IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
126 - 150 of 2242 Matches Previous Page  |  Next Page
Securing Big Data Environments
sponsored by Hortonworks
RESOURCE: This resource outlines a particular security platform that can centralize data access policies and key management to protect the entire big data environment, including structured and unstructured data sources. Read now to learn how your organization can protect your data by accessing this resource.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Hortonworks

5 Reasons Every MSP Should Sell SaaS Data Protection
sponsored by Datto, Inc.
WHITE PAPER: This white paper gives five reasons why MSPs need to take advantage of the growing need for SaaS environment data protection.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Datto, Inc.

Customer Spotlight: Deploying a Data Protection Program In Less Than 120 Days
sponsored by Digital Guardian
WEBCAST: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 09 Jun 2015 | Premiered: Nov 5, 2014

Digital Guardian

Security Audit Checklist
sponsored by Digital Guardian
RESOURCE: This checklist presents the 12 most common questions in a client data protection audit to get your organization ready to meet stringent partner or supplier data management requirements. Continue reading to assess your security strategy and prepare for an audit.
Posted: 09 Jun 2015 | Published: 29 Apr 2015

Digital Guardian

Growing Data, Growing Danger: How To Reduce Breaches
sponsored by Micron Technology
RESOURCE: This helpful resource details how to protect data from potential breaches using SSD. Read on to get the facts about data security, and why all companies must put data protection at the top of their priorities.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Micron Technology

Protect Information Like a Pro: A Guide for Enterprise CIOs
sponsored by Clearswift
EGUIDE: This CIO essential guide teaches you how to protect information and is designed to give IT leaders strategic management and decision-making advice.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Clearswift

5 Ways to Meet Today's Data Management Challenges with a Single Platform
sponsored by Commvault
WHITE PAPER: This resource describes how investing in a platform that integrates data backup, retention, search and access can provide a more holistic and integrated data management system.
Posted: 03 Jun 2015 | Published: 31 Dec 2014

Commvault

5 Important Questions to Ask Before You Renew with Your Legacy Backup Software
sponsored by Commvault
WHITE PAPER: This resource discusses the five questions every storage professional needs to ask themselves before deciding to renew their old data backup software.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Commvault

How to Sync, Share & Control Data Securely
sponsored by Commvault
WHITE PAPER: Access this resource to learn about a solution to data security in the world of cloud file sharing.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Commvault

Best Practices for Building Cloud Security Strategy with Confidence
sponsored by IBM
RESOURCE: This infographic presents the top 4 cloud security elements you need to include in your strategy. Continue reading to learn how to mitigate risk in your cloud environment whether it's SaaS, IaaS, or PaaS.
Posted: 01 Jun 2015 | Published: 17 Dec 2014

IBM

5 Strategies For Email Data Loss Prevention
sponsored by BAE Systems Applied Intelligence (formerly SilverSky)
WHITE PAPER: This white paper outlines 5 best practices for preventing sensitive information leakage while staying compliant with rapidly evolving regulations. Continue reading to learn how to bolster your email security strategy.
Posted: 01 Jun 2015 | Published: 27 May 2015

BAE Systems Applied Intelligence (formerly SilverSky)

10 Essential Steps to Web Security
sponsored by Clearswift
WHITE PAPER: In this white paper, explore the 10 web security best practices to mitigate insider, outsider, and human error threats.
Posted: 28 May 2015 | Published: 13 May 2015

Clearswift

Case Study: Community Bank Improves Both Security and Productivity
sponsored by Clearswift
CASE STUDY: Read this case study to discover how a community bank overhauled its e-mail security to ensure both data protection and employee productivity.
Posted: 28 May 2015 | Published: 06 May 2015

Clearswift

Next Generation Data Loss Prevention
sponsored by Clearswift
WHITE PAPER: In this white paper, discover a content-aware data loss prevention (DLP) solution that offers stronger security for your mission critical information. Click through for a simple 8-step implementation strategy.
Posted: 26 May 2015 | Published: 22 Apr 2015

Clearswift

Dissecting the Foundation of an Adaptive Data Loss Prevention Strategy
sponsored by Clearswift
WHITE PAPER: This white paper reveals the foundation of adaptive data loss prevention strategy.
Posted: 26 May 2015 | Published: 30 Apr 2015

Clearswift

Today's Microsoft Office 365 Security Hurdles
sponsored by Clearswift
WHITE PAPER: This white paper outlines today's 11 Microsoft Office 365 security challenges and how to modify your email security strategy to secure content and data.
Posted: 22 May 2015 | Published: 06 May 2015

Clearswift

DLP Defense for Insider Threats
sponsored by Clearswift
WHITE PAPER: This white paper examines a DLP approach to remove content that breaks policy or industry GRC requirements. Continue reading to learn how to mitigate risks and secure communication in the collaboration or sharing processes.
Posted: 22 May 2015 | Published: 05 May 2015

Clearswift

PDF Protection: Features and Benefits
sponsored by Nuance
VIDEO: PDF files often contain sensitive information about people, organizations, and products that need to be protected before sharing. This brief video explores capabilities that ensure safe PDF sharing. Discover what you may be missing for compliant collaboration.
Posted: 22 May 2015 | Premiered: 02 Apr 2014

Nuance

Why InfoSec Needs Guarantees
sponsored by White Hat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 22 May 2015 | Premiered: May 12, 2015

White Hat Security

Next-Gen DLP: Can It Protect Your Organization?
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen DLP that is adaptive and content/context aware and how it mitigates internal and external data theft and/or leaks. Continue reading to learn what is on the horizon for next-gen DLP and how it will evolve in the coming years.
Posted: 21 May 2015 | Published: 06 May 2015

Clearswift

How Adaptive DLP is Securing the Agile Enterprise
sponsored by Clearswift
WHITE PAPER: This white paper examines next-gen adaptive DLP and compares the two technologies, highlighting 5 vital areas in which adaptive DLP surpasses its aging predecessor.
Posted: 20 May 2015 | Published: 06 May 2015

Clearswift

Benefit from Collaboration without Compromising Security
sponsored by Clearswift
WHITE PAPER: This informative whitepaper outlines a strategy for facilitating collaboration without compromising your IT security.
Posted: 19 May 2015 | Published: 03 Jun 2014

Clearswift

Manage "Lots" of Documents within a Secure Business Process
sponsored by Nuance
WHITE PAPER: This brief white paper pinpoints how Toyota Industries North America met the above goals and saved money and time in the process. Access this resource now to realise the success you can gain from capturing and securing documents.
Posted: 14 May 2015 | Published: 14 May 2015

Nuance

Next Generation Cloud Security
sponsored by Symantec Corporation
DATA SHEET: In this data sheet, you will learn how to fill in the gaps cloud perimeter security leaves vulnerable and strengthen your identity and access management (IAM) strategy.
Posted: 13 May 2015 | Published: 10 Dec 2014

Symantec Corporation

Maximizing the Efficiency of a Loan's Lifecycle
sponsored by Nuance
VIDEO: Manual, paper-based loan processes expose banks to longer delays, errors, and customer attrition. This featured video lays out concerns and strategies to leverage financial institutions' most critical process. Discover the benefits of expediting loans with collaborative technologies.
Posted: 13 May 2015 | Premiered: 23 Mar 2015

Nuance
126 - 150 of 2242 Matches Previous Page    4 5 6 7 8 9    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement