IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
176 - 200 of 2310 Matches Previous Page  |  Next Page
Understand the Threat Landscape
sponsored by IBM
WHITE PAPER: This infographic provides you with some essential statistics regarding the rising problem of cybercrime.
Posted: 24 Jun 2015 | Published: 31 Dec 2014

IBM

Data Breach Risk Calculator
sponsored by IBM
WHITE PAPER: With this risk calculator, you can answer a few simple questions to determine how much your organization would lose in a data breach.
Posted: 24 Jun 2015 | Published: 31 Dec 2014

IBM

What You Need to Know Now for Modern Backup
sponsored by Hewlett-Packard Limited & Intel® (Processor Intel® Xeon®)
WHITE PAPER: This buyer's guide describes the capabilities of an effective data backup system and gives advice for selecting one that both meets your needs and your budget.
Posted: 23 Jun 2015 | Published: 31 Jan 2015

Hewlett-Packard Limited & Intel® (Processor  Intel® Xeon®)

Gain Control of Sensitive Documents
sponsored by Nuance
VIDEO: Take a look at this brief video to discover just how dangerous an insecure printer can be, and to learn what you can do to protect your sensitive documents.
Posted: 22 Jun 2015 | Premiered: 03 Apr 2015

Nuance

Navigating 5 Common Challenges to PCI 3.0 Compliance
sponsored by FireHost Inc.
WEBCAST: This webcast explores 5 common challenges to PCI DSS 3.0 compliance.
Posted: 22 Jun 2015 | Premiered: Jun 22, 2015

FireHost Inc.

Why Upgrade your Messaging?
sponsored by IBM
WHITE PAPER: This white paper informs how to ensure that your systems of record are adaptable and responsive to change. Discover the power of messaging to help you connect applications, systems, services and data.
Posted: 19 Jun 2015 | Published: 30 Jun 2014

IBM

10 Ways to Protect Your Company From a Data Breach
sponsored by Bit9 + Carbon Black
WEBCAST: This webcast presents a 10 step strategy to tightening retail security and maintaining PCI compliance.
Posted: 19 Jun 2015 | Premiered: Apr 4, 2014

Bit9 + Carbon Black

Corporate Data: A Protected Asset or a Ticking Time Bomb?
sponsored by Varonis
WHITE PAPER: Access this white paper for in-depth research into the growing risks and challenges to productivity that data growth and a lack of internal controls currently present for organizations of all sizes.
Posted: 19 Jun 2015 | Published: 31 Dec 2014

Varonis

How to Create a Secure Mobile Enterprise
sponsored by Dell, Inc.
WHITE PAPER: This white paper explores how a secure mobile enterprise increases productivity and collaboration while opening the doors to business transformation, competitive advantage and improved performance.
Posted: 18 Jun 2015 | Published: 27 Apr 2015

Dell, Inc.

NetApp Is Accelerating Your Data Protection Strategy to the Clouds
sponsored by NetApp
WHITE PAPER: This informative white paper makes it clear that improving data backup and recovery is a top priority for IT groups in organizations of all sizes.
Posted: 18 Jun 2015 | Published: 01 Jan 2015

NetApp

Shore Up Your Office 365 Attack Surface
sponsored by SearchSecurity.com
EBOOK: This exclusive e-guide reviews the Office 365 suite's security features, including how to take advantage of its benefits and what challenges you may encounter.
Posted: 18 Jun 2015 | Published: 15 Jun 2015

SearchSecurity.com

NetApp AltaVault Cloud-Integrated Storage
sponsored by NetApp
WHITE PAPER: This solution brief highlights a particular type of storage that enables customers to securely back up data to any cloud at up to 90% less cost compared to on-premises solutions.
Posted: 18 Jun 2015 | Published: 18 Jun 2015

NetApp

XtremIO Data Protection
sponsored by EMC Corporation
WHITE PAPER: This white paper highlights a data protection strategy and reveals its benefits and advantages over RAID (Redundant Array of Independent Disks), with special consideration given to the unique requirements of enterprise flash storage arrays.
Posted: 16 Jun 2015 | Published: 01 Jul 2014

EMC Corporation

Solving Today's Top 5 Security and Risk Challenges
sponsored by Commvault
WHITE PAPER: This white paper presents the top 5 data security and risk challenges that hinder compliance. Access this exclusive resource to learn how to overcome each issue.
Posted: 16 Jun 2015 | Published: 03 Jun 2015

Commvault

Enhancing Authentication to Go Beyond Username and Password Vulnerabilities
sponsored by HID
VIDEO: This brief video explores remote access security challenges and how to go beyond simple username/password combinations to enhance your authentication security strategy.
Posted: 15 Jun 2015 | Premiered: 05 Jun 2013

HID

5 Reasons to Buy – Not Build – Backup Capabilities
sponsored by Datto, Inc.
WHITE PAPER: Read this white paper to discover five reasons why buying backup may be a better idea than building your own, and how you can take the first steps in purchasing a reliable backup solution for your clients.
Posted: 11 Jun 2015 | Published: 11 Jun 2015

Datto, Inc.

Improve storage performance of multi-tier workloads with hybrid arrays
sponsored by Dell, Inc. and SanDisk®
PRODUCT OVERVIEW: Access this informative resource to learn about a unified storage platform that offers features for automating tiered storage across arrays and find out how this technology helps to improve storage performance and efficiency for specialized, multi-tiered workloads.
Posted: 10 Jun 2015 | Published: 31 Dec 2014

Dell, Inc. and SanDisk®

Securing Big Data Environments
sponsored by Hortonworks
RESOURCE: This resource outlines a particular security platform that can centralize data access policies and key management to protect the entire big data environment, including structured and unstructured data sources. Read now to learn how your organization can protect your data by accessing this resource.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Hortonworks

5 Reasons Every MSP Should Sell SaaS Data Protection
sponsored by Datto, Inc.
WHITE PAPER: This white paper gives five reasons why MSPs need to take advantage of the growing need for SaaS environment data protection.
Posted: 10 Jun 2015 | Published: 10 Jun 2015

Datto, Inc.

Customer Spotlight: Deploying a Data Protection Program In Less Than 120 Days
sponsored by Digital Guardian
WEBCAST: In this webcast, Mike Ring from Jabil discusses his company's experience deploying a data protection program from Digital Guardian in 120 days.
Posted: 09 Jun 2015 | Premiered: Nov 5, 2014

Digital Guardian

Security Audit Checklist
sponsored by Digital Guardian
RESOURCE: This checklist presents the 12 most common questions in a client data protection audit to get your organization ready to meet stringent partner or supplier data management requirements. Continue reading to assess your security strategy and prepare for an audit.
Posted: 09 Jun 2015 | Published: 29 Apr 2015

Digital Guardian

Growing Data, Growing Danger: How To Reduce Breaches
sponsored by Micron Technology
RESOURCE: This helpful resource details how to protect data from potential breaches using SSD. Read on to get the facts about data security, and why all companies must put data protection at the top of their priorities.
Posted: 08 Jun 2015 | Published: 08 Jun 2015

Micron Technology

Protect Information Like a Pro: A Guide for Enterprise CIOs
sponsored by Clearswift
EGUIDE: This CIO essential guide teaches you how to protect information and is designed to give IT leaders strategic management and decision-making advice.
Posted: 04 Jun 2015 | Published: 04 Jun 2015

Clearswift

5 Ways to Meet Today's Data Management Challenges with a Single Platform
sponsored by Commvault
WHITE PAPER: This resource describes how investing in a platform that integrates data backup, retention, search and access can provide a more holistic and integrated data management system.
Posted: 03 Jun 2015 | Published: 31 Dec 2014

Commvault

5 Important Questions to Ask Before You Renew with Your Legacy Backup Software
sponsored by Commvault
WHITE PAPER: This resource discusses the five questions every storage professional needs to ask themselves before deciding to renew their old data backup software.
Posted: 03 Jun 2015 | Published: 03 Jun 2015

Commvault
176 - 200 of 2310 Matches Previous Page    6 7 8 9 10 11    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement