IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
126 - 150 of 2686 Matches Previous Page  |  Next Page
Citrix ShareFile case study - Cherokee Investment Co.
sponsored by Citrix
VIDEO: Secure file sync and sharing is of high importance to every business. When the massive amount of information being shared on a dailty basis, maintaining security can seem like a full-time job. Watch this video now to learn about a solution that enables secure file sharing and mobility.
Posted: 13 May 2016 | Premiered: 23 Feb 2015

Citrix

Your Software: Does the End Justify the Business Value Means?
sponsored by Commvault
WHITE PAPER: Explore important productivity issues and offers tips for enhancing your approach to data management and protection. Learn how to improve your administrative, IT task, and organization productivity with a data management software solution.
Posted: 13 May 2016 | Published: 13 May 2016

Commvault

Making the Most of Hybrid Cloud for Backup and Archiving
sponsored by Equinix
WEBCAST: Data storage experts discuss the approach of implementing a cloud backup and archive solution to improve data reliability and recovery in today's world of big data. Access now to see how your enterprise can achieve a greater amount of utility and flexibility when it comes to capturing and utilizing your data, without risking security.
Posted: 13 May 2016 | Premiered: Apr 18, 2016

Equinix

Internet Security Threat Report: Healthcare
sponsored by Symantec Corporation
EBOOK: This thorough 108-page threat report examines multiple facets of today's threat landscape including targeted attacks, smartphone threats, social media scams and IoT vulnerabilities to help you secure your healthcare system effectively now and into the future.
Posted: 12 May 2016 | Published: 01 Apr 2016

Symantec Corporation

Empowering Analytics for SAP : Tommy Hilfiger Case Study
sponsored by Every Angle
CASE STUDY: Following the re-acquisition of Calvin Klein, it was imperative that Tommy Hilfiger ensure all of the different brand's business processes aligned properly. Discover in this case study how Tommy Hilfiger completed their simplified data migration project to SAP without disruption, and ensured customer data was error-free.
Posted: 12 May 2016 | Published: 12 May 2016

Every Angle

Data Backup and Disaster Recovery Made Simple
sponsored by SimpliVity
EGUIDE: This e-guide discusses the ways in which data backup and disaster recovery (DR) integration is occurring today and highlights several backup software products that are evolving to include DR functionality. Read on to learn how your enterprise can integrate DR into your backup systems with cloud.
Posted: 12 May 2016 | Published: 10 May 2016

SimpliVity

Case Study: Heineken Mitigates Their Myriad of Ad-hoc Data Governance Questions
sponsored by Every Angle
CASE STUDY: Discover how to improve data quality, data reliability, and quickly obtain difficult-to-access SAP data by utilizing an operational performance management add-on. Read this case study to learn from the Heineken Group, and get better insight into your supply chain process to identify cash-saving opportunities.
Posted: 12 May 2016 | Published: 12 May 2016

Every Angle

Making the Case for Cloud-to-Cloud Backup
sponsored by Datto, Inc.
WHITE PAPER: Learn the importance of backing up cloud storage with a layered approach that integrates efficient data management processes, SaaS application training, robust password policies, and automated backup. Discover how you can ensure your information is secure and readily available whenever you need it.
Posted: 12 May 2016 | Published: 11 Dec 2015

Datto, Inc.

Staying out of the next Data Breach Headline
sponsored by Intel Security
VIDEO: Learn about outbound data protection as your last line of defense against data exfiltration. Discover how you can achieve greater DLP, disk encryption and device control to from wherever your data lives.
Posted: 12 May 2016 | Premiered: 28 Apr 2016

Intel Security

Endpoint Encryption Keeps Your Data Safe
sponsored by Intel Security
WHITE PAPER: Discover customizable solutions to keep your enterprise data safe using endpoint encryption. Confidently ensure consistent and persistent data protection across all your network devices with a proven solution that allows you to secure data on office desktop PCs, Macs, mobile laptops, VDI workstations.
Posted: 12 May 2016 | Published: 01 Apr 2016

Intel Security

Making the Most of Hybrid Cloud for Future-Proofed Data Storage
sponsored by Equinix
WEBCAST: Data storage experts discuss the adoption of a hybrid cloud strategy as a means of ensuring infinite storage capacity that is secure and reliable. Learn how to determine if a hybrid cloud infrastructure is best suited to meet your data management needs.
Posted: 12 May 2016 | Premiered: Apr 18, 2016

Equinix

Analyzing the ROI of Cyber Situational Awareness
sponsored by Digital Shadows
WHITE PAPER: While there are unquantifiable returns associated with greater cyber awareness, there are also calculable cost savings and returns. Access now to learn how you can demonstrate cost savings in a tangible way to your board members.
Posted: 12 May 2016 | Published: 01 Apr 2016

Digital Shadows

IT Security Vendor Analysis by Bizety
sponsored by Distil Networks
WHITE PAPER: This white paper examines five major vendors and evaluates their security solutions. Learn how well they can coordinate their systems to successfully secure your web infrastructure and online data.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks

It's Time to Re-evaluate Your Email Encryption Solution
sponsored by ZixCorp
VIDEO: Encrypting emails should be as easy as clicking "send." This video teaches you about a community approach to securing email and sensitive data. Keep workflow flowing by automating the encryption process so you don't ever have to worry about where your email are flying.
Posted: 12 May 2016 | Premiered: 18 Dec 2013

ZixCorp

Top 10 Data Protection Time Wasters
sponsored by Commvault
RESOURCE: This brief infographic highlights the top 10 data protection time wasters and offers tips for preventing these hurdles. Access now to learn how you can implement a more efficient data protection solution in your enterprise.
Posted: 12 May 2016 | Published: 31 Dec 2015

Commvault

Barracuda Backup: An All-In-One Cloud Integrated Solution
sponsored by Barracuda Networks
VIDEO: This lighthearted video introduces an all-in-one, cloud-integrated, backup solution. Watch now to see how you can protect your physical and virtual environments with an easy, cost-efficient solution.
Posted: 11 May 2016 | Premiered: 10 Jul 2015

Barracuda Networks

Case Study: San Mateo Credit Union Reduces Backup Footprint with a Unified Data Protection Appliance
sponsored by arcserve
CASE STUDY: This brief case study showcases how San Mateo Credit Union implemented a unified data protection appliance that provided them with space and cost savings. Access now to see how you can protect all your machines under one solution and ensure an efficient data recovery process.
Posted: 11 May 2016 | Published: 31 Dec 2015

arcserve

The MSP’s Complete Guide to Cyber Security
sponsored by Intronis
WHITE PAPER: Don't put off security talks until after it's too late. This white paper gathers stats and facts about cybersecurity in regards to SMBs. Learn about common cybersecurity mistakes SMBs constantly make and tips on how to approach cloud security.
Posted: 11 May 2016 | Published: 01 Apr 2016

Intronis

Plan for Hybrid Data Protection Media
sponsored by Druva Software
WHITE PAPER: This brief white paper discusses how to implement a hybrid data protection media strategy that will enable your enterprise to achieve the agility needed to meet demands within your budgetary limits. Access now to learn how the combination of tertiary disk, cloud, and tape can result in a foolproof data protection strategy.
Posted: 11 May 2016 | Published: 31 Jan 2016

Druva Software

IBM QRadar - Sense and Detect Modern Threats with the Most Sophisticated Security Analytics Platform
sponsored by IBM
WHITE PAPER: This white paper shows you how to "sense" chains of malicious activities and rapidly deploy security tools across your entire network including cloud-based resources. Access now to greatly improve your remediation efforts and minimize potential damage to your organization.
Posted: 11 May 2016 | Published: 01 Apr 2016

IBM

Eliminate On-Premise Tape Management with Cloud-Based Data Protection
sponsored by Iron Mountain
WHITE PAPER: This brief white paper highlights a scalable, secure cloud-based data protection solution that eliminates the need for on-premise tape backup. See the benefits this software can provide to your enterprise, such as modernized backup and recovery, cost-efficient data replication, reliable network connection, and more.
Posted: 11 May 2016 | Published: 11 May 2016

Iron Mountain

Small Business IT Security: Save Money, Save Face
sponsored by CDW
ANALYST BRIEF: This article from security expert Mark Lachniet shows you strategic steps your SMB can take to ensure your limited IT budget doesn't mean increased cybersecurity risks. You'll learn four specific guidelines to help you understand your greatest vulnerabilities lie and how to cost effectively mitigate them.
Posted: 11 May 2016 | Published: 18 May 2016

CDW

Snapshot Management & Replication: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: Access this white paper for a checklist that will enable your enterprise to determine the 'must-have" features needed for snapshots to deliver what you require in your application environment or private cloud. See how you can realize the full potential of snapshots.
Posted: 11 May 2016 | Published: 31 Dec 2015

Commvault

Infographic: Principles of Data Management
sponsored by Commvault
RESOURCE: In this infographic, discover seven essential principles for providing a true, holistic data protection. Read on to access this checklist so that your enterprise can advance your data management strategy for the future.
Posted: 10 May 2016 | Published: 31 Dec 2015

Commvault

A New Approach to Data Center Security
sponsored by VMware
WHITE PAPER: Network perimeter security isn't good enough anymore. Micro-segmentation allows us to secure the data center from the inside and ensure that breaches are stopped before the can spread. Read on to learn more about a security solution that features micro-segmentation and how it will benefit your organization.
Posted: 10 May 2016 | Published: 31 Mar 2016

VMware
126 - 150 of 2686 Matches Previous Page    4 5 6 7 8 9    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement