IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
151 - 175 of 2682 Matches Previous Page  |  Next Page
Making the Case for Cloud-to-Cloud Backup
sponsored by Datto, Inc.
WHITE PAPER: Learn the importance of backing up cloud storage with a layered approach that integrates efficient data management processes, SaaS application training, robust password policies, and automated backup. Discover how you can ensure your information is secure and readily available whenever you need it.
Posted: 12 May 2016 | Published: 11 Dec 2015

Datto, Inc.

Staying out of the next Data Breach Headline
sponsored by Intel Security
VIDEO: Learn about outbound data protection as your last line of defense against data exfiltration. Discover how you can achieve greater DLP, disk encryption and device control to from wherever your data lives.
Posted: 12 May 2016 | Premiered: 28 Apr 2016

Intel Security

Endpoint Encryption Keeps Your Data Safe
sponsored by Intel Security
WHITE PAPER: Discover customizable solutions to keep your enterprise data safe using endpoint encryption. Confidently ensure consistent and persistent data protection across all your network devices with a proven solution that allows you to secure data on office desktop PCs, Macs, mobile laptops, VDI workstations.
Posted: 12 May 2016 | Published: 01 Apr 2016

Intel Security

Making the Most of Hybrid Cloud for Future-Proofed Data Storage
sponsored by Equinix
WEBCAST: Data storage experts discuss the adoption of a hybrid cloud strategy as a means of ensuring infinite storage capacity that is secure and reliable. Learn how to determine if a hybrid cloud infrastructure is best suited to meet your data management needs.
Posted: 12 May 2016 | Premiered: Apr 18, 2016

Equinix

Analyzing the ROI of Cyber Situational Awareness
sponsored by Digital Shadows
WHITE PAPER: While there are unquantifiable returns associated with greater cyber awareness, there are also calculable cost savings and returns. Access now to learn how you can demonstrate cost savings in a tangible way to your board members.
Posted: 12 May 2016 | Published: 01 Apr 2016

Digital Shadows

IT Security Vendor Analysis by Bizety
sponsored by Distil Networks
WHITE PAPER: This white paper examines five major vendors and evaluates their security solutions. Learn how well they can coordinate their systems to successfully secure your web infrastructure and online data.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks

It's Time to Re-evaluate Your Email Encryption Solution
sponsored by ZixCorp
VIDEO: Encrypting emails should be as easy as clicking "send." This video teaches you about a community approach to securing email and sensitive data. Keep workflow flowing by automating the encryption process so you don't ever have to worry about where your email are flying.
Posted: 12 May 2016 | Premiered: 18 Dec 2013

ZixCorp

Top 10 Data Protection Time Wasters
sponsored by Commvault
RESOURCE: This brief infographic highlights the top 10 data protection time wasters and offers tips for preventing these hurdles. Access now to learn how you can implement a more efficient data protection solution in your enterprise.
Posted: 12 May 2016 | Published: 31 Dec 2015

Commvault

Case Study: San Mateo Credit Union Reduces Backup Footprint with a Unified Data Protection Appliance
sponsored by arcserve
CASE STUDY: This brief case study showcases how San Mateo Credit Union implemented a unified data protection appliance that provided them with space and cost savings. Access now to see how you can protect all your machines under one solution and ensure an efficient data recovery process.
Posted: 11 May 2016 | Published: 31 Dec 2015

arcserve

The MSP’s Complete Guide to Cyber Security
sponsored by Intronis
WHITE PAPER: Don't put off security talks until after it's too late. This white paper gathers stats and facts about cybersecurity in regards to SMBs. Learn about common cybersecurity mistakes SMBs constantly make and tips on how to approach cloud security.
Posted: 11 May 2016 | Published: 01 Apr 2016

Intronis

Plan for Hybrid Data Protection Media
sponsored by Druva Software
WHITE PAPER: This brief white paper discusses how to implement a hybrid data protection media strategy that will enable your enterprise to achieve the agility needed to meet demands within your budgetary limits. Access now to learn how the combination of tertiary disk, cloud, and tape can result in a foolproof data protection strategy.
Posted: 11 May 2016 | Published: 31 Jan 2016

Druva Software

IBM QRadar - Sense and Detect Modern Threats with the Most Sophisticated Security Analytics Platform
sponsored by IBM
WHITE PAPER: This white paper shows you how to "sense" chains of malicious activities and rapidly deploy security tools across your entire network including cloud-based resources. Access now to greatly improve your remediation efforts and minimize potential damage to your organization.
Posted: 11 May 2016 | Published: 01 Apr 2016

IBM

Eliminate On-Premise Tape Management with Cloud-Based Data Protection
sponsored by Iron Mountain
WHITE PAPER: This brief white paper highlights a scalable, secure cloud-based data protection solution that eliminates the need for on-premise tape backup. See the benefits this software can provide to your enterprise, such as modernized backup and recovery, cost-efficient data replication, reliable network connection, and more.
Posted: 11 May 2016 | Published: 11 May 2016

Iron Mountain

Small Business IT Security: Save Money, Save Face
sponsored by CDW
ANALYST BRIEF: This article from security expert Mark Lachniet shows you strategic steps your SMB can take to ensure your limited IT budget doesn't mean increased cybersecurity risks. You'll learn four specific guidelines to help you understand your greatest vulnerabilities lie and how to cost effectively mitigate them.
Posted: 11 May 2016 | Published: 18 May 2016

CDW

Snapshot Management & Replication: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: Access this white paper for a checklist that will enable your enterprise to determine the 'must-have" features needed for snapshots to deliver what you require in your application environment or private cloud. See how you can realize the full potential of snapshots.
Posted: 11 May 2016 | Published: 31 Dec 2015

Commvault

Infographic: Principles of Data Management
sponsored by Commvault
RESOURCE: In this infographic, discover seven essential principles for providing a true, holistic data protection. Read on to access this checklist so that your enterprise can advance your data management strategy for the future.
Posted: 10 May 2016 | Published: 31 Dec 2015

Commvault

A New Approach to Data Center Security
sponsored by VMware
WHITE PAPER: Network perimeter security isn't good enough anymore. Micro-segmentation allows us to secure the data center from the inside and ensure that breaches are stopped before the can spread. Read on to learn more about a security solution that features micro-segmentation and how it will benefit your organization.
Posted: 10 May 2016 | Published: 31 Mar 2016

VMware

Making the Case for a Hybrid Backup Strategy
sponsored by Iron Mountain
WHITE PAPER: This white paper highlights a cost-effective hybrid backup and recovery solution that combines cloud network-based replication with tape-based archiving. Read on to see how you can ensure high levels of security and compliance without a hybrid data protection solution that won't raise your overall data costs.
Posted: 10 May 2016 | Published: 10 May 2016

Iron Mountain

Leveraging the Public Cloud for Enterprise Data Protection
sponsored by Druva Software
WHITE PAPER: This white paper discusses leveraging the public cloud for data backup, archiving, and disaster recovery (DR). Access now to see how cloud can enable your enterprise to not only improve the efficiency, reliability, and security of your enterprise, but also boost your total cost of ownership and save on your data protection strategy.
Posted: 10 May 2016 | Published: 10 May 2016

Druva Software

A Secure, IT-approved Alternative to Personal File Sharing Services in the Enterprise
sponsored by Citrix
WHITE PAPER: Personal file sharing invites data leakage and compliance violations by allowing files being shared to escape beyond IT's control. Simply blocking network access of personal file sharing services is no longer a viable option. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Posted: 10 May 2016 | Published: 31 Dec 2015

Citrix

The Demand for Hybrid Online File Sharing Solutions
sponsored by Citrix
RESEARCH CONTENT: Learn about the overwhelming need for online file sharing and collaboration (OFS) solutions, approaches being taken to providing alternative solutions, and what is prompting so many enterprises to search for the solution that best suits their needs.
Posted: 10 May 2016 | Published: 31 Dec 2014

Citrix

Transforming the Data Center: SimpliVity delivers hyperconverged platform with native data protection
sponsored by SimpliVity
ANALYST REPORT: This report shows you from real world experiences how hyperconvergence not only compresses and stores data, but also thoroughly protects it. Learn how you can eliminate your traditional data protection tools and replace them with an all-in-one storage option.
Posted: 10 May 2016 | Published: 01 Jan 2016

SimpliVity

The Ultimate Guide to Selling Cloud Backup
sponsored by Intronis
WHITE PAPER: This e-book outlines steps for guidance and best practices for providing cloud backup as a service. Access now to learn how to lay the foundation for a cloud backup service, how to overcome common security and cost challenges, and how to develop a top sales team that will sell your cloud backup effectively.
Posted: 10 May 2016 | Published: 31 Dec 2013

Intronis

Seven Reasons Why Micro-Segmentation is Powerful to Have and Painless to Add
sponsored by VMware
WHITE PAPER: Data center attacks are on the rise. Physical security and firewalls aren't enough. Micro-segmentation is one of the breakthrough security benefits of network virtualization. Access this white paper to learn about 7 key factors that make micro-segmentation a powerful and painless tool to incorporate.
Posted: 10 May 2016 | Published: 31 Mar 2016

VMware

Server Backup: A Premier, Automated Cloud Backup Solution
sponsored by Iron Mountain
WHITE PAPER: This white paper highlights a cloud backup solution that automates the backup process with features such as continuous data protection, flexible retention settings, security that goes beyond data encryption, and an optional local appliance for faster restorations. Access now to learn how your enterprise can enhance your backup.
Posted: 10 May 2016 | Published: 31 Dec 2014

Iron Mountain
151 - 175 of 2682 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement