IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
126 - 150 of 2764 Matches Previous Page  |  Next Page
Data Center Applications Standards Reference Guide: Networking and Storage
sponsored by CommScope
WHITE PAPER: In this technical white paper, discover a detailed overview of the most prevalent networking and storage applications in today's modern data centers. Additionally, read on to get instruction on computer clustering, SAN and server cabling, data security, and more.
Posted: 01 Jun 2016 | Published: 21 Apr 2016

CommScope

Recover Data More Quickly, whether Locally, Remotely, or in the Cloud
sponsored by Dell, Inc.
WHITE PAPER: This white paper highlights a data protection and recovery solution provider faster, more efficient backup. Access now to discover the benefits your enterprise can achieve with this solution, including multiple physical and virtual restore options, hardware appliances, and more.
Posted: 31 May 2016 | Published: 31 Oct 2015

Dell, Inc.

Keep Office 365 compliance in check with these tools
sponsored by Symantec Corporation
EGUIDE: When it comes to Microsoft Office 365, cybersecurity is a top concern. That's why it's a priority for the software giant. Learn what's available to keep corporate data safe and compliant.
Posted: 31 May 2016 | Published: 01 Apr 2016

Symantec Corporation

Critical Capabilities for Enterprise Data Loss Prevention
sponsored by Digital Guardian
WHITE PAPER: IT security leaders deploy enterprise data loss prevention (DLP) for three major use cases: regulatory compliance, intellectual property protection and increased visibility into how users treat sensitive data. This research evaluates DLP products for these three use cases, based on nine critical capabilities. Read on to learn more.
Posted: 31 May 2016 | Published: 31 May 2016

Digital Guardian

Veeam withCisco UCS C240Configuration Guide
sponsored by Veeam Software
ESSENTIAL GUIDE: Discover a backup and replication solution that can increase the value of your backup and reinvent data protection in your virtual environments. This technology can enable your enterprise to benefit from features such as source-side deduplication and compression, parallel processing, and 24/7 application availability.
Posted: 31 May 2016 | Published: 31 May 2016

Veeam Software

Integrating Host Systems With Modern Security Frameworks
sponsored by Novell Ltd.
WHITE PAPER: This white paper reveals a practical way to bring your host systems into the modern security fold. Close the technology gap without jeopardizing business operations.
Posted: 31 May 2016 | Published: 01 Apr 2016

Novell Ltd.

Total Protection for Data Loss Prevention - Solution Brief
sponsored by Intel Security
WHITE PAPER: Learn about a data-centric system that delivers data security and actionable insight about data at rest, data in motion and data in use across your entire organization. Easily identify potential threats and refine policies as needed to quickly respond to the shifting threat landscape.
Posted: 31 May 2016 | Published: 01 Apr 2016

Intel Security

Top Reasons Why Customers Deploy Flash Storage
sponsored by EMC
WHITE PAPER: Discover a modern, all-flash storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver improved flash economics. See the benefits your enterprise can take advantage of with this technology.
Posted: 31 May 2016 | Published: 30 Apr 2016

EMC

Complete Data Protection - Data Sheet
sponsored by Intel Security
WHITE PAPER: With proper encryption, you can easily stop data loss and take control of all your data that lives on employee endpoints. Learn how to communicate with all your endpoints and control them from a hardware level, whether they are powered on or powered off.
Posted: 31 May 2016 | Published: 13 Apr 2016

Intel Security

Transform Your Business Processes with Integrated Copy Data Management
sponsored by emc first distribution
RESOURCE: Consolidate both primary data and its associated copies on the same scale-out all-flash array for unprecedented agility and efficiency with integrated copy data management (iCDM), a new approach to consolidation without compromise. Read on to overcome storage sprawl, SLA issues, and limitations on copy frequency with CDM workload automation.
Posted: 27 May 2016 | Published: 27 May 2016

emc first distribution

The Road to SDN is Paved with Visibility and Many Good Intentions
sponsored by Gigamon
WHITE PAPER: Understanding traffic pathways and baselines before during and after the SDN migration means knowing how well the transition is delivering on CAPEX and OPEX promises as well as potential for higher security. Eliminate security blind spots with this Security Deliver Platform.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

Addressing the Threat Within: Rethinking Network Security Deployment
sponsored by Gigamon
WHITE PAPER: A structured and architectural approach to pervasive network visibility gives security solutions access while enabling them to scale cost effectively. Discover how the Security Delivery Platform is becoming a building block to deploying security solutions.
Posted: 27 May 2016 | Published: 01 Apr 2016

Gigamon

Application Session Filtering
sponsored by Gigamon
WHITE PAPER: Bringing intelligent application-aware traffic visibility and filtering relevant applications to these security tools will help them work at their most optimum while uncovering malicious communication patterns.
Posted: 27 May 2016 | Published: 31 Dec 2015

Gigamon

Discover Today's Unstoppable Data Reduction
sponsored by emc first distribution
WHITE PAPER: Examine a highly integrated, always-on in-line data optimization architecture that multiplies your overall investment in flash across all business apps. Extend the endurance of flash media with comprehensive data reduction for all-flash arrays, and extract the most value from your investment.
Posted: 27 May 2016 | Published: 27 May 2016

emc first distribution

Facing Network Breach Threats, Visibility Is Key
sponsored by Intel
EGUIDE: If the past three years have taught network managers anything, it's that everyone is vulnerable to a network breach by cybercriminals. Andy McInerney, data network and voice manager at Penn Mutual, one of the oldest mutual life insurance companies in the US, reveals what his business is doing to stop it.
Posted: 26 May 2016 | Published: 17 May 2016

Intel

IDC Server Security: Virtualization and Cloud Changes Everything
sponsored by TrendMicro
WHITE PAPER: Server security prevents the injection of malware into servers and protects the servers from attacks. Learn the many functions server security offers you and how to control them all from a single pan of glass.
Posted: 26 May 2016 | Published: 01 Apr 2016

TrendMicro

Complete Data Protection (Advanced) - Data Sheet
sponsored by Intel Security
WHITE PAPER: Discover how to stop data loss initiated by sophisticated malware that hijacks sensitive information. Implement and enforce organization-wide security policies that control how data is encrypted, monitored and protected from a central console.
Posted: 26 May 2016 | Published: 01 Apr 2016

Intel Security

Data Loss Prevention Best Practices for Health Care
sponsored by Intel Security
WHITE PAPER: Employing sound data loss prevention practices helps ensure the safe handling of data and provides the flexible environment required by clinical staff. Learn how to properly classify data and utilize monitoring technology to continuously track data location and movement across your network.
Posted: 26 May 2016 | Published: 01 Apr 2016

Intel Security

Why Converged Backup Platforms is Your Key to Scalability
sponsored by Veritas
DATA SHEET: Discover how one converged backup platform compares to its competitors, matching up VADP performance results, storage-array snapshots-based backup, and concurrent application restores. Read on to see how this solution can lower your total backup costs, improve your overall backup performance, and create better system utilization.
Posted: 26 May 2016 | Published: 31 Dec 2015

Veritas

Put Time On Your Side: The Heavy Cost Of Putting Off Your Cybersecurity Decisions Enterprise
sponsored by Kaspersky Lab
WHITE PAPER: A lot can happen in a business day. Deals close. Products launch. News items hit the airwaves. In fact, at Kaspersky Lab, we detect 310,000 new pieces of malware every day, which means that every day you put off the decision to upgrade your IT security system is a day that thousands of pieces of new malware can slip through.
Posted: 25 May 2016 | Published: 01 Apr 2016

Kaspersky Lab

Modern Storage Strategies for SQL Server
sponsored by Tegile
ESSENTIAL GUIDE: Businesses expect the IT department to keep data online and accessible indefinitely—so how should you manage storage for SQL Server? Discover in this guide how to avoid the common pitfalls of deploying and maintaining SQL Server, and learn the best practices behind leveraging flash storage for it.
Posted: 25 May 2016 | Published: 31 May 2016

Tegile

LIFTING THE VEIL OF SECRECY ON CYBERCRIMINALS.
sponsored by Kaspersky Lab
WHITE PAPER: In this eBook, we'll look closely at cybercrime trends to answer your most pressing questions about cybercriminals. Most important, we will answer what you can do to protect your business from this growing threat.
Posted: 25 May 2016 | Published: 31 Dec 2015

Kaspersky Lab

Cloud Security Requires Shared Responsibility Model
sponsored by CloudPassage
EGUIDE: When enterprises move data to the cloud, they can't brush their hands of security responsibility entirely. Learn how securing data in the cloud requires organizations to use a shared responsibility model, one where both the cloud provider and the organization are accountable for certain aspects of security.
Posted: 25 May 2016 | Published: 17 May 2016

CloudPassage

Management of Native Encryption for Apple FileVault and Microsoft BitLocker
sponsored by Intel Security
WHITE PAPER: With the adoption of native encryption and other encryption layers across your organization, centralized management ensures that you have consistent policy and compliance enforcement across your encryption technology stack. This resource can help ensure you don't end up on the data breach victim's list.
Posted: 25 May 2016 | Published: 01 Apr 2016

Intel Security

Data Protection Considerations for Converged Infrastructure
sponsored by Veritas
ANALYST REPORT: Arguably, nothing in the last decade has been more transformative to how IT is delivered than server virtualization. Discover in this analyst report the top 10 challenges in protecting virtual environments, and learn a modern approach to protecting and recovering your converged infrastructure and hyperconverged environments.
Posted: 25 May 2016 | Published: 29 Feb 2016

Veritas
126 - 150 of 2764 Matches Previous Page    4 5 6 7 8 9    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement