IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
101 - 125 of 2685 Matches Previous Page  |  Next Page
Mining for Insight: Rediscovering the Data Archive
sponsored by Iron Mountain
WHITE PAPER: Uncover study results that highlight the struggles enterprises have with archiving their data. Discover how to implement a consistent approach to data archiving so that you can leverage your data and improve your customer service and revenue streams.
Posted: 16 May 2016 | Published: 30 Jun 2015

Iron Mountain

Understanding How IBM Spectrum Protect Enables Hybrid Data Protection
sponsored by IBM
WHITE PAPER: Moving to a hybrid cloud infrastructure is a no-brainer for many organizations as it provides greater efficiency and cost effectiveness. But, choosing a cloud services provider who provides the best data protection isn't as clear. Learn what to look for when architecting your hybrid cloud solution and how to best protect your backups.
Posted: 16 May 2016 | Published: 31 Aug 2015

IBM

Definitive Guide: Securing The Mobile Enterprise
sponsored by Aruba Networks
WHITE PAPER: Mobility, BYOD and cloud computing are changing the way people do work and this can quickly become a nightmare for security and IT managers. Access this white paper to learn how to handle the increasingly mobile workforce and turn mobility into a business advantage.
Posted: 16 May 2016 | Published: 04 May 2016

Aruba Networks

FAQ: ShareFile Cloud for Healthcare
sponsored by Citrix
WHITE PAPER: Answer your frequently asked questions regarding ShareFile Cloud, an enterprise file sync and sharing (EFSS) solution, and see its benefits for healthcare organizations. Access now to witness how your organization can manage patient files and meet HIPAA requirements with an EFSS service.
Posted: 16 May 2016 | Published: 31 Dec 2014

Citrix

The Need for Third Party Archiving
sponsored by Commvault
WHITE PAPER: Third-party email archiving solutions can address customer needs that basic archiving solutions, such as Microsoft's Office 365, can't achieve. Discover the benefits your enterprise can achieve with a third-party archiving solution, such as storage flexibility, advanced search capabilities, full audit of the archive and more.
Posted: 16 May 2016 | Published: 31 Mar 2015

Commvault

SOC Blog
sponsored by Citrix
RESOURCE: This report contains detailed information about the design and operation of shared file systems put in place to protect customer data. Access now to learn how you can provide greater customer security assurance.
Posted: 16 May 2016 | Published: 10 Mar 2016

Citrix

Where Network Virtualization Fits Into Data Center Initiatives
sponsored by VMware
WHITE PAPER: Network virtualization is what is going to enable you to keep up with the constant advances in technology without having to sweat over too many details. See how it fits into your existing physical network, your plans for software-defined data center and much more.
Posted: 16 May 2016 | Published: 29 Jan 2016

VMware

What You Want To Know (But Haven’t Asked) About Micro-Segmentation
sponsored by VMware
TECHNICAL ARTICLE: Perimeter security is no longer enough to meet data center security requirements. Micro-segmentation is an important security aspect that you need to fully understand. Explore this technical brief to learn about facets of micro-segmentation that many resources don't cover.
Posted: 16 May 2016 | Published: 30 Dec 2015

VMware

Five New Rules for Enterprise File Sync and Share Service Providers
sponsored by Citrix
RESOURCE: Because of those concerns, new rules for EFSS providers have been put in place. These rules provide security benefits to customer data while restricting access of files to EFSS providers.
Posted: 16 May 2016 | Published: 18 Nov 2014

Citrix

The Zero Trust data center in action
sponsored by VMware
WHITE PAPER: Micro-segmentation is the key to securing your data center from the inside out. Read on to learn more about how micro-segmentation works, how to incorporate it, the role network virtualization plays and the benefits it brings.
Posted: 16 May 2016 | Published: 27 Apr 2016

VMware

Assessing the Opportunities Presented by the Modern Enterprise Archive
sponsored by Druva Software
ANALYST REPORT: There are 4 key areas in which enterprise archive solutions have evolved; cloud and remote user continuity, full-text and metadata indexing and search, automated data compliance awareness, and data policy management. Discover business benefits your enterprise can achieve with a modern archive solution.
Posted: 16 May 2016 | Published: 30 Nov 2015

Druva Software

How ShareFile Works to Prevent Data Loss and Meet Compliance Requirements
sponsored by Citrix
RESOURCE: To prevent costly data leakage, data loss prevention tools must be integrated into your file sharing system. This will enable you to put restrictions on what information can leave your network giving you full visibility into your data's whereabouts. Learn more about content-aware sharing to better protect your organization.
Posted: 16 May 2016 | Published: 12 May 2015

Citrix

Practical Guide to IT Security Breach Prevention Part II
sponsored by Kaspersky Lab
EBOOK: With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints than ever before. Kaspersky Lab has created a set of IT & Data Security Breach Prevention Practical Guides to simplify this seemingly daunting task.
Posted: 16 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Computer Weekly – 17 May 2016: Countdown begins to new EU data protection rules
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, with the new EU data protection rules ready to become law, firms now have just two years to prepare – we assess the challenges. Manufacturing giant Rolls-Royce talks about why it moved its HR systems to the cloud. And we look back at 50 years of technology innovation in storage. Read the issue now.
Posted: 16 May 2016 | Published: 17 May 2016

ComputerWeekly.com

Why Move Backup and Disaster Recovery To The Cloud
sponsored by Druva Software
WHITE PAPER: Discover 20 real-world business reasons to move backup, archival, and disaster recovery (DR) to a unified cloud platform. See how public cloud can provide your enterprise with the reliability, security, and scalability you need to protect your disparate workloads.
Posted: 16 May 2016 | Published: 16 May 2016

Druva Software

Security and availability in extremely adverse environments
sponsored by Barracuda Networks
RESOURCE: Exalo Drilling chose a next-generation firewall to protect their growing infrastructure. The centralized management, application awareness and overall efficiency exceeded their expectations. Learn more about how their experience could benefit your organization's IT infrastructure.
Posted: 16 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Making the Most of Hybrid Cloud for Future-Proofed Data Storage
sponsored by Equinix
PODCAST: Data storage experts discuss the adoption of a hybrid cloud strategy as a means of ensuring infinite storage capacity that is secure and reliable. Learn how to determine if a hybrid cloud infrastructure is best suited to meet your data management needs.
Posted: 16 May 2016 | Premiered: Apr 18, 2016

Equinix

Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud
sponsored by Equinix
WEBCAST: Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery (DR) solutions to protect important data. Access now to see how hybrid cloud DR can enable your enterprise to reduce RTO and RPO, recovery full systems or individual files, and more.
Posted: 16 May 2016 | Premiered: Apr 18, 2016

Equinix

Prevent Data Loss with Exabeam
sponsored by Exabeam
WHITE PAPER: User behavior analytics (UBA) provides the context needed to evaluate user behavior accurately and efficiently. It focuses on the user handling the data rather than the data itself. Learn how you can pair your DLP tools with UBA to best prevent data loss and exfiltration.
Posted: 16 May 2016 | Published: 01 Apr 2016

Exabeam

Gartner Magic Quadrant for Enterprise Data Loss Prevention
sponsored by Intel Security
ANALYST BRIEF: This report gives you strengths and weaknesses from some of today's best (and worst) integrated data loss prevention (DLP) vendors to help you choose the right DLP solution aligned with your organization's particular security pain points.
Posted: 13 May 2016 | Published: 28 Jan 2016

Intel Security

Stop Data Exfiltration
sponsored by Intel Security
RESOURCE: Gain insight into hackers' motivations and understand which pieces of information are most valuable for them to steal (chances are they're the same ones most valuable to you). Go in depth into data exfiltration secrets to better understand the complexities of how a network is breached and robbed of personal, corporate, and customer information.
Posted: 13 May 2016 | Published: 01 Apr 2016

Intel Security

Keep Your Data Safe for Office 365
sponsored by Intel Security
RESOURCE: Built in DLP capabilities aren't robust enough to stop advanced persistent threats. Access now to learn how you can enhance your cloud data protection and gain expansive, yet flexible policies that will help address threats to your data and risky employee behavior.
Posted: 13 May 2016 | Published: 01 Apr 2016

Intel Security

What’s the Problem? Overcoming 4 Key Challenges in Data Privacy
sponsored by Iron Mountain
WHITE PAPER: Learn the 4 key challenges in data privacy and how to overcome them. Data privacy must be protected on a continuous basis far beyond the requirements of passing compliance audits.
Posted: 13 May 2016 | Published: 01 Apr 2016

Iron Mountain

5-Step Guide For GDPR Compliance
sponsored by Druva Software
WHITE PAPER: This white paper shows you a 5-point plan to prepare your organization to meet the new needs of data protection regulations. Learn how to track the creation of new files on laptops and other mobile devices and automatically ensure that files containing customer data and PII are protected.
Posted: 13 May 2016 | Published: 01 Apr 2016

Druva Software

IT Guide: Protecting Corporate Data Beyond the Firewall
sponsored by Druva Software
WHITE PAPER: 24/7 data monitoring can ensure your important information stays on devices and on networks that you deem safe. Learn how to be proactive in your compliance requirements and stay on top of how your data is handled.
Posted: 13 May 2016 | Published: 01 Apr 2016

Druva Software
101 - 125 of 2685 Matches Previous Page    3 4 5 6 7 8    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement