IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
201 - 225 of 2690 Matches Previous Page  |  Next Page
Making the Most of Hybrid Cloud for Backup and Archiving
sponsored by Equinix
TRANSCRIPT: Data storage experts, Jeff Kaplan, Domenic Steinbrueck, and Don Wiggins, discuss how cloud backup and archiving can improve both data reliability and recovery. Discover how your enterprise can achieve a greater amount of utility and flexibility when it comes to capturing and utilizing your data, without risking security.
Posted: 14 Jun 2016 | Published: 14 Jun 2016

Equinix

The Essential Guide to Managed Backup
sponsored by Solarwinds N-able
EBOOK: Even a couple of hours downtime could cause your customers to experience lost revenue, lost customers, and the permanent loss of data. Can your business take that hit? Read this eBook to discover how you can manage, store, and protect your customers' data, as well as streamline your backup routine.
Posted: 14 Jun 2016 | Published: 14 Jun 2016

Solarwinds N-able

Making the Most of Hybrid Cloud for Future-Proofed Data Storage Part 1
sponsored by Equinix
TRANSCRIPT: Data storage experts discuss how the right hybrid cloud solution, if implemented successfully, can provide infinite storage capacity that is secure and reliable. Access now to learn what characteristics you need in a hybrid cloud infrastructure to meet your data management needs.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Equinix

Putting the “Secure” in Secure Remote Access
sponsored by Citrix
WHITE PAPER: Security pros today are challenged to establish comprehensive protection for all kinds of remote access use cases. Learn how you can deliver a single, consolidated remote access infrastructure featuring comprehensive access, threat and data protection.
Posted: 13 Jun 2016 | Published: 01 May 2016

Citrix

Integrating Data Protection and Active Archiving
sponsored by HGST
WHITE PAPER: Learn how to easily integrate data protection with scalability. An integrated solution demonstrates data availability at scale, manageability, disaster recovery capabilities and simplicity agreeable to the demands of current and future enterprise data center environments.
Posted: 13 Jun 2016 | Published: 01 Apr 2016

HGST

Integrated Solution for Workforce Mobility and Secure Hybrid Cloud
sponsored by Hitachi Data Systems
WHITE PAPER: Discover a content platform portfolio that combines object storage software with hybrid cloud to efficiently consolidate, automate, mobilize and archive data. See how this solution can bring structure to your unstructured data, simplify your storage management, ensure security, and more.
Posted: 13 Jun 2016 | Published: 31 Jan 2015

Hitachi Data Systems

Hitachi Content Platform: Intelligent Structure for Unstructured File Data
sponsored by Hitachi Data Systems
DATA SHEET: Object storage solutions can bring efficiency and structure to your data management by enabling organizations to store, protect, analyze and retrieve file data from a single system. Discover how this content platform can also enable your enterprise to control data mobility, reduce backup via built-in data protection, and more.
Posted: 13 Jun 2016 | Published: 31 Jan 2016

Hitachi Data Systems

Make EMM Part of a Broader Mobile Enterprise Strategy
sponsored by Microsoft
EGUIDE: If management is the centerpiece of your mobile enterprise strategy, you're doing it wrong. Learn how adding MAM and MCM capabilities to your EMM strategy can help you enforce mobile security policies, but also enable your workers to be more productive, transforming how your business operates.
Posted: 10 Jun 2016 | Published: 03 Jun 2016

Microsoft

Support Unstructured Data with Multipurpose Distributed Object Storage
sponsored by Hitachi Data Systems
WHITE PAPER: Explore a single, multipurpose distributed object-based storage system that can support large-scale repositories of unstructured data throughout a wide range of workloads. Discover the benefits this platform can bring to your enterprise, including multitenancy, adaptive cloud tiering, spin-down capability, and more.
Posted: 10 Jun 2016 | Published: 30 Nov 2014

Hitachi Data Systems

Closing the Loop with Advanced Endpoint Protection and Forensics
sponsored by Check Point Software Technologies Ltd.
WEBCAST: You need access to insights that allow you to understand and triage attacks so you can quickly determine the path of resolution. Learn solid strategies that can help your organization secure end-user systems from today's most sophisticated attacks and zero-day threats.
Posted: 10 Jun 2016 | Premiered: Jun 10, 2016

Check Point Software Technologies Ltd.

Piecing Together the Hybrid Cloud Management Puzzle
sponsored by IBM
EGUIDE: While the hybrid cloud gives users the ability to reap the benefits of the public cloud, yet still maintain control over critical applications through the private cloud, that doesn't mean hybrid cloud management is a walk in the park. This e-guide explores questions to answer before taking on a hybrid cloud project.
Posted: 09 Jun 2016 | Published: 06 Jun 2016

IBM

The IBM-VMware Partnership: How Will This Affect The Move To Hybrid Cloud
sponsored by IBM
EGUIDE: Moving on-premises workloads to the cloud might now get a little easier. IBM and VMware have partnered up to help streamline the move to the hybrid cloud. This exclusive e-guide highlights this partnership and how it's allowing users to extend their existing workloads from their on-premises data center to the cloud.
Posted: 09 Jun 2016 | Published: 06 Jun 2016

IBM

Backup Target Features Evolve for Better Data Protection
sponsored by Veritas
EGUIDE: Over the years, disk-based backup targets have evolved to become far more than just cheap disk arrays. SearchDataBackup.com experts explain how as IT professionals consider upgrading or replacing their current technology, they need to understand the different capabilities these systems can offer.
Posted: 09 Jun 2016 | Published: 07 Jun 2016

Veritas

The Disk vs. Tape vs. Cloud Data Protection Debate
sponsored by Veritas
EGUIDE: Take a closer look at data protection in today's complex IT environments, and explore the key factors to consider when evaluating which option is right for your organization.
Posted: 09 Jun 2016 | Published: 03 Jun 2016

Veritas

Evaluating Recovery-in-Place Strategies for Data Protection
sponsored by Veritas
EGUIDE: Inside this exclusive data protection guide, explore a detailed breakdown of recovery-in-place technology, its top use cases and three key considerations to keep in mind when evaluating data protection techniques.
Posted: 09 Jun 2016 | Published: 07 Jun 2016

Veritas

Corporate Data Backup Expands Its Use Cases
sponsored by Veritas
EGUIDE: Products from backup software and hardware vendors have evolved to answer a broader array of challenges such as high-availability functionality, copy data management, archiving and data classification. Hear from our experts as they dive into new use cases of data backup.
Posted: 09 Jun 2016 | Published: 07 Jun 2016

Veritas

Evolving Backup Software Reduces the Necessity Of Archiving
sponsored by Veritas
EGUIDE: Access this exclusive guide to learn about the future of data backup and archiving, and the circumstances that determine whether the two should remain separate processes or not.
Posted: 09 Jun 2016 | Published: 03 Jun 2016

Veritas

B2B Success Story: E-Commerce Strategy for Thousands of Daily Transactions
sponsored by Axway
WEBCAST: In this video, Shawn Buske discusses the e-commerce system that Jabil chose to handle thousands of daily B2B transactions. Jabil was also able to easily meet SLA compliance and security compliance requirements.
Posted: 08 Jun 2016 | Premiered: Jan 11, 2016

Axway

Optimizing Web Application Security for the New Bad Bot Threat Landscape
sponsored by Distil Networks
WHITE PAPER: Winning in today's bot battlefield takes time, expertise, and a dedicated team. In this white paper, get a glimpse into the world of anti-bot defenses and win the battle of the bots on your site.
Posted: 07 Jun 2016 | Published: 01 May 2016

Distil Networks

Improving Payment Card Compliance
sponsored by Verizon
WHITE PAPER: Learn how a large U.S. bank was able to secure customer data in a cost-efficient manner and achieve PCI compliance by focusing on the most important applications. Discover how this strategy can help you meet your compliance challenges.
Posted: 07 Jun 2016 | Published: 01 May 2016

Verizon

Defend Against Threats of Global Operations
sponsored by Verizon
WHITE PAPER: Learn how the organization decided to replace the company's global remote-access infrastructure with platforms that allow it greater overall visibility to areas of increased vulnerability. Discover how to guard both your global network and application delivery platforms to help protect your reputation and maintain business continuity.
Posted: 07 Jun 2016 | Published: 01 May 2016

Verizon

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

Six Steps to Buying Data Loss Prevention Products
sponsored by Intel Security
EGUIDE: Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

Top Object Storage Enterprise Use Cases
sponsored by Cleversafe
EGUIDE: Access this exclusive guide to learn about object storage trends, why its use cases are growing, and how to determine which, if any, would be right for your storage strategy.
Posted: 13 Jun 2016 | Published: 10 Jun 2016

Cleversafe

Security Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.
Posted: 13 Jun 2016 | Premiered: May 1, 2016

Intel Security
201 - 225 of 2690 Matches Previous Page    7 8 9 10 11 12    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement