IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
101 - 125 of 2396 Matches Previous Page  |  Next Page
5 Essentials for Achieving Cloud Archiving Success
sponsored by Mimecast
WHITE PAPER: Learn five essentials for achieving cloud archiving success, including guidance on how to avoid common misconceptions about cloud email archiving, and how to prepare for e-discovery and litigation with a secure storage solution.
Posted: 27 Oct 2016 | Published: 27 Oct 2016

Mimecast

Case Study: Vigilias Expands Telehealth to Rural Communities
sponsored by Ambra
CASE STUDY: This brief case study illustrates how Vigilias, healthcare communications provider, overcame its outdated hardware to reduce the cumbersome number of systems, and also seamlessly provide access to studies across disparate EHRs.
Posted: 25 Oct 2016 | Published: 25 Oct 2016

Ambra

Drive Innovation with Agile Cloud Medical Imaging
sponsored by Ambra
VIDEO: Tune into this video to learn how Partners in Health, Memorial Hermann Health System, Barrow Neurological Institute, and the Mayo Clinic were able to streamline healthcare diagnostic image exchange, automate workflow processes, and allow anytime mobile viewing with the cloud.
Posted: 25 Oct 2016 | Premiered: 25 Oct 2016

Ambra

Getting a Grip on Content: Empowered Content Collaboration in the Cloud
sponsored by IBM
RESOURCE: Access this resource for insight into how collaboration capabilities can turn content into a competitive advantage and striking the balance between content security and access. Additionally, discover resource requirements for deploying an ECM tool, and learn more about cloud-based content management implementation.
Posted: 19 Oct 2016 | Published: 31 Dec 2015

IBM

Is Your Data Secure?
sponsored by Commvault
INFORMATION CENTER: BYOD in the enterprise is here to stay, creating new data security challenges as employees move data to the cloud through a multitude of devices. This infographic provides 9 BYOD security facts to help you further develop and refine your BYOD strategy.
Posted: 18 Oct 2016 | Published: 29 Jul 2016

Commvault

Best-of-Breed Next-Generation Security For the Mid-Market
sponsored by Barracuda Networks
WHITE PAPER: Discover a security framework that integrates purpose-built, highly scalable security solutions to protect users, networks, and data center applications. Learn how to secure your network against intrusions and protect against email and web threats.
Posted: 18 Oct 2016 | Published: 30 Sep 2016

Barracuda Networks

Content Security in the Cloud Era
sponsored by Barracuda Networks
WHITE PAPER: Discover a cloud-based approach to content filtering and other benefits for network user and administrators. Learn the most effective new approaches to cloud security in the face of the changing security landscape.
Posted: 18 Oct 2016 | Published: 30 Sep 2016

Barracuda Networks

Leverage Real-Time Protection from Advanced Web Threats
sponsored by Trustwave
WHITE PAPER: Discover a real-time web protection strategy that can target modern malware threats. Learn how to protect against dynamic, cross-component malware threats and get a full view into your past with historical views of web usage and threats, malware detected and malicious activity blocked.
Posted: 17 Oct 2016 | Published: 30 Sep 2016

Trustwave

Enable Data Protection in the Cloud
sponsored by Commvault
WHITE PAPER: Discover a holistic platform that addresses data management and protection needs, spanning from your data center to your multi-cloud environment. Learn how to orchestrate complex end-to-end processes with custom workflow automation engines that let you set it and forget it.
Posted: 12 Oct 2016 | Published: 30 Sep 2016

Commvault

Formulate an Enterprise Storage Capacity Plan that Doesn't Bust Your Budget
sponsored by IBM
EGUIDE: Learn how to formulate a storage capacity plan that won't bust the IT budget; here, you will also find guidance on how to reduce component complexity with the adoption of now-affordable SSDs, all-flash arrays, and storage as a service, so as to accommodate unstructured data growth.
Posted: 26 Oct 2016 | Published: 25 Oct 2016

IBM

The Evolution of Locky Ransomware's Javascript Downloaders
sponsored by Booz Allen Hamilton
RESOURCE: Learn the history of the Locky ransomware virus and how to spot it. Discover how it was created and what you can do to keep it from infecting your systems.
Posted: 26 Oct 2016 | Published: 30 Sep 2016

Booz Allen Hamilton

NSS Labs Data Center IPS Test Report: IBM XGS 7100
sponsored by IBM
PRODUCT OVERVIEW: This report represents the independent test results of IBM Security Network Protection XGS 7100 v5.3.2.1 conducted by NSS Labs. Learn how IBM's Data Center Intrusion Prevention System (DCIPS) faired against NSS Labs' tests and how it stacks up against other DCIPS products.
Posted: 24 Oct 2016 | Published: 30 Sep 2016

IBM

Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response
sponsored by Xerox
EGUIDE: In early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.
Posted: 20 Oct 2016 | Published: 19 Oct 2016

Xerox

How IAM Can Address Unstructured Content Security Risks
sponsored by IBM
EGUIDE: In this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

IBM

How to Segment Cloud Workloads for Better Security
sponsored by IBM
EGUIDE: Enterprise cloud workloads can be better secured by using microsegmentation. In this e-guide, Ed Moyle explains the best ways to execute a segmentation strategy.
Posted: 19 Oct 2016 | Published: 18 Oct 2016

IBM

The Security Risks of Network Sensors in the Enterprise
sponsored by IBM
EGUIDE: In this expert guide, discover more about network sensors and what they mean for your organization's well-being. Learn how cybercriminals can utilize network sensors for their own malicious deeds and what you can do to prevent hackers from stealing valuable enterprise secrets.
Posted: 17 Oct 2016 | Published: 11 Oct 2016

IBM

Top 5 Pitfalls to Avoid in Your Data Protection Strategy
sponsored by HDS and Veritas
WHITE PAPER: Discover five critical pitfalls to avoid when building a successful data protection strategy for your organization. Learn how to best navigate the various data protection solutions from digital to physical and private to public clouds while ensuring enterprise scalability.
Posted: 14 Oct 2016 | Published: 30 Sep 2016

HDS and Veritas

8 Tips to Stay Ahead of the Top 2016 Data Protection Trends
sponsored by HDS and Veritas
WHITE PAPER: Data protection has never been more in the forefront, as information is the lifeblood and differentiator in a constantly changing world. Discover 8 tips to help you stay ahead of the top 2016 data protection trends, ultimately helping you innovate and create business value.
Posted: 13 Oct 2016 | Published: 30 Sep 2016

HDS and Veritas

Five Ways to Secure Mobile Data with EMM
sponsored by vmware airwatch
EGUIDE: In this expert guide, discover five ways to improve your enterprise mobility management (EMM) policies and secure sensitive data on unsecure devices. Learn how to restrict mobile data movement and neutralize mobile data threats to improve business continuity.
Posted: 12 Oct 2016 | Published: 10 Oct 2016

vmware airwatch

The Truth After the Hype: Improve Mobile Data Security
sponsored by vmware airwatch
EGUIDE: In this expert guide, learn how to strengthen your defenses against mobile security breaches with encryption, containerization and more. Discover the new, common vulnerabilities mobile devices and data face and best practices to manage them moving forward.
Posted: 11 Oct 2016 | Published: 10 Oct 2016

vmware airwatch

Hitachi Data Systems and Veritas: Joint Brochure
sponsored by HDS and Veritas
WHITE PAPER: Discover how your organization can save money, save resources and reduce risk through better, more economical data management. Learn how to transform your data into valuable information and shape it into an integral, cost-effective source of business intelligence.
Posted: 11 Oct 2016 | Published: 30 Sep 2016

HDS and Veritas

Building an Unstructured Data Protection Program
sponsored by STEALTHbits
EGUIDE: In this e-guide learn the 3 dimensions of unstructured data risk, and how to develop a holistic approach to managing these risks in order to execute a successful unstructured data protection program in your company.
Posted: 10 Oct 2016 | Published: 07 Oct 2016

STEALTHbits

No Downtime, No Problem. Silverstring Protects Customers and Their Data
sponsored by Neustar
WHITE PAPER: Discover how Silverstring protects their customers' mounds of data and keep their site up and running without the risk of downtime. With top notch performance, availability and security, Silverstring rests assured that they can meet any IT challenge they face moving forward.
Posted: 10 Oct 2016 | Published: 30 Sep 2016

Neustar

Discover the Most Important App Security Testing Basics
sponsored by Synopsys
EGUIDE: Use this expert e-guide by Kevin Beaver, a 16-year veteran of the security testing world to help you better understand how testing web apps for weaknesses in your security protocols can help you identify and rectify them before threats happen.
Posted: 10 Oct 2016 | Published: 10 Oct 2016


What Are The Security Benefits of Using Thin Client Devices?
sponsored by Dell, Microsoft and Citrix
EGUIDE: Thin clients are useful endpoints for organizations that support VDI, because they provide and extra layer of protection from user-initiated security risks. In this e-guide, find out the security benefits of using thin client devices as part of your desktop virtualization strategy.
Posted: 05 Oct 2016 | Published: 04 Oct 2016

Dell, Microsoft and Citrix
101 - 125 of 2396 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement