IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
101 - 125 of 2408 Matches Previous Page  |  Next Page
10 Ways Data Preparation Can Assist Excel Data Analytics
sponsored by Datawatch Corporation
WHITE PAPER: In this white paper, you will learn how to enrich, blend, and combine disparate data sets with a self-service data preparation solution for Excel. Access this paper now to key into the 10 most effective ways data preparation can assist your Excel-run data analytics.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Datawatch Corporation

Protecting Traditional and Cloud Data Centers with Security Intelligence
sponsored by Juniper Networks, Inc.
WHITE PAPER: This white paper discusses the need for a high level of security in both traditional and cloud data centers and offers solutions to common challenges that can arise, such as security inefficacy or insufficient firewall performance. Access now to learn how security intelligence services can provide your enterprise with many benefits.
Posted: 26 Oct 2015 | Published: 31 Oct 2014

Juniper Networks, Inc.

Optimizing Your Enterprise Data Warehouse with Hadoop
sponsored by Hortonworks
WHITE PAPER: This white paper examines the challenges with enterprise data warehouses (EDW), and explains how Hadoop can effectively optimize your EDW. Learn how you can archive data to Hadoop and away from EDW, offload costly ETL processes to Hadoop, and more.
Posted: 26 Oct 2015 | Published: 31 Mar 2015


Building Governance Into Big Data: A Meta-Data Based Approach
sponsored by Hortonworks
WHITE PAPER: This white paper highlights a new approach to data management, in which governance is weaved into your modern data architecture using a meta-data service. Learn why metadata and taxonomy hold the key to comprehensive data governance, as well as key into the 4 essential elements of Hadoop governance.
Posted: 26 Oct 2015 | Published: 26 Oct 2015


Bolster Your DLP Systems for Safer File Sharing and Collaboration
sponsored by FinalCode
EGUIDE: In today's business environment, the ability to balance data sharing and collaboration with security is essential. This expert guide can help you strike that balance.
Posted: 26 Oct 2015 | Published: 26 Oct 2015


It's Not You, It's Me: Understand the Shared Responsibility of Cloud Security
sponsored by Alert Logic
WHITE PAPER: Review the top 3 threats to public cloud environments in order to craft your security strategy to mitigate malware. Explore the shared security responsibility model to learn what steps you need to take to avoid falling victim to data breaches.
Posted: 26 Oct 2015 | Published: 11 Feb 2015

Alert Logic

Leveraging Big Data Technologies to Build a Common Security Repository
sponsored by O'Reilly Media
BOOK: In this white paper, learn how to successfully implement a data lake in your organization, as well as distinguish and understand different types of data. In addition, uncover the particulars of storing, accessing, and ingesting data, as well as how SIEM fits into the data lake.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

O'Reilly Media

5 Network Security Lessons We Should All Learn from the Sony Hack
sponsored by Trend Micro
EGUIDE: Access this expert guide now to uncover the 5 enterprise network security lessons that could have helped Sony Pictures Entertainment to avoid its data breach fate, from treating APTs seriously to getting the right executives on board.
Posted: 26 Oct 2015 | Published: 26 Oct 2015

Trend Micro

Best Practices to Make BYOD, CYOD and COPE Simple and Secure
sponsored by Citrix
WHITE PAPER: This white paper provides guidance to develop a complete strategy for BYOD or CYOD, addressing requirements for security, simplicity, and cost reduction. Learn the EMM best practices for BYOD and enable your organization to reduce costs through self-service provisioning.
Posted: 26 Oct 2015 | Published: 30 Jun 2015


Tackling Cost and Complexity through Greater Usability
sponsored by Symantec Corporation
WHITE PAPER: This white paper outlines how to manage costs and storage complexities with user-friendly backups. Read on to learn about how investing in backup appliances can save costs in the long run and make your storage more efficient.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

Symantec Corporation

Safeguard Your Financial Information with a Complete Governance Framework
sponsored by IntraLinks, Inc
WHITE PAPER: This brief white paper explains how to reduce the risk associated with exchanging financial information between the corporation and outside auditors. Learn how to secure your finance team and maximize your productivity with insight into key transactions.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

IntraLinks, Inc

Big Data Security for Dummies
sponsored by Blue Coat Systems
WHITE PAPER: This in-depth resource tells you all you need to know about big data security and how it can catch advanced, targeted attacks.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

Blue Coat Systems

Set the bar on your Hadoop Security with HDP 2.3
sponsored by Hortonworks
VIDEO: Access this video now to uncover how your enterprise can secure its data using a gateway for perimeter security, provide fine grain authorization and auditing for all access patterns and ensure data encryption over the wire as well as stored on disk. Watch now to learn more.
Posted: 23 Oct 2015 | Premiered: 23 Sep 2015


Empower Data Protection with File Encryption and Bring Your Own Collaboration
sponsored by FinalCode
EGUIDE: This e-guide examines a security software that will ensure the highest level of enterprise file protection by encrypting documents individually. Learn why breach training can minimize damage when hackers attack, and access exclusive tips for creating a data classification policy.
Posted: 23 Oct 2015 | Published: 23 Oct 2015


Turning the Tables on Cyber Criminals - Kill Chain eBook
sponsored by Proofpoint, Inc.
WHITE PAPER: Delve into the minds of hackers and learn how they plan, launch, and monitor attacks against security systems. Learn the 7 steps of the kill chain and how to use each phase to take the advantage over cybercriminals and stop them in their steps.
Posted: 22 Oct 2015 | Published: 13 Jul 2015

Proofpoint, Inc.

Efficient Oracle Backups with Pure Storage FlashArray
sponsored by Pure Storage
WHITE PAPER: This white paper shows how built in features in flash arrays can significantly increase efficiency and reduce costs associated with backing up and protecting Oracle databases. Read on to learn about how these features can be used on other types of databases as well.
Posted: 22 Oct 2015 | Published: 22 Oct 2015

Pure Storage

Investment bank meets complex compliance requirements
sponsored by Blue Coat Systems
CASE STUDY: Today's compliance requirements have been growing and evolving rapidly over the past few years. Access this case study to find out how Jefferies, an independent investment bank, met these complex, fast-changing compliance requirements while empowering users.
Posted: 22 Oct 2015 | Published: 29 Nov 2013

Blue Coat Systems

Accelerating Office365 Adoption with Security and Compliance Controls
sponsored by Proofpoint, Inc.
WHITE PAPER: Learn how you can address security and compliance gaps in Office 365 to make your Office 365 adoption faster, easier and, most importantly, safer.
Posted: 21 Oct 2015 | Published: 10 Mar 2015

Proofpoint, Inc.

Gartner Magic Quadrant for Enterprise Information Archiving
sponsored by Proofpoint, Inc.
WHITE PAPER: In this Magic Quadrant, Gartner evaluates vendors offering products and services that provide archiving for email, social media, files and other content types. Discover the 5 key considerations for choosing the right EIA strategy.
Posted: 21 Oct 2015 | Published: 10 Nov 2014

Proofpoint, Inc.

Data Loss Prevention: Data-at-Rest vs. Data-in-Motion
sponsored by Identity Finder, LLC
WHITE PAPER: This white paper compares the two primary focuses of data protection – data-at-rest and data-in-motion – and analyzes which one is most effective.
Posted: 21 Oct 2015 | Published: 21 Oct 2015

Identity Finder, LLC

The Continuum of Self-Service
sponsored by LogiAnalytics
WHITE PAPER: Access this white paper to find five essentials you should consider before empowering users with self-service analytics.
Posted: 20 Oct 2015 | Published: 20 Oct 2015


Technology Offers Convenience, Privacy Pays the Price
sponsored by Global Knowledge
WHITE PAPER: Technology is a wonderful thing, but it comes with a price: your privacy. This white paper can help you learn more about what kind of personal data is collected by web sites and applications, and how to secure your information online.
Posted: 20 Oct 2015 | Published: 20 Oct 2015

Global Knowledge

Is Your High-Value Data Safe?
sponsored by Imation Corp.
WHITE PAPER: This resource discusses how you can keep your most valuable data out of hackers' hands with a range of advanced technologies, including encryption and stronger authentication.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Imation Corp.

Data Protection Designed for Flash
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Access this white paper for a discussion on the benefits designing a data protection solution with flash in mind. Read more to see how flash technology can allow your business to become more agile and can help you achieve a consistent, high-performing data backup in your data center.
Posted: 16 Oct 2015 | Published: 31 Aug 2015

Hewlett Packard Enterprise

Securing Your Healthcare Network with the Threat Intelligence Cloud
sponsored by Palo Alto Networks
WHITE PAPER: In this white paper, you will learn how to ensure end-to-end security throughout your healthcare organization utilizing the cloud. Get access to protect the core of your cloud-enabled data centers by responding to new global threats.
Posted: 16 Oct 2015 | Published: 16 Oct 2015

Palo Alto Networks
101 - 125 of 2408 Matches Previous Page    3 4 5 6 7 8    Next Page
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement