IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
126 - 150 of 2446 Matches Previous Page  |  Next Page
Building a Business Case for Cyber Threat Intelligence
sponsored by SurfWatch Labs
WHITE PAPER: This white paper gives you 5 main reasons for a risk-based approach to cybersecurity. Access now to learn how you can know the specific cyber threats targeting your business redirect your cyber tactics for the most effective defense and bring cybersecurity into the broader risk discussion.
Posted: 25 Mar 2016 | Published: 01 Feb 2016

SurfWatch Labs

Demo of OptioAware by OptioLabs
sponsored by OptioLabs
VIDEO: View this video to learn how you can employ your monitor to actively prevent visual eavesdropping by blurring the display whenever an authorized user is not paying attention. Protect data stored locally on your desktop when you're not around.
Posted: 25 Mar 2016 | Premiered: 21 Dec 2015

OptioLabs

National Government Department: Boosting Performance for 3D Graphics Apps with All-Flash Array
sponsored by EMC XtremIO
CASE STUDY: This case study uncovers how one national government adopted all-flash array storage to run their VDI and graphics-intensive applications in order to replace expensive dedicated workstations with high-performance virtual zero-client desktops that strengthened security while delivering a better 3D graphics experience.
Posted: 25 Mar 2016 | Published: 30 Sep 2015

EMC XtremIO

Drive Performance Up and the Cost of Hybrid Flash Down with Deduplication
sponsored by EMC
WHITE PAPER: This white paper highlights a solution that offers simple and flexible data deduplication management while providing efficient storage utilization to the applications that can take advantage of the technology. Learn how this solution can improve your enterprise's overall data center efficiency and storage infrastructure management.
Posted: 24 Mar 2016 | Published: 31 Aug 2015

EMC

Expanding Your Collaborative Infrastructure to the Cloud
sponsored by IBM
VIDEO: Learn how you can transform collaborative efforts by leveraging the cloud. Explore ways to provide strategies that expand your infrastructure to deliver results with your existing enterprise content management (ECM) solutions.
Posted: 23 Mar 2016 | Premiered: 02 Nov 2015

IBM

How Teams Get the Job done without any Risk: Collaborative File Sync and Share
sponsored by IBM
VIDEO: In this video, you'll explore strategies for secure content collaboration on file sync and share. Tune in for more information on ways to help the whole enterprise collaborate, even those who work off-premises.
Posted: 23 Mar 2016 | Premiered: 02 Nov 2015

IBM

Setting the Stage: Landscape Shifts Dictate Future Threat Response Strategies
sponsored by TrendMicro
RESOURCE: A deeper threat landscape greeted 2016—a playing field shaped by the introduction of new technologies and attack models. Access this report to see 2016's threat landscape in review, and discover why you need to reconsider traditional methods of protecting your data and assets.
Posted: 23 Mar 2016 | Published: 23 Mar 2016

TrendMicro

Security for the Internet of Things: Upcoming Trends to Watch
sponsored by Microsoft
RESOURCE: By 2020, over 25% of identified attacks in enterprises will involve the Internet of Things (IoT). In this resource, Gartner's IoT security analysts offer predictions for upcoming market trends and recommendations about which security services are worth the investment.
Posted: 23 Mar 2016 | Published: 09 Dec 2015

Microsoft

10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 Mar 2016 | Published: 02 Mar 2016

Dell SecureWorks

Webinar - Network security without compromise
sponsored by Aruba Networks
WEBCAST: In this webcast, you will learn how to enhance network security, enforcement and a better user experience.
Posted: 23 Mar 2016 | Premiered: Feb 1, 2016

Aruba Networks

Determining the True Costs of a Data Breach
sponsored by Dell SecureWorks
WHITE PAPER: This white paper takes an in-depth look at the true costs of a data breach. Keep reading to learn steps and tips you may take to determine and reduce the cost of your next breach.
Posted: 23 Mar 2016 | Published: 01 Feb 2016

Dell SecureWorks

Virtualizing Graphics Desktops: Customer Perspectives
sponsored by EMC XtremIO
CASE STUDY: In this blog post, learn how one federal agency chose an all-flash storage array to run its VDI and graphics-intensive applications. Read on and discover how using all-flash allowed them to replace dedicated workstations with high-performance virtual desktops that strengthened security while delivering a better 3D graphics experience.
Posted: 23 Mar 2016 | Published: 10 Sep 2015

EMC XtremIO

Extend Security and Control from the Data Center Edge to the Core
sponsored by VMware, Inc.
EBOOK: This eBook presents solutions to three of today's common network security issues and how software-defined data centers are here to provide the tools that you will need moving forward.
Posted: 22 Mar 2016 | Published: 16 Mar 2016

VMware, Inc.

Data Governance: The True Key to Effective Risk Management
sponsored by Guidance Software, Inc.
EGUIDE: In this eguide, you will learn the real importance of information governance. It's much more than keeping track of digital records for compliance reasons. Discover how to build classification tools and functional descriptive data into our digital assets so they can be accessed for business with increased efficiency.
Posted: 22 Mar 2016 | Published: 18 Mar 2016

Guidance Software, Inc.

Oracle’s Engineered Systems Approach to Maximizing Database Protection
sponsored by Oracle, in association with Intel
WHITE PAPER: Access this white paper and discover how your organization can gain better backup and recovery performance to meet stringent RPO and RTO SLAs, reduced data loss exposure, increased data integrity, and greater application user satisfaction.
Posted: 22 Mar 2016 | Published: 01 Jan 2016

Oracle, in association with Intel

Fault Tolerance Ease of Setup Comparison Guide
sponsored by NEC/INTEL
WHITE PAPER: This white paper compares two fault tolerant solutions – a hardware vs. a software solution - to determine which one is easier to set up. Learn which one required 36.6% fewer steps and needed fewer components.
Posted: 22 Mar 2016 | Published: 22 Mar 2016

NEC/INTEL

Market Overview: Customer Identity and Access Management Solutions
sponsored by Gigya
WHITE PAPER: How can you balance a seamless customer experience with a strong security strategy to protect customers' privacy? This Forrester report evaluates 7 customer identity and access management (CIAM) solution vendors, revealing the major strengths of each choice. Discover the key features to look for when deciding on a CIAM solution.
Posted: 21 Mar 2016 | Published: 04 Aug 2015

Gigya

Demo: Oracle Zero Data Loss Recovery Appliance
sponsored by Oracle, in association with Intel
VIDEO: This video highlights a zero data loss recovery appliance that enables data recovery at any point in time. Watch this demo to see how this appliance can improve your backup with comprehensive, real-time visibility into your database protection.
Posted: 21 Mar 2016 | Premiered: 04 Aug 2015

Oracle, in association with Intel

Why a Cultural Shift Is Needed for Proper Treatment of Data
sponsored by Hewlett-Packard Enterprise
WEBCAST: In this video, you will discover a discussion with Sacha Stuparich, Practice Partner for Financial Services, Communications, & Media at Hewlett-Packard Enterprise, in which he examines the changing use of data in the financial services industry.
Posted: 21 Mar 2016 | Premiered: Nov 18, 2015

Hewlett-Packard Enterprise

Oracle's Zero Data Loss Recovery Appliance
sponsored by Oracle, in association with Intel
WHITE PAPER: This white paper overviews Oracle's zero data loss recovery appliance that offers a new approach to database protection by virtually eliminating data loss and backup overhead with cloud-ready scalability. Discover how this appliance can provide your enterprise with continuous real-time protection and ensure fast recovery and shortened RTO.
Posted: 21 Mar 2016 | Published: 31 Dec 2015

Oracle, in association with Intel

The Evolution of Consumer Identity: 5 Biggest Trends
sponsored by Gigya
WHITE PAPER: This resource reveals the 5 biggest trends currently influencing the customer identity and access management space. Learn how to prepare for upcoming developments regarding traditional usernames and passwords vs biometric authentication, regional data privacy regulations, IoT, and more.
Posted: 18 Mar 2016 | Published: 31 Dec 2015

Gigya

The Secure Mobile Enterprise: Enabling Mobility while Controlling Risk
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Building a secure mobile enterprise requires a broad, scalable and integrated approach that manages and secures every aspect of mobility usage. To learn more about four essential components of such an enterprise and how to bring them to yours, access this white paper.
Posted: 18 Mar 2016 | Published: 18 Mar 2016

Dell, Inc. and Intel®

In-Depth Report: Enterprise Content Management and File Sharing
sponsored by IBM
WHITE PAPER: This publication describes how enterprise content management (ECM) and file sharing enable higher maturity in ECM, and distills the capabilities provided by each integration and as a whole. Access now and learn how to create an integrated, end-to-end approach using the capabilities of ECM and file sharing.
Posted: 18 Mar 2016 | Published: 01 Mar 2016

IBM

An Effective Data Archiving System Can Ease Backup Woes
sponsored by Veritas
EGUIDE: This e-guide examines data creation and growth and the troubles you may have storing it. Learn why data is cluttering up your archives and how to mitigate unstructured data until it becomes useful again so that you can improve your backup operations substantially and reduce cost.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

Veritas

New Data Backup Approaches: Instant VM Recovery, Flat Backup, Hybrid Cloud Backup, and More
sponsored by Veritas
EGUIDE: This e-guide discusses modern approaches to backup that are allowing for efficient data recovery and security, focusing on snapshots, flat backup, hybrid cloud backup, and instant VM recovery. Access now to learn more so that you can establish what backup solution would most benefit your enterprise.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

Veritas
126 - 150 of 2446 Matches Previous Page    4 5 6 7 8 9    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement