IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
151 - 175 of 2282 Matches Previous Page  |  Next Page
Top 10 Reasons to Transform Your Data Protection Strategy
sponsored by NetApp
WHITE PAPER: This essential white paper reveals 10 critical reasons to transform your data protection strategy to a modern solution. Read on to see how you can transform your backup into a strategic asset with tighter integration and greater efficiency.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

NetApp

Hospitality and Cybercrime: How to Safeguard Sensitive Information
sponsored by SurfWatch Labs
WHITE PAPER: This white paper explores the many cyber-risks faced by the hospitality sector. Access it and discover just how much your business is at risk – and what you can do about it.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

SurfWatch Labs

Backup to the Cloud: A Better Data Protection Solution
sponsored by NetApp
EBOOK: This book provides an overview of cloud-integrated data protection and discusses how it can address backup, disaster recovery, business continuity, and archive challenges. Access now to learn how to evaluate backup solutions for your organization, improve your data protection, and integrate your existing backup infrastructure with the cloud.
Posted: 06 Jan 2016 | Published: 06 Jan 2016

NetApp

Plan Ahead and Protect Your Data
sponsored by NetApp
WHITE PAPER: This white paper examines some of the key challenges enterprises are facing as they try to protect their data, and the solutions that can help them address these challenges in a cost-effective way. Read on to learn more.
Posted: 05 Jan 2016 | Published: 05 Jan 2016

NetApp

Top 5 Questions Answered on How to Best Protect Your Data in the Cloud
sponsored by Blue Coat Systems
WHITE PAPER: Discover the top 5 questions (and answers) you need to consider when crafting your cloud security strategy. The sad truth is there is no silver bullet to keep your data safe, but there are simple steps to keep hackers out. View now to find out what they are.
Posted: 05 Jan 2016 | Published: 18 Nov 2015

Blue Coat Systems

Ten Smart Things to Know About Storage
sponsored by Icomm Technologies
WHITE PAPER: This white paper uncovers how the field of storage is developing and how new storage innovations such as cloud and virtualization can affect your business. Read on to learn how one vendor can provide your enterprise with a unified storage solution with the capabilities to manage some of the not so glamorous storage trends in today's environment.
Posted: 05 Jan 2016 | Published: 31 Dec 2012

Icomm Technologies

Introducing the SPARC M7 Processor with Security in Silicon
sponsored by Oracle Corporation
VIDEO: This brief video outlines a revolutionary way to secure your cloud in real-time that combines hardware and software. Tune in to see if this next-generation cloud security option is right for your organization.
Posted: 23 Dec 2015 | Premiered: 23 Dec 2015

Oracle Corporation

Leading Global Manufacturing Company Streamlines Administration with Centralized Privileged User Management
sponsored by FoxT
CASE STUDY: This case study examines how one manufacturing company was able to simplify their compliance and administration with network security and access management software. Read on to see how this centralized solution can enable your enterprise to automatically authorize user access, streamline your operations, and closes security gaps.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

FoxT

Lightning Strikes Twice: How to Quickly Recover After a Disaster
sponsored by Datto, Inc.
WHITE PAPER: This white paper discusses one company's decision to invest in a cloud backup service that provides them with total data protection everywhere their data lives. Access now to learn how this comprehensive backup, recovery, and business continuity solution can allow your enterprise to continue to work through a disaster even if your servers are down.
Posted: 23 Dec 2015 | Published: 30 Jul 2015

Datto, Inc.

Cloud Security and Data Backup Misconceptions
sponsored by IBM
EGUIDE: In this expert e-guide, learn the facts and fallacies about cloud security concerns and cloud-to-cloud backup. Find out the top 5 misconceptions about cloud data backup and what you can do to avoid a data breach.
Posted: 23 Dec 2015 | Published: 09 Dec 2015

IBM

Making the Executive Case for Cloud to Cloud Backup
sponsored by Datto, Inc.
EBOOK: This essential e-book outlines scenarios explaining the relevance and necessity of cloud to cloud backup, highlighting financial benefits, operational benefits, legal benefits, and more. Read on to see how every aspect of your business can benefit from cloud backup by providing you with the ultimate data protection in the event of a data loss.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

Datto, Inc.

Data Loss Nightmares of a Salesforce.com Admin
sponsored by Datto, Inc.
WHITE PAPER: This white paper discusses 5 common nightmares every organization has regarding their data protection and the threat of a data loss. Read on to discover how to manage your data with an automatic cloud-to-cloud backup solution that will ensure your data is secure.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

Datto, Inc.

The Top Five Misconceptions About Cloud-To-Cloud Data Backup
sponsored by IBM
EGUIDE: This exclusive e-guide offers the truth behind 5 of the most common misconceptions regarding cloud-to-cloud data backup. Read on to find out why backing up your data in the cloud is necessary and how to ensure your data is truly protected.
Posted: 23 Dec 2015 | Published: 23 Dec 2015

IBM

A Secure Path to the Cloud
sponsored by Oracle Corporation
WHITE PAPER: In this white paper, learn how one cloud infrastructure provider has built cybersecurity into the hardware to go beyond basic network and data defenses to protect your organization's sensitive assets.
Posted: 22 Dec 2015 | Published: 09 Dec 2015

Oracle Corporation

Your Business May Be at Risk: How Well is Your Data Protected
sponsored by Datto, Inc.
EBOOK: This e-book discusses data protection challenges and solutions in the emerging data-dependent business area, identifying the essentials for a successful data protection solution. Access now to learn how "Total Data Protection" solutions can efficiently protect your big data and ensure fast and easy data recovery in the event of a disaster.
Posted: 22 Dec 2015 | Published: 22 Dec 2015

Datto, Inc.

Case Study: How One MSP Kept Their Client's Business Operations Alive Through Flood and Fire
sponsored by Datto, Inc.
WHITE PAPER: This case study focuses on one company's decision to implement cloud-based backup so that they could remain productive during any possible disaster. Access now to see how cloud backup can improve your business continuity plan and allow your enterprise to minimize and even eliminate downtime.
Posted: 22 Dec 2015 | Published: 18 Nov 2015

Datto, Inc.

The Complete Guide to Office 365 Security
sponsored by Datto, Inc.
WHITE PAPER: This document gives an in-depth look at the security features that Microsoft has built into Office 365. Discover how stringent Office 365's security practices are and learn exactly what's being done to protect your valuable data.
Posted: 22 Dec 2015 | Published: 22 Dec 2015

Datto, Inc.

Getting Back to the Future When Disaster Strikes
sponsored by Datto, Inc.
WHITE PAPER: This white paper discusses how to secure your data in the cloud with cloud backup technology and provides 12 tips for successful data backup. Access now to see how implementing a reliable, documented back up program can ensure you avoid a data loss and keep your data secure.
Posted: 22 Dec 2015 | Published: 22 Dec 2015

Datto, Inc.

Definitive Guide to CASBs
sponsored by BitGlass
WHITE PAPER: This white paper outlines how Cloud Access Security Brokers (CASBs) can improve cloud application security by intermediating traffic between apps and user devices.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

BitGlass

E-Guide: DR Solutions for Remote Offices
sponsored by Viadex
EGUIDE: This exclusive e-guide provides an expert look into selecting an offsite disaster recovery solution. Read on for a comparison between different disaster recovery solutions to help you determine which solution is best for your enterprise's branch data protection.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

Viadex

Strategies for Using Cloud DR in Remote and Branch Offices
sponsored by Viadex
EGUIDE: This e-guide provides expert best practices for using cloud disaster recovery in remote and branch offices. Read on to discover how one company benefited from cloud disaster recovery and learn how cloud DR can ensure your enterprise's data stays protected in your virtualized servers and applications.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

Viadex

Salesforce Tricks for Admins by Admins
sponsored by Datto, Inc.
WHITE PAPER: In this white paper, Salesforce experts reveal best practices to help you get the most from this popular SaaS application. Read on to learn tips and tricks on profiles and permissions management, release management, and more.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

Datto, Inc.

Deliver Secure, New Business Services and Improve the Customer Experience
sponsored by CA Technologies
WHITE PAPER: This resource discusses ways organizations can deliver secure, new business services with identity management in mind. By accessing, you'll find a checklist designed to help you simultaneously grow and protect your business.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

CA Technologies

Backup and Data Protection for the SMB: What You Should Know
sponsored by Datto, Inc.
EBOOK: Access this e-book to learn the 6 important criteria that SMBs should consider when choosing a backup solution, including comprehensiveness, ease of use, recoverability, performance, and more. Learn how to choose the right backup for your enterprise so that you can benefit from a highly cost-efficient and reliable solution.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

Datto, Inc.

Case Study: Ad Agency Makes Office 365 Secure
sponsored by BitGlass
WHITE PAPER: This case study discusses how a global ad agency found a solution to its Office 365 security concerns. Take a look to see what security measures this organization implemented and how you can do the same.
Posted: 18 Dec 2015 | Published: 18 Dec 2015

BitGlass
151 - 175 of 2282 Matches Previous Page    5 6 7 8 9 10    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement