IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
151 - 175 of 2410 Matches Previous Page  |  Next Page
Achieving Maximum Backup Granularity
sponsored by Veeam Software
WEBCAST: Discover a data backup and replication solution that ensures your enterprise can recover what you need, when you need it. Watch and learn how to easily browse business-critical applications, avoid data loss with item-level restores, use advanced search options to find what you need to restore, and more.
Posted: 15 Sep 2016 | Premiered: Sep 9, 2015

Veeam Software

Grow Your Business with NetApp and Veeam
sponsored by Veeam Software
WHITE PAPER: Discover how NetApp and Veeam backup and recovery products can provide your enterprise with an efficient disaster recovery and availability solution. By combining these products, your enterprise can benefit from accelerated enterprise application performance, easy data protection and recovery, a cloud-ready data center, and more.
Posted: 14 Sep 2016 | Published: 30 Apr 2016

Veeam Software

Best Practices for Your Disaster Recovery/Business Continuity Plan
sponsored by McKesson Corporation
WHITE PAPER: In this expert guide, discover 10 best practice tips to ensure your disaster recovery/business continuity plan meets your enterprise's data security needs. Also learn how backup and disaster recovery, historically treated as separately, are converging to provide a more cohesive data management plan.
Posted: 13 Sep 2016 | Published: 12 Sep 2016

McKesson Corporation

Computer Weekly – Dell Technologies aims for an intelligent, connected future
sponsored by ComputerWeekly.com
EBOOK: In this week's Computer Weekly, as Dell and EMC complete the largest IT supplier merger in history, we look at the new company's strategy. Our latest buyer's guide examines a key aspect of using cloud – cloud bursting. And we assess the latest views on the UK government's plans for internet surveillance legislation. Read the issue now.
Posted: 12 Sep 2016 | Published: 13 Sep 2016

ComputerWeekly.com

The Modern Cybercriminal's Attempt to Stay Undetected
sponsored by Dell SecureWorks
WHITE PAPER: This short infographic gives you an in-depth look at the timeline of the average data breach from penetration to detection. Learn the game plan of a cybercriminal looking to steal your data and prepare a defensive scheme of your own to stop hackers in any phase of the breach lifecycle.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

Dell SecureWorks

Making File Sharing Easy in a Virtual Environment
sponsored by Citrix
RESOURCE: Learn how a new file sharing program can improve collaboration inside and outside the organization, reduce storage cost, and equalize the experiences of working on a physical or virtual desktop.
Posted: 08 Sep 2016 | Published: 08 Sep 2016

Citrix

Five Ways to Protect Your Digital Assets
sponsored by Hewlett-Packard Enterprise
RESOURCE: Without the right backup and recovery strategies, power surges, theft, hard drive crashes, and corruption of mission-critical data could bring your business to a halt. Access this resource to discover a five-step path to unshakeable business continuity, and explore your backup options.
Posted: 06 Sep 2016 | Published: 06 Sep 2016

Hewlett-Packard Enterprise

Federal Agencies Have a BYOD Program, Like It or Not
sponsored by Lookout
RESEARCH CONTENT: Shadow BYOD introduces a risk of sensitive data leakage due to its lack of visibility and control of access. This report details how shadow BYOD has become a concern for the federal government. Access now to learn about shadow BYOD and how to properly manage personal devices by taking using mobile device management and security solutions.
Posted: 02 Sep 2016 | Published: 29 Jul 2016

Lookout

How to Unlock EMS: 3 Things You Need to Know to Capitalize on Enterprise Mobility Suite
sponsored by Microsoft
PRESENTATION: In the era of mobility, BYOD is a major concern. The Enterprise Mobility Suite (EMS) is a sweeping platform that works with existing cloud platforms, and covers mobile management and data protection. Access this brief resource to learn just what EMS is capable of and the value it has to offer.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

Microsoft

The Right Backup and Recovery Solution Can be a Business Enabler
sponsored by Veritas
WHITE PAPER: Your data protection strategy needs to deliver the quality and service levels required to enable your digital business. Discover a backup solution built on a converged platform that enables efficient and cost-effective data management that will truly help put your data to good use.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Veritas

Protecting Large Scale Environments with Veritas NetBackup
sponsored by Veritas
DATA SHEET: In this resource, discover a comprehensive, converged backup platform that supports both physical and virtual infrastructures. This solution can support your present and future data protection needs with benefits such as lower ongoing operating costs, greater scalability, simplified maintenance, and more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Veritas

Inside Job: A Better Strategy to Stop Insider Threats
sponsored by Infor
WHITE PAPER: Insider threats are the greatest risk to top-of-the-line cybersecurity. Your data and predictive analytics may be the best tools to protect against insider threats. This guide to insider threats walks you through a brief history of these threats, who could be considered insiders, and how to approach these issues now as well as in the future.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Infor

Manage Risk by Protecting Apps, Data and Usage
sponsored by Citrix
WHITE PAPER: When it comes to securing vulnerabilities, especially in apps, there are 5 best practices you can follow. This white paper provides and overview of how to ensure privacy, protect sensitive information and enable compliance of apps and data without compromising workforce flexibility and productivity.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Citrix

How To Get the Most Out of SOCs
sponsored by ServiceNow
EGUIDE: This e-guide teaches you how to refocus your security efforts on detection through continuous monitoring and greater network visibility. Learn how to set up your security operations center (SOC) to achieve more timely detection capabilities and learn from industry-recognized security expert Eric Cole, on how to get the most out of SOCs.
Posted: 07 Sep 2016 | Published: 31 Aug 2016

ServiceNow

A themed issue looking at the latest trends in print management
sponsored by MicroScope
EZINE: A themed issue of the ezine looking at the opportunities for the channel in the managed print world
Posted: 02 Sep 2016 | Published: 02 Sep 2016

MicroScope

2016 Cost of Data Breach Study United States
sponsored by IBM
WHITE PAPER: This Ponemon Institute Study includes data breach information over the past year from 64 organizations in 16 industry sectors located in the United States.
Posted: 01 Sep 2016 | Published: 01 Jun 2016

IBM

2016 Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This Ponemon Institute study encapsulates the results of 383 organizations from 12 countries gathering recent data breach trends and costs of remediation.
Posted: 01 Sep 2016 | Published: 01 Jun 2016

IBM

Is the Hybrid Storage Array Dying?
sponsored by Dell EMC
EGUIDE: Is hybrid storage heading toward extinction? Discover if hybrid storage with HDDs is indeed a dying breed, as well as examine the challenges confronting today's flash data storage simplification. Additionally, learn the top 9 reasons for the increased adoption of object-level storage.
Posted: 30 Aug 2016 | Published: 29 Aug 2016

Dell EMC

Utilizing SSD Flash and Object Storage: Should Both Be Used Simultaneously?
sponsored by Dell EMC
EGUIDE: Is it possible to increase object storage performance by as much as 100 times? Now may be the time to deploy SSD flash and object storage together, and in this guide, learn the performance and reliability benefits of utilizing both simultaneously. As a bonus, read on to access seven tips for improving data storage efficiency.
Posted: 30 Aug 2016 | Published: 29 Aug 2016

Dell EMC

2016 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This in-depth analysis outlines what IT and security professionals learned from 2015's cyberattacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrophic data loss.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

Trends in SAP Cybersecurity
sponsored by IBM
WHITE PAPER: The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 29 Aug 2016 | Published: 01 Feb 2016

IBM

7 Key Challenges to Value-Based Care: Ensuring Patient-Centered Care With Information Management
sponsored by Information Builders
WHITE PAPER: This white paper explores how to address some of the challenges of moving towards value-based healthcare with a strategy for improving the way patient data is collected, managed, and exchanged. Access now to find out more about an integrated approach to master data management, data quality, information management, and more.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Information Builders

Computer Weekly – 30 August 2016: Get protected
sponsored by ComputerWeekly.com
EZINE: It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
Posted: 26 Aug 2016 | Published: 30 Aug 2016

ComputerWeekly.com

How One Company Integrated Its Infrastructure with Hadoop
sponsored by Intel Corporation
WHITE PAPER: Learn about how one company that used the Kafka Messaging tool with Hadoop to extend its data integration architecture to incorporate big data in real time. Discover how the company was able to improve customer services, security, and data management, and how you can do the same.
Posted: 24 Aug 2016 | Published: 29 Apr 2016

Intel Corporation

From Data to Action: Your Guide to Analytics
sponsored by Intel Corporation
ANALYST REPORT: You've followed the big data trend and collected more data than you may need—now what? In this comprehensive guide to analytics, learn everything from using data to propel your business forward, to extracting value from almost any analytics project, to securing big data.
Posted: 24 Aug 2016 | Published: 31 Dec 2015

Intel Corporation
151 - 175 of 2410 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement