IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
151 - 175 of 2634 Matches Previous Page  |  Next Page
Miami Children's Hospital Tackles Explosive Data Growth with Scale-out Storage
sponsored by Dell EMC
VIDEO: David Bratt, Director of Technology Services at Miami Children's Hospital, explains how IT is transforming patient care delivery. Tune in to learn how scale-out storage will manage the explosion of healthcare data, as well as how the utilization of data lakes will foster dynamic business growth.
Posted: 05 Oct 2016 | Premiered: 31 Mar 2015

Dell EMC

Building a Data Lifecycle Management Strategy in the Era of Digital Transformation
sponsored by Iron Mountain
WHITE PAPER: Discover how to formulate and execute a data lifecycle management plan that accelerates digital transformation and enable you to meet and e-discovery requirements, improve availability, and secure data stored and archived in the cloud. Download now to fill in the gaps of your data storage strategy.
Posted: 04 Oct 2016 | Published: 04 Oct 2016

Iron Mountain

Solutions for Healthcare Providers Overview
sponsored by VASCO Data Security International
WHITE PAPER: Discover how two-factor authentication for web-based and mobile healthcare applications will help you protect sensitive data and improve compliance posture. Start your road to an interoperable healthcare system quickly with minimal resources.
Posted: 03 Oct 2016 | Published: 31 Dec 2015

VASCO Data Security International

Partners Healthcare Redefines Health IT with Data Lake Utilization
sponsored by Dell EMC
VIDEO: Tune into this video as Brent Richter, Associate Director of IS Operations at Partners Healthcare, illustrates a strategic solution to health IT's most important big data challenge (easy and secure access to EHRs and EMRs): data lake utilization.
Posted: 03 Oct 2016 | Premiered: 18 Sep 2015

Dell EMC

Frequently Asked Questions About Data Lifecycle Management
sponsored by Iron Mountain
WHITE PAPER: Digital data is growing dramatically in volume and importance. This means you need a sound data lifecycle management strategy. This white paper provides expert answers to the most frequently asked questions about data lifecycle management to help you construct a rock-solid strategy.
Posted: 03 Oct 2016 | Published: 31 Aug 2016

Iron Mountain

E-discovery Software Brings Serious ROI to Information Governance
sponsored by Globanet Veritas
EGUIDE: Access this guide to examine the importance of leveraging tools like autoclassification and predictive coding for effective information governance. Additionally, you will discover approaches that improve ROI beyond just e-discovery.
Posted: 30 Sep 2016 | Published: 28 Sep 2016

Globanet Veritas

Data Governance: Expert Q&A and Picking The Right DG Tool
sponsored by Globanet Veritas
EGUIDE: This e-guide features a Q&A with the VP of product development for IBM Analytics about the changing world of data governance (DG), how the DG plan will play out in the cloud and the role of big data analytics in helping companies achieve stronger insights and leverage security. And learn how to buy a DG tool.
Posted: 30 Sep 2016 | Published: 28 Sep 2016

Globanet Veritas

Buyer's Guide to Enterprise Collaboration Solutions
sponsored by IntraLinks, Inc
WHITE PAPER: Content collaboration platforms provide security and ease of use so mission-critical processes aren't interrupted. Learn what to look for in these platforms and how to decide which one is right for your organization.
Posted: 30 Sep 2016 | Published: 30 Sep 2016

IntraLinks, Inc

IT Project: Storage Architecture ANZ
sponsored by ComputerWeekly.com
EGUIDE: When it comes to storage, there are usually two main factors to consider – cost and performance. However, every organisation has its own unique set of requirements and this will inevitably shape their storage strategy. Inside this guide, we look at some examples of the strategies organisations are adopting to effectively store and manage data.
Posted: 29 Sep 2016 | Published: 28 Sep 2016

ComputerWeekly.com

Veritas Enterprise Vault Health Check Tool: Monitor, Analyze and Report on Areas of Critical Importance
sponsored by Globanet Veritas
DATA SHEET: This data sheet highlights an enterprise vault health check tool that provides automated Veritas Enterprise Vault archive analysis and reporting to help with the performance and integrity of your key data archives.
Posted: 29 Sep 2016 | Published: 31 Dec 2015

Globanet Veritas

Compliant Digital Identity Protection for Healthcare
sponsored by VASCO Data Security International
WHITE PAPER: Discover how you can protect identities, safeguard patient records, and enable compliance with regulations - all without disrupting fast access to healthcare applications and patient information. Learn how to make threats less threatening and ensure smooth patient care throughout your organization.
Posted: 29 Sep 2016 | Published: 31 Dec 2015

VASCO Data Security International

Data Archiving Solutions - Archive Data with Industry Leading Systems
sponsored by Globanet Veritas
RESOURCE CENTER: All types of companies rely on their data and need archiving solutions to protect it. This resource center highlights a service provider that deploys industry-leading archive systems and solutions for organizations worldwide. Learn about this provider's professional on-site and remote support that can meet your organization's every need.
Posted: 28 Sep 2016 | Published: 14 Jun 2016

Globanet Veritas

What to Look for in Web Fraud Detection Systems
sponsored by SearchSecurity.com
EBOOK: In this TechTarget Buyer's Guide readers will learn the key features of a Web fraud detection product and how to choose the best product for their company.
Posted: 28 Sep 2016 | Published: 23 Mar 2016

SearchSecurity.com

5 Steps to Keeping Your Data Safe with a Content Mobility Solution
sponsored by Hitachi Data Systems
DATA SHEET: Explore a 5 step roadmap to help you choose the right content mobility platform for your organization and learn how you can eliminate information silos that handle different regulations, applications, and data types.
Posted: 28 Sep 2016 | Published: 31 Dec 2015

Hitachi Data Systems

The Rising Face of Cyber Crime Ransomware
sponsored by BitSight
WHITE PAPER: Learn how ransomware is evolving - and which industries are the most susceptible to attacks. Download the latest BitSight Insight report to find out how ransomware affects each industry, and what organizations can do to prevent it.
Posted: 28 Sep 2016 | Published: 31 Aug 2016

BitSight

IT Project: Storage Architecture ASEAN
sponsored by ComputerWeekly.com
EGUIDE: When it comes to storage, is cost the critical factor for CIOs in ASEAN? This guide explores the factors that are influencing the adoption of storage technologies in ASEAN and the trends that you can expect to see more of in the next 2-3 years.
Posted: 27 Sep 2016 | Published: 28 Sep 2016

ComputerWeekly.com

Comparative Overview of File Sync and Share Platforms
sponsored by Hitachi Data Systems
WHITE PAPER: Discover a fully-integrated, on-premises platform for safe, secure file sharing and synchronization to allow employees to safely create and share content from mobile devices without compromising data security. Also, gain access to a comparative guide which looks at key categories of file sync and share tools.
Posted: 27 Sep 2016 | Published: 30 Jan 2015

Hitachi Data Systems

Disaster Recovery’s Treacherous Terrain
sponsored by IBM
RESOURCE: Can your business continuity team navigate today's challenging environment? Access this infographic to take a look at today's DR landscape, and discover how other pros are using analytics to predict service disruptions, all under the pressure of meeting rapidly rising business leaders' expectations of DR capabilities.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

IBM

File Sync and Share: There’s Too Much at Stake to Compromise
sponsored by Hitachi Data Systems
WHITE PAPER: Learn about an enterprise file sync-and-share strategy that gives employees immediate access to files without bandwidth constraints or concerns over file size while giving IT a security control system over every file.
Posted: 27 Sep 2016 | Published: 30 Jan 2015

Hitachi Data Systems

Masters of Disaster Recovery: How Highly Resilient Organizations Excel
sponsored by IBM
WHITE PAPER: Why are some companies better at mastering disaster recovery in the face of today's "always-on" expectations? Download this report to discover just that, as evidenced by a survey of 310 BCDR professionals. In addition, learn how to formulate a battle-tested recovery plan based on the expert insights illustrated.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

IBM

Securing & Enabling the Mac-empowered Enterprise
sponsored by Code42
WHITE PAPER: This white paper explains how you can create a comprehensive security program for your business. Learn how to implement self-service restoration, total data visibility for your IT department, techniques for securely integrating Macs into your traditionally PC environment, and more.
Posted: 27 Sep 2016 | Published: 27 Sep 2016

Code42

Reeling in Ransomware Data Protection for You and Your Users
sponsored by Code42
WHITE PAPER: In this white paper, learn how you can protect your devices and negate the effects of ransomware. Explore how continuous endpoint backup enables IT to quickly and easily restore files to minutes before the infection, as well as ensures that those files are healthy with no end-user intervention required.
Posted: 26 Sep 2016 | Published: 26 Sep 2016

Code42

2016 Cost of Data Breach Study: Impact of Business Continuity Management
sponsored by IBM
WHITE PAPER: The Ponemon Institute surveyed 383 companies in 16 industry sectors about their experience with data breaches. Learn how the majority of these companies are solving breaches efficiently and cost-effectively with business continuity management (BCM.)
Posted: 26 Sep 2016 | Published: 30 Jun 2016

IBM

Recovering From Ransomware Starts with a Data Protection Strategy
sponsored by Dell Software
EGUIDE: Stopping ransomware is almost impossible, but recovering from it doesn't have to be. Discover how to devise a solid ransomware recovery plan to successfully return your organization to normal conditions after an outbreak. Using your existing data protection tools and regular back-ups, you can ensure business continuity after disaster strikes.
Posted: 27 Sep 2016 | Published: 22 Sep 2016

Dell Software

Get the Most Out of Your SIEM System
sponsored by Trustwave
EGUIDE: SIEM platforms remove a huge burden from your security team and allow them to focus on other analysis-related tasks. However, SIEM systems are not infallible. Discover how to better employ your SIEM system to produce the most accurate event analysis you can hope for.
Posted: 27 Sep 2016 | Published: 23 Sep 2016

Trustwave
151 - 175 of 2634 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement