGUIDE: In this e-guide, Jeani Park, senior director at an Internet and mobile device monitoring company, answers questions about security challenges that healthcare organizations face when it comes to social media. Discover best practices for governing use of social media in a hospital or practice so that you can ensure patient information stays secure.
Posted: 04 Apr 2016 | Published: 01 Apr 2016

Actiance

EMC Avamar Backup and Recovery for VMware Environments
sponsored by Sempre Technologies Ltd
WHITE PAPER: In this white paper, gain insight into two approaches for protecting VMware virtual infrastructures and for VMware View environments. In both cases, learn how Avamar data deduplication can decrease infrastructure costs, improve backup performance, and create efficiencies that can increase application consolidation ratios.
Posted: 04 Apr 2016 | Published: 31 Aug 2010

Sempre Technologies Ltd

Top 10 Reasons Why EMC Data Domain is the Industry Leading Protection Storage
sponsored by Sempre Technologies Ltd
WHITE PAPER: Access this brief white paper to learn 10 reasons EMC Data Domain is leading the data protection storage industry, including: 1.5 times greater speed than the closest competitor, bandwidth-saving replication, highest deduplication rates, and 7 more.
Posted: 04 Apr 2016 | Published: 04 Apr 2016

Sempre Technologies Ltd

Case Study: University Implements Secure, Easy-to-Use File Sharing Solution
sponsored by MicroFocus
WHITE PAPER: This brief case study highlights how a university implemented a secure file-sharing solution with unlimited storage. Discover how you can take advantage of this system to ensure your information stays secure.
Posted: 04 Apr 2016 | Published: 31 Mar 2016

MicroFocus

Top 5 Reasons to Refresh your Data Domain
sponsored by Sempre Technologies Ltd
WHITE PAPER: In the following brief, yet informative white paper, uncover five compelling reasons to trade up to the next generation Data Domain system.
Posted: 04 Apr 2016 | Published: 04 Apr 2016

TOPICS:  Data Security
Sempre Technologies Ltd

Secure Voting
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from WebRoots Democracy, a pressure group for e-voting, aims to answer the key questions surrounding online voting security and the potential e-voting systems.
Posted: 04 Apr 2016 | Published: 04 Apr 2016

ComputerWeekly.com

Your Legal Liability Following a Cybersecurity Breach
sponsored by SurfWatch Labs
WHITE PAPER: This resource explores recent legal rulings that put more pressure on organizations to develop a comprehensive cyber risk management program. Read on to discover how an effective threat intelligence strategy can enable you to defend against the growing litigation that inevitably results from being the victim of a cyberattack.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

SurfWatch Labs

Electronic Privacy Screens: Protect Your Data at the Source
sponsored by OptioLabs
WHITE PAPER: This white paper discusses how display security and breach detection solutions can protect against disclosures of information caused by over-the-shoulder observation and unattended workstations. Read on to discover the key features that you need to look for in a display security solution.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

OptioLabs

Step-By-Step Guide to Creating a Successful Business Continuity Plan.
sponsored by Cirrity
EGUIDE: This e-guide highlights a series of step-by-step guides and business continuity (BC) templates for large organizations and SMBs, covering topics from project initiation, to strategy development, to emergency communications, and more. Discover what key issues and activities your enterprise should address and perform to ensure a successful BC plan.
Posted: 31 Mar 2016 | Published: 30 Mar 2016

Cirrity

Faster Backups Mean Better Data Protection
sponsored by Sempre Technologies Ltd
WHITE PAPER: This white paper focuses on the limitations of traditional backup systems and dives into the many benefits of Data Domain Boost as formidable solution to this issue.
Posted: 31 Mar 2016 | Published: 31 Mar 2015

Sempre Technologies Ltd

Underwriters Safety and Claims Uses Management Platform to Upgrade to Windows 7
sponsored by MicroFocus
CASE STUDY: Access this case study to find out how Underwriters Safety and Claims, a regional insurance agency, was able to upgrade to Windows 7 without a problem using a management platform.
Posted: 31 Mar 2016 | Published: 31 Mar 2016

MicroFocus

How to Secure Health Records on the Screen
sponsored by OptioLabs
WHITE PAPER: This white paper describes the unique challenges and privacy of data in the healthcare domain where every display represents a potential point of leakage.
Posted: 31 Mar 2016 | Published: 29 Feb 2016

OptioLabs

Solving Data Protection: HGST Active Archive System & Commvault Value of Data Protection at Scale
sponsored by HGST
WHITE PAPER: This white paper shows you how to meet a variety of your organization's demands including software to manage data and a target storage system with the ability to ensure integrity, scale and high availability. Access now to learn how you can simplify your data security.
Posted: 31 Mar 2016 | Published: 01 Jan 2016

HGST

Protect Your Computer Screen With OptioLabs' OptioAware
sponsored by OptioLabs
VIDEO: In this video, you will learn about organizational software to control proprietary and regulated information displayed on Windows desktops, laptops and tablets. Access now to learn how you can actively prevent visual eavesdropping by blurring your display when authorized users aren't paying attention to it.
Posted: 30 Mar 2016 | Premiered: 15 Dec 2015

OptioLabs

Performance and Efficiency for VMware Data Protection
sponsored by EMC
WHITE PAPER: This white paper highlights backup solutions that deliver higher deduplication rates than traditional integrated backup appliances and delivers the scalability, flexibility, and agility necessary to protect entire VM environments. Read on to see how this solution can enable you to simplify and consolidate your data protection while reducing costs.
Posted: 30 Mar 2016 | Published: 31 Oct 2015

EMC

Some Deduplication Solutions Skimp on Security – Yours Doesn't Have To
sponsored by Sempre Technologies Ltd
WHITE PAPER: This white paper highlights security features in data deduplication, and why it matters to you. Access this resource now and learn about encryption capabilities that protect data being replicated from one system to another, while preserving deduplication bandwidth.
Posted: 30 Mar 2016 | Published: 30 Sep 2015

Sempre Technologies Ltd

The Human Factor Report
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.
Posted: 29 Mar 2016 | Published: 31 Dec 2015

Proofpoint, Inc.

Screen Data Protection, Eavesdropper Detection and Insider Threat Reduction
sponsored by OptioLabs
VIDEO: This video shows you a hardware solution that protects against insider threats that would result in an unattended computer screen. Access now to learn how you can curb eavesdropping and better protect your sensitive information.
Posted: 29 Mar 2016 | Premiered: 10 Mar 2016

OptioLabs

Case Study: Financial Services Firm Implements Cloud DRaaS
sponsored by Cirrity
WHITE PAPER: This case study highlights how one financial services firm was able to prevent loss of revenue after a disaster occurred by implementing a cloud disaster recovery as a service (DRaaS) solution. Read on and discover how this DRaaS platform can enable a safer and more scalable data storage system and complete disaster recovery solution.
Posted: 29 Mar 2016 | Published: 29 Mar 2016

Cirrity

Cloud Security: The Five Fears
sponsored by UKFast
WHITE PAPER: This white paper reviews and debunks the top 5 fears of migrating to the cloud. Inside, discover how to protect data and users in the cloud as well as best practices checklists to ensure a smooth migration.
Posted: 28 Mar 2016 | Published: 09 Mar 2016

UKFast

EMC Configures VNXe: A Unified Storage Platform for SMBs and ROBOs
sponsored by EMC
WHITE PAPER: This white paper highlights a unified storage platform that supports highly available block storage functionalities and can be flexibly configured and scaled for any SMB or ROBO IT requirement. Read on to see how you can solve your storage dilemmas with this easy to manage, cost-effective storage platform.
Posted: 28 Mar 2016 | Published: 26 Aug 2015

EMC

Northern Health and Social Care Trust - Case Study
sponsored by ForeScout Technologies, Inc.
CASE STUDY: This case study of Northern Health shows you the steps they took to gain real-time visibility over all network devices while never interrupting their critical health and social care services. Access now to learn about how easy it is to deploy this automated security solution and better comply with today's standards.
Posted: 28 Mar 2016 | Published: 31 Dec 2015

ForeScout Technologies, Inc.

The Economics of Enterprise Data Protection on Cost and Scalability
sponsored by Sempre Technologies Ltd
EGUIDE: In this e-guide, experts explore what backup admins look for during the data protection purchasing phase. Access now and learn why cost and scalability are top of mind, and what needs further consideration.
Posted: 31 Mar 2016 | Published: 28 Mar 2016

Sempre Technologies Ltd
101 - 125 of 2438 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement