IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
101 - 125 of 2770 Matches Previous Page  |  Next Page
Defend Against Threats of Global Operations
sponsored by Verizon
WHITE PAPER: Learn how the organization decided to replace the company's global remote-access infrastructure with platforms that allow it greater overall visibility to areas of increased vulnerability. Discover how to guard both your global network and application delivery platforms to help protect your reputation and maintain business continuity.
Posted: 07 Jun 2016 | Published: 01 May 2016

Verizon

Secure your mobile devices, data and apps
sponsored by Verizon
WHITE PAPER: This white paper teaches you how to assess your existing security policies, giving you advice on potential weaknesses and best practices to strengthen your mobile security. Get better peace of mind with policies that keep data, devices and apps in line no matter where your workforce roams.
Posted: 07 Jun 2016 | Published: 01 May 2016

Verizon

Modernize and Simplify the Data Center with All-Flash
sponsored by EMC
WEBCAST: Witness how an all-flash solution with a dual active controller system that provides optimal performance, density, and cost. This simplified, flexible, modern flash solution can provide your enterprise with faster backup and recovery, integrated copy data management, built in encryption, and more.
Posted: 07 Jun 2016 | Premiered: Jun 7, 2016

EMC

Understand the Business Impact and Cost of a Breach
sponsored by MASERGY
ANALYST REPORT: This Forrester Report will help security and risk leaders build a case for investment to show business leaders what kind of investment it'll take to adequately protect their organization.
Posted: 07 Jun 2016 | Published: 12 Jan 2015

MASERGY

Deduplication and Backups — On Purpose for a Purpose
sponsored by Dell, Inc.
WHITE PAPER: This tech brief highlights the different deduplication methods used in today's computing environments, focusing on backups. Read on to see which method is right for your enterprise, and learn about the strengths and weakness of the most popular methods, including post-process deduplication, inline deduplication, fixed block deduplication, and more.
Posted: 06 Jun 2016 | Published: 06 Jun 2016

Dell, Inc.

Evaluating Today's Enterprise Backup Software and Integrated Appliances
sponsored by Commvault
ANALYST REPORT: The following report examines the top data protection vendors and includes strategic planning assumptions about data protection, and expert comparison of each vendor and offerings, and more. Access now and learn what it takes to ensure the complete safety of your data.
Posted: 06 Jun 2016 | Published: 30 Jun 2015

Commvault

Next Generation Cybersecurity: The Age of Artificial Intelligence
sponsored by MASERGY
WEBCAST: Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.
Posted: 06 Jun 2016 | Premiered: May 1, 2016

MASERGY

Masergy UES Offers Unique Approach to Network Defense
sponsored by MASERGY
ANALYST REPORT: Instead of applying a one-size-fits-all approach, machine learning detects events differently on different networks. It uses multistaged analysis to learn predictable patterns on your network and methods that work best for it. Discover how unified enterprise security can benefit your unique network architecture.
Posted: 06 Jun 2016 | Published: 11 Nov 2015

MASERGY

Advanced threat protection add-on comes to Microsoft EOP
sponsored by Symantec Corporation
EGUIDE: This e-guide explores what advanced threat protection (ATP) can do for your cloud-based email tools. Protect end users against unknown malware and viruses and get real-time, time-of-click protection against malicious URLs.
Posted: 06 Jun 2016 | Published: 23 May 2016

Symantec Corporation

Emerging security threats you're up against now
sponsored by Intel
EGUIDE: Cybercrime is now a fully functional industry with "Hacking as a Service" being a top product. Services are cheaper and more sophisticated than ever. This e-guide shows you top emerging cyber threats that could be harming your system soon.
Posted: 06 Jun 2016 | Published: 25 May 2016

Intel

Data breach lawsuits indicate a troubling trend for enterprises
sponsored by Intel Security
EGUIDE: Take a closer look at the rash of data breach lawsuits and the settlements to see why and how enterprises have found themselves on the losing end of these legal battles. Get insight from industry experts about what you can do now to secure your infrastructure and how you can protect your organization into the future.
Posted: 06 Jun 2016 | Published: 25 May 2016

Intel Security

Put Time On Your Side: The Heavy Cost Of Putting Off Your Cybersecurity Decisions SMB
sponsored by Kaspersky Lab
EBOOK: A lot can happen with IT security in one day, too. In fact, at Kaspersky Lab, we detect 310,000 new pieces of malware every day, which means that every day you put off the decision to upgrade your IT security system is a day that thousands of pieces of new malware can slip through.
Posted: 06 Jun 2016 | Published: 01 May 2016

Kaspersky Lab

Find, Classify, Protect your data
sponsored by Verizon
WHITE PAPER: Understanding, identifying and classifying your data correctly are the first steps in information security. Learn how to evaluate your data landscape and create a plan to manage and secure it.
Posted: 06 Jun 2016 | Published: 31 Dec 2015

Verizon

Encryption as an IT Service
sponsored by Gemalto
WHITE PAPER: To build a sustainable security foundation, organizations need to employ encryption as an IT service — centrally and cohesively managing encryption across an entire enterprise. Gain significant benefits in overall security, administrative efficiency and business agility.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

Gemalto

Resiliency and Data Protection with Riverbed SteelFusion
sponsored by Riverbed Technology, Inc.
RESOURCE: Enterprise Strategy Group (ESG) graphically summarizes the hands-on lab review, Zero Branch IT with Riverbed SteelFusion. Access this at-a-glance view now, complete with live links to download the complete report and learn more details about SteelFusion.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Riverbed Technology, Inc.

Quick Steps to Integrate Office 365 and ZixGateway® Hosted
sponsored by ZixCorp
WHITE PAPER: Add greater protection emails by routing Office 365 to ZixGateway Hosted. It automatically scans routed outbound email from Office 365 connectors. If sensitive information triggers Zix content policies, those messages and their attachments are automatically encrypted.
Posted: 03 Jun 2016 | Published: 01 May 2016

ZixCorp

Your Old Storage is Standing in the Way of Growth
sponsored by HPE and Intel®
RESOURCE: Improving the scalability, speed, resilience, and affordability of your storage infrastructure can grow your business and strengthen customer loyalty. Discover storage solutions that can boost your performance, eliminate unnecessary storage hardware, and cut your data protection storage requirements.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

HPE and Intel®

X-Force Cyber Security Intelligence Index  Report
sponsored by IBM
WHITE PAPER: It's clear no industry was immune to cyberattackers in 2015. Discover statistics from last year's cyber threat landscape and see which industries were most affected by cybercrime. Learn how to create an effective cybersecurity strategy to ensure your organizations doesn't show up on next year's report.
Posted: 03 Jun 2016 | Published: 01 May 2016

IBM

Mobilephobia: Curing the CISO’s Most Common Mobile Security Fears
sponsored by IBM MaaS360
WHITE PAPER: This white paper shows you a comprehensive portfolio of mobile security solutions that address four key mobile security challenges. Learn intelligent, integrated and innovative approaches that can help your organization stay ahead of emerging threats while managing operational risks and lowering cost of a strong security posture.
Posted: 03 Jun 2016 | Published: 01 May 2016

IBM MaaS360

The State of Mobile Security Maturity
sponsored by IBM MaaS360
WHITE PAPER: This study takes the mobile security pulse of large enterprises worldwide. It'll help you assess where you are on this emerging mobile security maturity scale and giving you an indication of where you should make your mobile security investments moving forward.
Posted: 03 Jun 2016 | Published: 31 Dec 2014

IBM MaaS360

Simplify Backup Configurations and Deployments with Dell Data Protection
sponsored by Dell, Inc.
WHITE PAPER: Discover a data protection solution that combines hardware, deduplication, and management software into a single offering and offers the scale and flexibility needed to simplify and shorten backups.
Posted: 03 Jun 2016 | Published: 31 Jan 2016

Dell, Inc.

Securing mobile productivity for Microsoft Office 365
sponsored by IBM MaaS360
WHITE PAPER: Take the complexity out of securing your mobile workforce. Learn how to secure your Microsoft ecosystem across all mobile platforms, including Windows 10. Enable IT to efficiently manage enterprise productivity, connectivity and security today and into the future.
Posted: 03 Jun 2016 | Published: 01 Mar 2016

IBM MaaS360

Mobile Data Security
sponsored by IBM MaaS360
WHITE PAPER: Prudence dictates that you look for ways to supplement your mobile device management (MDM) solution with additional, more robust security controls. This white paper helps you identify the goals for your MDM strategy and select the best approach to reach those goals.
Posted: 03 Jun 2016 | Published: 01 Mar 2016

IBM MaaS360

Protect Anything, Anywhere with Dell Data Protection and Rapid Recovery
sponsored by Dell, Inc.
DATA SHEET: Discover a data protection and rapid recovery software that protects systems, apps, and data in any environment. This solution can provide your enterprise with many beneficial features, including rapid snap for applications, live recovery, cloud archive, and more.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Dell, Inc.

Modernize and Simplify with Flash Storage
sponsored by EMC
RESOURCE: Discover affordable all-flash and hybrid storage solutions that can support all of your workloads with rich data services and data protection. See how your enterprise can boost your storage performance with this flexible, cost-efficient solution.
Posted: 03 Jun 2016 | Published: 30 Apr 2016

EMC
101 - 125 of 2770 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement