IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
201 - 225 of 2461 Matches Previous Page  |  Next Page
Make Endpoint Security Part of Your Client Systems Refresh
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Access this guide to uncover preloaded, validated and tested endpoint security strategies. Learn ways to extend data protection to employees on all endpoint devices, regardless of where they are located.
Posted: 04 Mar 2016 | Published: 04 Mar 2016

Dell, Inc. and Intel®

Develop More Effective Enterprise Mobile Programs
sponsored by IBM MaaS360
WHITE PAPER: This "how-to" guide highlights ways your business can create an effective and sustainable mobile enterprise program in four steps including defining your mobile strategy and secure day-to-day support.
Posted: 04 Mar 2016 | Published: 30 Nov 2012

IBM MaaS360

Mobile Data Security: Finding the Balance for Secure Productivity
sponsored by IBM MaaS360
WHITE PAPER: In this white paper, you will discover the strategic steps your organization should take before committing to a mobile security solution. Read on to uncover the questions you should be asking, both to vendors and to yourself, and how to use your knowledge to commit to a security solution—like container and virtualization approaches.
Posted: 04 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Protecting Patient Data in the Mobile Era
sponsored by SearchHealthIT.com
EZINE: The rapid adoption of EHRs, coupled with the widespread use of mobile devices among providers, has increased the endpoint security threat – and there are more risks ahead. Access this issue of Pulse to find out how providers are locking down access points to protect against data breaches and HIPAA violations.
Posted: 03 Mar 2016 | Published: 29 Feb 2016

SearchHealthIT.com

Information Security ANZ March 2016
sponsored by TechTarget ANZ
EZINE: Australian organisations face a huge skills shortage when it comes to fighting cyber-crime unless they act quickly
Posted: 03 Mar 2016 | Published: 03 Mar 2016


Mobile Device Management Policies: Best Practices Guide
sponsored by IBM MaaS360
WHITE PAPER: Your company's data is priceless, so protecting it should be your number one priority, without jeopardizing employee productivity. In this white paper, you will discover 10 best practices for MDM, including guidance on how to distribute settings Over the Air (OTA), enforce encryption, and more.
Posted: 03 Mar 2016 | Published: 31 Dec 2014

IBM MaaS360

Embracing BYOD with Mobile Device Management
sponsored by IBM MaaS360
VIDEO: In this brief video, you will discover how to offer your end-users simple BYOD enrollment for their personal devices with an MDM platform, as well as hand your IT full control of mobile devices running on iOS and Android. Tune in to secure your organization's data with compliant endpoint access.
Posted: 03 Mar 2016 | Premiered: 03 Mar 2016

IBM MaaS360

Forward Thinking Backup: Data Protection for the Digital Business
sponsored by Veritas
WHITE PAPER: This white paper discusses the challenges of protecting data in today's digital world and highlights a converged backup and recovery platform with scalable storage appliances that enable cost savings and simplified management. Access now to see the benefits this platform can provide, including instant data recovery, cloud integration, and more.
Posted: 02 Mar 2016 | Published: 31 Jan 2016

Veritas

Yield Insight into Your Business Info with Data-Aware Storage
sponsored by DataGravity
EGUIDE: This expert guide discusses advanced "data-aware" storage infrastructure with big data processing capabilities and efficient metadata management. Learn how this infrastructure can provide your enterprise with intelligent, fast, and highly efficient data services that enables greater insight into your stored data.
Posted: 01 Mar 2016 | Published: 23 Feb 2016

DataGravity

Making the Case for Data-Aware Storage
sponsored by DataGravity
EGUIDE: This e-guide discusses data-aware storage, which aims to make storage more efficient, smarter and even more secure. It's designed to replace primary storage directly and add data-aware features that are architecturally and generally capable of handling multiple applications on a broad scale.
Posted: 01 Mar 2016 | Published: 23 Feb 2016

DataGravity

Securing Docker: What You Need to Know
sponsored by Black Duck Software
WHITE PAPER: This white paper discusses how you can build, ship, and run distributed applications quickly and reliably. Learn how you can go from physical, single-tenanted computing resources to more efficient, virtual, multi-tenanted infrastructure that can run in traditional IT environments and in the cloud.
Posted: 01 Mar 2016 | Published: 29 Feb 2016

Black Duck Software

Deduplication and Backups — On Purpose for a Purpose
sponsored by Dell, Inc.
WHITE PAPER: This tech brief highlights the different deduplication methods used in today's computing environments, focusing on backups. Read on to see which method is right for your enterprise, and learn about the strengths and weakness of the most popular methods, including post-process deduplication, inline deduplication, fixed block deduplication, and more.
Posted: 01 Mar 2016 | Published: 01 Mar 2016

Dell, Inc.

Full Database Protection Without the Full Backup Plan: Oracle's Data Loss Recovery Appliance
sponsored by Oracle, in association with Intel
WHITE PAPER: This white paper discusses a recovery appliance that ensures continuous database protection in real-time and at scale, eliminating the need for traditional batch window backups. Discover how this appliance can simply your data management and protection and provide your enterprise with immediate backup copies to recover from potential disasters.
Posted: 01 Mar 2016 | Published: 31 Dec 2015

Oracle, in association with Intel

Top 5 Pitfalls to Avoid in Your Data Protection Strategy
sponsored by Veritas
WHITE PAPER: This white paper uncovers five common, critical pitfalls to avoid when building a data protection strategy. Read on to learn how to navigate through these pitfalls so that your enterprise can implement a data protection solution that eliminates complexity, reduces staff inefficiencies, enables faster decisions, and accelerates your ROI.
Posted: 01 Mar 2016 | Published: 31 Jan 2016

Veritas

PCI Compliance Protect your business from data breach
sponsored by Earthlink.
WHITE PAPER: Get stronger control over PCI compliance in this white paper by learning the 12 requirements to simplify and accelerate the process. Access this resource now to learn how to proactively protect your organization from a data breach.
Posted: 01 Mar 2016 | Published: 01 Mar 2016

Earthlink.

Cloud-based Managed Services for Data Protection
sponsored by IBM
WHITE PAPER: Today's caustic business environment demands the ability to manage and protect mission critical data in the face of rapid information growth. This resource introduces a cloud-based services and protection system that can help meet this goal.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

IBM

The Role of SAM in Information Security
sponsored by Snow Software
WHITE PAPER: Software asset management (SAM) provides an organization not just with the resources it needs to generate audit and reconciliation reports, but also to support information security initiatives. Learn ways information security can be more effectively addressed with the aid of SAM.
Posted: 29 Feb 2016 | Published: 29 Feb 2016

Snow Software

8 Tips to Stay Ahead of the Top 2016 Data Protection Trends
sponsored by Veritas
WHITE PAPER: This white paper offers 8 tips to staying on top of the 2016 data protection trends and solving data management challenges. Read on to learn how your enterprise can maximize the value of your data protection investment, meet more demanding SLAs, simplify management across your IT environment, and reduce costs.
Posted: 29 Feb 2016 | Published: 31 Jan 2016

Veritas

Where's the Collaboration in Enterprise Collaboration Tools?
sponsored by SearchContentManagement
EGUIDE: Enterprise collaboration tools can help generate sales, reduce costs and connect dispersed workers. So why are many companies hesitant to use them? In this e-guide, you'll ensure strong governance policies are at the heart of your enterprise-wide collaboration strategy and learn the secrets of collaboration success.
Posted: 03 Mar 2016 | Published: 02 Mar 2016

SearchContentManagement

Linux and Cloud Transform Business-Critical Application Development
sponsored by IBM
PRODUCT OVERVIEW: In this resource, you will discover how your IT can leverage the LinuxONE platform to deliver unparalleled system uptime, data security, and superior QoS—supporting superior business agility. Read on to glean why this platform is most effective for database and high-I/O workloads.
Posted: 03 Mar 2016 | Published: 31 Aug 2015

IBM

Third-Party Risk Management: Evaluating and Contracting with Vendors
sponsored by BitSight
EGUIDE: This expert e-guide describes how to use standardized documentation for third-party risk assessment in order to minimize risk before deciding on a vendor. Access this resource now for advice on the security-related clauses that financial institutions need to include in their vendor contracts in order to comply with regulatory requirements.
Posted: 02 Mar 2016 | Published: 26 Feb 2016

BitSight

Spear Phishing Attacks: Where to Find Them and How to Prevent Them
sponsored by Cloudmark
EGUIDE: This exclusive e-guide discusses the reasons behind why spear phishing attacks are at the heart of most targeted attacks. Access now and you'll uncover advice to help minimize the chance of a spear phishing attack successfully infiltrating the enterprise.
Posted: 02 Mar 2016 | Published: 02 Mar 2016

Cloudmark

How to Unleash the Full Potential of Linux with Docker Containers
sponsored by IBM
WHITE PAPER: In this white paper, you will learn how to achieve the ultimate flexibility for business critical Linux applications with Docker containers. Read on to take advantage of enterprise-grade automation, orchestration, management, visibility, and control capabilities for the application development and deployment process.
Posted: 01 Mar 2016 | Published: 31 Aug 2015

IBM

Best Practices for Defending Against Spear Phishing Attacks
sponsored by Cloudmark
EGUIDE: This exclusive e-guide details a new wave of spear phishing attacks targeting defense contractors, universities, and security firms. Read on as experts explain how to defend against the man-in-the-email attacks with proper training and little technology.
Posted: 01 Mar 2016 | Published: 01 Mar 2016

Cloudmark

Backup More, Store Less, Perform Better: Dell Data Protection
sponsored by Dell, Inc.
WHITE PAPER: This datasheet highlights Dell's data protection series with backup and recovery appliances as well as built-in, variable, block-based deduplication and compression. Read on to see the how these solutions can enable your enterprise to trim your storage and data protection costs and benefit from scalability, management simplicity, and more.
Posted: 01 Mar 2016 | Published: 01 Mar 2016

Dell, Inc.
201 - 225 of 2461 Matches Previous Page    7 8 9 10 11 12    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement