IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
101 - 125 of 2624 Matches Previous Page  |  Next Page
Get started in e-Commerce with the Right Payment Foundation
sponsored by CyberSource
WHITE PAPER: Avoid shopping cart abandonment. Help digital patrons take items to checkout by accepting more payments across channels, while effectively managing fraud and payment security. In this infographic, explore 4 steps to help you get started.
Posted: 17 Jun 2016 | Published: 17 Jun 2016

CyberSource

Enterprise Email and Office 365 Security
sponsored by Check Point Software Technologies Ltd.
EGUIDE: One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.
Posted: 17 Jun 2016 | Published: 07 Jun 2016

Check Point Software Technologies Ltd.

The Future of Endpoint Protection
sponsored by Atos
ANALYST BRIEF: Discover how to best secure your endpoints against today's hostile threat environment. Learn how secure operations, secure technology and secure applications to protect corporate data against physical or digital theft.
Posted: 17 Jun 2016 | Published: 01 May 2016

Atos

‘PowerShell’ Deep Dive: A United Threat Research Report
sponsored by Carbon Black
WHITE PAPER: Learn more about PowerShell and how cybercriminals are using it to expedite their criminal activities. This report outlines several techniques attackers use to leverage PowerShell to gain access to organizations' endpoints and provides suggestions on how security teams can detect, prevent and respond to such attacks.
Posted: 17 Jun 2016 | Published: 01 May 2016

Carbon Black

Application Control for Dummies
sponsored by Carbon Black
EBOOK: This e-book emphasizes best practices for understanding the benefits of application control, then choosing and deploying an application control platform. It's a quick, easy-to-understand guide, but comprehensive in its scope so you may improve your security posture as soon as possible.
Posted: 17 Jun 2016 | Published: 01 May 2016

Carbon Black

Mobile Application Security Report 2016
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Discover just how much of your data is being collected and to what extent applications can access your data. Learn precautionary steps you can take to make sure applications aren't grabbing data you don't want them to and make responsible choices when downloading apps.
Posted: 16 Jun 2016 | Published: 01 May 2016

Hewlett Packard Enterprise

The Breach Detection Gap and Strategies to Close It
sponsored by Infocyte
WHITE PAPER: What's needed is a layered approach to breach discovery that includes looking for threats which have slipped past the perimeter. Discover how to catch what prevention technologies miss. Reduce the breach detection gap and learn now to mitigate the possible damage caused by prolonged unauthorized access.
Posted: 15 Jun 2016 | Published: 01 May 2016

Infocyte

Clustering for Axway SecureTransport
sponsored by Axway
WHITE PAPER: Learn how to successfully implement clustering for MFT and other business-critical services in your organization. Get proven expertise to leverage an enhanced MFT gateway that supports Standard Clustering and Enterprise Clustering to meet a wide range of capacity requirements and help your organization ensure business continuity.
Posted: 15 Jun 2016 | Published: 31 Dec 2012

Axway

Employing Cyber Threat Intelligence
sponsored by Anomali
WHITE PAPER: Cyber threat intelligence is fast becoming a cornerstone in enterprise security but are you using your various intelligence feeds most effectively? Learn how organizations large and small are increasingly adding threat intelligence to their security posture and see what type of attacks you can mitigate using threat intelligence.
Posted: 15 Jun 2016 | Published: 01 Feb 2016

Anomali

Axway SecureTransport Enhanced Managed File Transfer Gateway
sponsored by Axway
WHITE PAPER: Handle everything from high-volume automated file transfers between systems, sites and lines of business to user-driven communications and mobile file sharing. Ensure you're ready for high-growth uses cases while maintaining corporate controls and visibility.
Posted: 14 Jun 2016 | Published: 31 Dec 2015

Axway

Pivot3 Marries Erasure Coding and Hyperconvergence
sponsored by Pivot3
WHITE PAPER: Discover a hyper-converged infrastructure platform that implements scalar erasure codes to deliver higher storage efficiency and greater resilience than data replication. Explore how to enable efficient, resilient data protection in your hyper-converged environment.
Posted: 14 Jun 2016 | Published: 31 Dec 2015

Pivot3

Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud
sponsored by Equinix
TRANSCRIPT: Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery (DR) solutions to protect important data. Discover how hybrid cloud DR can enable your enterprise to reduce RTO and RPO, recovery full systems or individual files, and more.
Posted: 14 Jun 2016 | Published: 14 Jun 2016

Equinix

Making the Most of Hybrid Cloud for Backup and Archiving
sponsored by Equinix
TRANSCRIPT: Data storage experts, Jeff Kaplan, Domenic Steinbrueck, and Don Wiggins, discuss how cloud backup and archiving can improve both data reliability and recovery. Discover how your enterprise can achieve a greater amount of utility and flexibility when it comes to capturing and utilizing your data, without risking security.
Posted: 14 Jun 2016 | Published: 14 Jun 2016

Equinix

The Essential Guide to Managed Backup
sponsored by Solarwinds N-able
EBOOK: Even a couple of hours downtime could cause your customers to experience lost revenue, lost customers, and the permanent loss of data. Can your business take that hit? Read this eBook to discover how you can manage, store, and protect your customers' data, as well as streamline your backup routine.
Posted: 14 Jun 2016 | Published: 14 Jun 2016

Solarwinds N-able

Log Monitoring & Analysis: Strengthen Information Security While Respecting User Privacy
sponsored by Intersect Alliance
EGUIDE: Log monitoring and analysis tools can be used to bolster information security and improve incident response without infringing on user privacy. In this expert e-guide, security pros evaluate options based on criteria such as alerts and reporting capabilities.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intersect Alliance

Six Steps to Buying Data Loss Prevention Products
sponsored by Intel Security
EGUIDE: Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

Making the Most of Hybrid Cloud for Future-Proofed Data Storage Part 1
sponsored by Equinix
TRANSCRIPT: Data storage experts discuss how the right hybrid cloud solution, if implemented successfully, can provide infinite storage capacity that is secure and reliable. Access now to learn what characteristics you need in a hybrid cloud infrastructure to meet your data management needs.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Equinix

Putting the “Secure” in Secure Remote Access
sponsored by Citrix
WHITE PAPER: Security pros today are challenged to establish comprehensive protection for all kinds of remote access use cases. Learn how you can deliver a single, consolidated remote access infrastructure featuring comprehensive access, threat and data protection.
Posted: 13 Jun 2016 | Published: 01 May 2016

Citrix

Integrating Data Protection andActive Archiving
sponsored by HGST
WHITE PAPER: Learn how to easily integrate data protection with scalability. An integrated solution demonstrates data availability at scale, manageability, disaster recovery capabilities and simplicity agreeable to the demands of current and future enterprise data center environments.
Posted: 13 Jun 2016 | Published: 01 Apr 2016

HGST

Integrated Solution for Workforce Mobility and Secure Hybrid Cloud
sponsored by Hitachi Data Systems
WHITE PAPER: Discover a content platform portfolio that combines object storage software with hybrid cloud to efficiently consolidate, automate, mobilize and archive data. See how this solution can bring structure to your unstructured data, simplify your storage management, ensure security, and more.
Posted: 13 Jun 2016 | Published: 31 Jan 2015

Hitachi Data Systems

Office 365: Cloud Data Security Considerations, Benefits to Explore Before Adopting
sponsored by Proofpoint, Inc.
EGUIDE: IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Proofpoint, Inc.

The Impacts of Organizations Not Keeping Up with Cybercriminals
sponsored by Proofpoint, Inc.
EGUIDE: Organizations are struggling to keep up with rapid changes in security techniques by cybercriminals. In this expert guide, explore the 4 main threats that occurred in 2015, how social media is increasing as a source of brand and compliance risk, and receive a product overview of Proofpoint Enterprise Protection.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Proofpoint, Inc.

Top Object Storage Enterprise Use Cases
sponsored by Cleversafe
EGUIDE: Access this exclusive guide to learn about object storage trends, why its use cases are growing, and how to determine which, if any, would be right for your storage strategy.
Posted: 13 Jun 2016 | Published: 10 Jun 2016

Cleversafe

Security Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.
Posted: 13 Jun 2016 | Premiered: May 1, 2016

Intel Security
101 - 125 of 2624 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement