IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
151 - 175 of 2444 Matches Previous Page  |  Next Page
Top 3 Considerations When Looking at Cloud-Based Backup
sponsored by arcserve
WEBCAST: Due to its affordability, cloud-based disaster recovery is enabling small and medium-sized businesses to upgrade their data protection to rival that of enterprise-level organizations. What does this trend mean for other affordable mediums? Watch this on-demand webcast to find out!
Posted: 17 Mar 2016 | Premiered: Oct 31, 2015

arcserve

Avoiding Pitfalls on the Path to Endpoint Security
sponsored by Dell, Inc.
EBOOK: Before you try to implement a comprehensive security policy, take a look at this exclusive handbook where you'll learn how to get ahead of threats to enterprise desktop security.
Posted: 17 Mar 2016 | Published: 19 Jun 2014

Dell, Inc.

How to Exercise Faster Operational Analytics Using In-Memory Computing
sponsored by Redislabs
WHITE PAPER: In this white paper, discover how you can accelerate real-time analysis of operational data using in-memory computing. In addition, learn how you can optimize time series data and accelerate the speed of your queries.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

Redislabs

Securing Data in the Cloud and on the Ground
sponsored by IBM
WHITE PAPER: In this resource, you will discover how to govern and secure your cloud-based data to realize the financial benefits of the cloud while ensuring information culled from cloud sources is secure and trustworthy. Read on to learn the 4 pillars of good hybrid information governance.
Posted: 16 Mar 2016 | Published: 30 Apr 2015

IBM

Mitigating and Protecting SAP and ERP Vulnerabilities
sponsored by Onapsis
EGUIDE: This e-guide discusses the more than 95% of SAP systems that are exposed to vulnerabilities and could lead to a detrimental compromise of enterprise data and processes. Access this resource now and learn how to train your staff about security risks to adopt an end-to-end security approach.
Posted: 16 Mar 2016 | Published: 14 Mar 2016

Onapsis

How to Choose an IT Platform to Empower Your Internet of Things
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This resource describes how to adapt your organization's human resources, processes, and architectures to derive maximum value from the Internet of Things (IoT). Discover the criteria you need to consider when establishing an IoT platform, including connectivity between devices and data, security and governance, big data analytics, and 2 more.
Posted: 16 Mar 2016 | Published: 31 Dec 2015

Hewlett-Packard Enterprise

Cost Savings and Business Benefits Enabled by InfoSphere Information Server
sponsored by IBM
ANALYST REPORT: In this Forrester report, examine the potential ROI your enterprise can realize by deploying InfoSphere Information Server as part of your overall information architecture integration strategy. Learn how it can improve access to trusted information to create deeper insights and foster smarter decision-making.
Posted: 16 Mar 2016 | Published: 31 Jul 2015

IBM

Network-based Security: Global Visibility is the Difference
sponsored by Level 3 Communications, Inc.
WHITE PAPER: Point security solutions aren't enough to keep up with increasingly diverse and sophisticated cyberthreats. Access this brief resource to learn how a network-based security strategy can detect threats and stop them before they affect your business.
Posted: 15 Mar 2016 | Published: 31 Dec 2015

Level 3 Communications, Inc.

Covering the Security Aspect of Software Asset Management
sponsored by Snow Software
WHITE PAPER: Managing large amounts of business critical information requires a high level of security. Access this white paper and uncover critical features in software asset management that prevent unauthorized access and destructive attacks.
Posted: 14 Mar 2016 | Published: 09 Dec 2015

Snow Software

Computer Weekly: Robots at Your Service
sponsored by ComputerWeekly.com
EZINE: Many digitally revolutionary technologies are currently on the edge of the mainstream—including virtual reality, artificial intelligence for financial advice, and the Internet of Things. This week's issue of Computer Weekly discusses the limitations that are holding these technologies back from widespread adoption.
Posted: 11 Mar 2016 | Published: 15 Mar 2016

ComputerWeekly.com

Get on Your Way to a Secure Mobile Enterprise
sponsored by IBM
RESOURCE: When hackers ramp up their attacks, you need to protect your mobile users on every front from the device itself to the applications they use. In this infographic, learn the startling statistics about mobile threats and the challenges organizations face. Inside, you'll learn steps to take to mitigate emerging threats.
Posted: 11 Mar 2016 | Published: 30 Dec 2015

IBM

2015 Gartner Magic Quadrant for Intrusion Prevention Systems (IPS)
sponsored by IBM
TECHNICAL ARTICLE: This article teaches you about next-generation IPSs which offer the best protection and response to advanced threats on endpoints and in the cloud.
Posted: 11 Mar 2016 | Published: 16 Nov 2015

IBM

EMC DATA PROTECTION SUITE 2015
sponsored by EMC & MicroAge
WHITE PAPER: This white paper shows you how to achieve simplicity and flexibility from your data protection. Access now and learn about a simplified, integrated approach that allows your organization to become more flexible while optimizing performance and reducing costs.
Posted: 11 Mar 2016 | Published: 31 Dec 2015

EMC & MicroAge

Replacing Antivirus, and Doing it Right: A CISO Response
sponsored by Sentinel Labs, Inc.
WHITE PAPER: This white paper shows you how to successfully execute a complete antivirus replacement. Access now and learn how to make a daunting task into a simple project with the right careful planning, frequent communication and stakeholder buy-in.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Sentinel Labs, Inc.

EMC DATA PROTECTION SUITE 2015
sponsored by EMC & NextNet
WHITE PAPER: In this white paper, you will learn how you can better protect data residing throughout your enterprise. Access this resource now and find out how you can gain flexibility to quickly optimize performance while saving your organization money.
Posted: 11 Mar 2016 | Published: 31 Oct 2015

EMC & NextNet

The Infrastructure and Advantages of Desktops-as-a-Service
sponsored by Dizzion
WHITE PAPER: This white paper discusses the advantages of desktop-as-a-service (DaaS). Access now and you'll learn about a DaaS solution that enables organizations to focus on their core businesses rather than designing, building, and supporting complex software and hardware infrastructure.
Posted: 11 Mar 2016 | Published: 29 Feb 2016

Dizzion

New Flash System's Transformative Power Accelerates Big Data Analytics
sponsored by IBM
RESOURCE: In this resource, learn how to accelerate big data analytics in your organization by utilizing the transformative value of IBM's storage solutions like FlashSystem. Read on to prepare for the specific IT challenges you may face as you enable or improve analytics within your enterprise.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

IBM

Top 10 Reasons You Should be Implementing VDI
sponsored by Pure Storage
WHITE PAPER: This white paper examines ten reasons why you should be implementing VDI and how all-flash storage systems can optimize virtual desktop deployments.
Posted: 11 Mar 2016 | Published: 11 Mar 2016

Pure Storage

Backup and Recovery for SAP with Oracle Environments
sponsored by EMC & NextNet
WHITE PAPER: In this white paper, review the EMC data protection suite, which features the necessary SAP integration and support to make backup and recovery more efficient and easier to manage. Read on to discover the new features this technology can provide to your enterprise's backup solution.
Posted: 10 Mar 2016 | Published: 30 Sep 2015

EMC & NextNet

Backup and Recovery for SAP with Oracle Environments
sponsored by EMC & MicroAge
WHITE PAPER: In this white paper, review the EMC data protection suite, which features the necessary SAP integration and support to make backup and recovery more efficient and easier to manage. Read on to discover the new features this technology can provide to your enterprise's backup solution.
Posted: 10 Mar 2016 | Published: 30 Sep 2013

EMC & MicroAge

Security Intelligence: Efficiently Analyze Big Data Sources
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Access this resource to learn about a strategy for security intelligence that can empower you to correlate data across dozens of platforms, detect and deflect attacks, perform queries faster, and much more.
Posted: 10 Mar 2016 | Published: 31 Dec 2015

Hewlett-Packard Enterprise

A Solutions Guide to Hyperconverged Infrastructure for Enterprise Applications
sponsored by Softchoice Corporation
WHITE PAPER: From this white paper, you will learn why hyperconverged infrastructure is the perfect web-scale infrastructure for enterprise applications, and see how this combo is revolutionizing today's enterprise data centers. Read on to discover how this HCI delivers compromise-free performance.
Posted: 10 Mar 2016 | Published: 31 May 2015

Softchoice Corporation

3 Simple Ways to Outsmart Your Storage
sponsored by IBM
VIDEO: This short webcast highlights a software-defined storage solution that improves data security with encryption capabilities, simplifies data management, and enhances overall data value. Watch now to see how you can improve your existing storage infrastructures and better manage higher data volumes.
Posted: 09 Mar 2016 | Premiered: 04 Nov 2015

IBM

IBM Spectrum Virtualize Encryption Capability: Part of a Larger SDS 'Whole'
sponsored by IBM
VIDEO: In this video, Mark Peters, an analyst at ESG, discusses a software-defined storage solution that places encryption in the storage management layer to provide maximum ease and value across an entire storage ecosystem. Watch now to learn how you can improve your data security capabilities.
Posted: 09 Mar 2016 | Premiered: 19 Oct 2015

IBM

SAP SYSTEMS ANALYSIS Business Risk Illustration
sponsored by Onapsis
WHITE PAPER: This white paper helps you frame the business risk of an SAP cyberattack by examining your SAP application layer for known vulnerabilities.
Posted: 09 Mar 2016 | Published: 29 Feb 2016

Onapsis
151 - 175 of 2444 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement