IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
151 - 175 of 2633 Matches Previous Page  |  Next Page
Next Generation Cybersecurity: The Age of Artificial Intelligence
sponsored by MASERGY
WEBCAST: Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.
Posted: 06 Jun 2016 | Premiered: May 1, 2016

MASERGY

Masergy UES Offers Unique Approach to Network Defense
sponsored by MASERGY
ANALYST REPORT: Instead of applying a one-size-fits-all approach, multi-stage machine learning analysis detects events differently on different networks. Learn how this security strategy can find predictable patterns on your network and methods that work best for it.
Posted: 06 Jun 2016 | Published: 11 Nov 2015

MASERGY

Emerging security threats you're up against now
sponsored by Intel
EGUIDE: Cybercrime is now a fully functional industry with "Hacking as a Service" being a top product. Services are cheaper and more sophisticated than ever. This e-guide shows you top emerging cyber threats that could be harming your system soon.
Posted: 06 Jun 2016 | Published: 25 May 2016

Intel

Find, Classify, Protect your data
sponsored by Verizon
WHITE PAPER: Understanding, identifying and classifying your data correctly are the first steps in information security. Learn how to evaluate your data landscape and create a plan to manage and secure it.
Posted: 06 Jun 2016 | Published: 31 Dec 2015

Verizon

Encryption as an IT Service
sponsored by Gemalto
WHITE PAPER: To build a sustainable security foundation, organizations need to employ encryption as an IT service — centrally and cohesively managing encryption across an entire enterprise. Gain significant benefits in overall security, administrative efficiency and business agility.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

Gemalto

Resiliency and Data Protection with Riverbed SteelFusion
sponsored by Riverbed Technology, Inc.
RESOURCE: Enterprise Strategy Group (ESG) graphically summarizes the hands-on lab review, Zero Branch IT with Riverbed SteelFusion. Access this at-a-glance view now, complete with live links to download the complete report and learn more details about SteelFusion.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Riverbed Technology, Inc.

Encrypt Office 365 Emails
sponsored by ZixCorp
RESOURCE: Passive identification of what emails should be encrypted can simultaneously protect your business while unburdening your system from unnecessary processes. Discover how to automatically scan outbound emails from Office 365 connectors and accurately detect sensitive information and evolve with changing best practices.
Posted: 03 Jun 2016 | Published: 01 May 2016

ZixCorp

Your Old Storage is Standing in the Way of Growth
sponsored by HPE and Intel®
RESOURCE: Improving the scalability, speed, resilience, and affordability of your storage infrastructure can grow your business and strengthen customer loyalty. Discover storage solutions that can boost your performance, eliminate unnecessary storage hardware, and cut your data protection storage requirements.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

HPE and Intel®

X-Force Cyber Security Intelligence Index  Report
sponsored by IBM
WHITE PAPER: It's clear no industry was immune to cyberattackers in 2015. Discover statistics from last year's cyber threat landscape and see which industries were most affected by cybercrime. Learn how to create an effective cybersecurity strategy to ensure your organizations doesn't show up on next year's report.
Posted: 03 Jun 2016 | Published: 01 May 2016

IBM

Mobilephobia: Curing the CISO’s Most Common Mobile Security Fears
sponsored by IBM MaaS360
WHITE PAPER: This white paper shows you a comprehensive portfolio of mobile security solutions that address four key mobile security challenges. Learn intelligent, integrated and innovative approaches that can help your organization stay ahead of emerging threats while managing operational risks and lowering cost of a strong security posture.
Posted: 03 Jun 2016 | Published: 01 May 2016

IBM MaaS360

The State of Mobile Security Maturity
sponsored by IBM MaaS360
WHITE PAPER: This study takes the mobile security pulse of large enterprises worldwide. It'll help you assess where you are on this emerging mobile security maturity scale and giving you an indication of where you should make your mobile security investments moving forward.
Posted: 03 Jun 2016 | Published: 31 Dec 2014

IBM MaaS360

Securing mobile productivity for Microsoft Office 365
sponsored by IBM MaaS360
WHITE PAPER: Take the complexity out of securing your mobile workforce. Learn how to secure your Microsoft ecosystem across all mobile platforms, including Windows 10. Enable IT to efficiently manage enterprise productivity, connectivity and security today and into the future.
Posted: 03 Jun 2016 | Published: 01 Mar 2016

IBM MaaS360

Mobile Data Security
sponsored by IBM MaaS360
WHITE PAPER: Prudence dictates that you look for ways to supplement your mobile device management (MDM) solution with additional, more robust security controls. This white paper helps you identify the goals for your MDM strategy and select the best approach to reach those goals.
Posted: 03 Jun 2016 | Published: 01 Mar 2016

IBM MaaS360

Modernize and Simplify with Flash Storage
sponsored by EMC
RESOURCE: Discover affordable all-flash and hybrid storage solutions that can support all of your workloads with rich data services and data protection. See how your enterprise can boost your storage performance with this flexible, cost-efficient solution.
Posted: 03 Jun 2016 | Published: 30 Apr 2016

EMC

The Definitive Guide to Data Loss Prevention
sponsored by Digital Guardian
EBOOK: This comprehensive guide provides what you need to understand, evaluate, and succeed with today's DLP. It includes insights from DLP Experts, Forrester Research, Gartner, and Digital Guardian's security analysts
Posted: 02 Jun 2016 | Published: 25 May 2016

Digital Guardian

Top 10 Database Security Threats
sponsored by Dimension Data
WHITE PAPER: Read this paper to understand the top 10 database threats and how you can protect your most valuable assets.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Dimension Data

HBR paper: The Danger from Within
sponsored by Dimension Data
WHITE PAPER: The biggest threat to enterprise security is the people organizations hire and fire. Read this article from the Harvard Business Review, "Danger from Within" to learn why the number of insider cyberattacks is growing and what are 5 ways to tackle the problem.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Dimension Data

EMC VNX and VNXe Family with Veeam Availability Suite
sponsored by Veeam Software
WHITE PAPER: Learn how Veeam Availability Suite v9 is designed to provide enhanced availability with storage snapshots for backup, replication, and recovery tasks. This white paper covers the issues you can expect to solve by integrating this technology, and how to connect it to a storage array.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Veeam Software

Setting new standards in cardholder data protection
sponsored by Verizon
WHITE PAPER: Learn how CartaSi implemented powerful new vulnerability scanning and penetration testing capabilities into its security process, adding new layers of defense to its customer web portals. Get Broader enhancements to data protection with the ability to monitor security-related trends across multiple portals.
Posted: 02 Jun 2016 | Published: 31 Dec 2015

Verizon

Recognize and Respond to Cyber Attacks
sponsored by Verizon
WHITE PAPER: The inability to recognize and react the lead indicators of a cyber attack can be an organization's greatest weakness. Learn how to prepare your organization to recognize and mitigate threats. Accelerate your detection capabilities so breaches can't linger.
Posted: 02 Jun 2016 | Published: 31 Dec 2015

Verizon

Extending Backup to the Cloud
sponsored by Veeam Software
WHITE PAPER: Simplify your move to the cloud with fast backup, granular recovery, and automatic transfer of backup data. Access now to see how you can achieve new levels of availability and storage efficiencies for your mission-critical virtual environments with this data backup and replication solution.
Posted: 02 Jun 2016 | Published: 21 Jan 2016

Veeam Software

Backup & Replication for Linux OS
sponsored by Veeam Software
ESSENTIAL GUIDE: Discover a guide on how to successfully integrate and configure a backup and replication solution with Linux operating systems and virtual machines. Learn how you can ensure your enterprise performs transaction-consistent backups and full VM file restorations.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Veeam Software

Complete Your Converged IT Strategy
sponsored by Veeam Software
DATA SHEET: In this data sheet, you will discover how to complete your IT convergence strategy with appropriate backup software. Read on to learn how the right backup deployment can unlock comprehensive, fast, and resilient data protection for your converged environment and fully support an always-on business model.
Posted: 02 Jun 2016 | Published: 31 Dec 2015

Veeam Software

Configuration Guide for Veeam Backup & Replication
sponsored by Veeam Software
ESSENTIAL GUIDE: Successfully protect your virtual and physical storage and network infrastructure with this step-by-step configuration guide for installing a data backup and replication solution.
Posted: 01 Jun 2016 | Published: 01 Jun 2016

Veeam Software

Data Center Applications Standards Reference Guide: Networking and Storage
sponsored by CommScope
WHITE PAPER: In this technical white paper, discover a detailed overview of the most prevalent networking and storage applications in today's modern data centers. Additionally, read on to get instruction on computer clustering, SAN and server cabling, data security, and more.
Posted: 01 Jun 2016 | Published: 21 Apr 2016

CommScope
151 - 175 of 2633 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement