IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
201 - 225 of 2769 Matches Previous Page  |  Next Page
Is data leaking out on your watch?
sponsored by Intel Security
RESOURCE: Learn more about where threats initiate and the tactics cyber criminals use to steal your data. Discover what measures you can take to make sure your organization isn't the next highly publicized breach victim (whether it be from external threats or your very own employees).
Posted: 19 May 2016 | Published: 01 Apr 2016

Intel Security

End the E-Waste Epidemic. Do Your Part.
sponsored by Iron Mountain
RESOURCE: Learn how to dispose of e-waste properly to both save the environment and save your organization from data loss.
Posted: 19 May 2016 | Published: 01 Apr 2016

TOPICS:  Data Security
Iron Mountain

Advance Enterprise Analytics with Self-Service and Governance
sponsored by Pyramid Analytics
WHITE PAPER: Self-service BI can help business users quickly create data models and enable better decision-making, but this can't be achieved without centralized, managed security. Discover a highly scalable BI platform that can balance self-service BI with complete governance.
Posted: 19 May 2016 | Published: 19 May 2016

Pyramid Analytics

Korott Labs trust Barracuda NextGen Firewalls for security, reliability and simple centralized management
sponsored by Barracuda Networks
RESOURCE: What they decided on gave them a distributed, reliable and secure network with centralized management with complete visibility of their entire network and its components. Learn more about Korott's process and eventual decision to help your organization find the proper firewall security it needs.
Posted: 19 May 2016 | Published: 01 Apr 2016

Barracuda Networks

The Productivity Transformation
sponsored by IBM MaaS360
WHITE PAPER: Your enterprise can't be left behind in this new era of productivity. Enable your employees by creating secure systems that can protect your data while living on less than enterprise secure devices.
Posted: 19 May 2016 | Published: 01 Mar 2016

IBM MaaS360

Data Masking and Subsetting
sponsored by Oracle Corporation
DATA SHEET: Copying production data for non-production purposes, such as test and development, is increasing the exposure of sensitive data, expanding the security and compliance boundary and the likelihood of data breaches. Learn how masking and subsetting data reduces the exposure of the sensitive production data for non-production environments.
Posted: 19 May 2016 | Published: 30 Oct 2015

Oracle Corporation

Unified Identity Governance - A Business Overview
sponsored by Oracle Corporation
WHITE PAPER: Application proliferation has created renewed identity fragmentation, as users are inconsistently managed across apps in the enterprise. Learn how to create a converged identity governance process—managing access privileges across all business applications and platforms by unifying identity governance.
Posted: 19 May 2016 | Published: 31 May 2015

Oracle Corporation

Simple, Secure Encryption in the Era of Big Data
sponsored by Gemalto
WHITE PAPER: Increase in opportunity comes with increase in risk. Greater encryption and key management can make accumulating big data a breeze. Learn how to ensure your data protection platform is flexible to work across all data types and all locations where your data lives.
Posted: 19 May 2016 | Published: 31 Dec 2015

Gemalto

Gemalto SafeNet KeySecure
sponsored by Gemalto
WHITE PAPER: This white paper shows you how to easily manage keys for a variety of encryption locations. Centralize your encryption and key management for lower cost of administration.
Posted: 19 May 2016 | Published: 31 Dec 2015

Gemalto

Gemalto’s SafeNet Encryption Connectors a Complete, Enterprise-Ready Encryption Platform
sponsored by Gemalto
WHITE PAPER: With all your different types of data and all the different locations is resides, you need a flexible data protection solution with uniform controls across your entire landscape. Learn how you can encrypt both data at rest and data in motion that flows across your network or between data centers.
Posted: 19 May 2016 | Published: 31 Dec 2015

Gemalto

A Best Practice Approach to Database Backup and Recovery
sponsored by Veritas
WHITE PAPER: Examine a backup tool that improves visibility, compliance, and data protection and enforces better communication between the backup admin and database admin (DBA). Learn how your enterprise can eliminate the risk of losing time, data and money with a simplified, well-coordinated database backup and recovery solution.
Posted: 19 May 2016 | Published: 19 May 2016

Veritas

2015 the Year Data Breaches Got Personal
sponsored by Gemalto
WHITE PAPER: Data breaches continue to be a large and growing threat for organizations in all industries. Many are clinging to conventional ways of looking at cyber security rather than taking a newer approach. With this cybercrime data, you'll be able to formulate a modern security strategy to stay ahead of evolving threats and hackers.
Posted: 18 May 2016 | Published: 31 Dec 2015

Gemalto

Tackling Workplace Mobility
sponsored by VMware
WHITE PAPER: 84% of employees use a mobile device during their work day. As mobility takes over the workplace, problems with security, compliance, and cost begin to pop up. Learn more about the mobile takeover and find a solution that tackles these challenges.
Posted: 18 May 2016 | Published: 29 Apr 2016

VMware

Mobile is the New Playground for Thieves
sponsored by IBM MaaS360
WHITE PAPER: You need to modernize your security with a robust way to proactively detect, analyze and remediate new mobile threats. Learn the true cost of a data breach and how to best implement your own BYOD policy.
Posted: 18 May 2016 | Published: 31 Dec 2015

IBM MaaS360

Ten rules for Bring Your Own Device (BYOD)
sponsored by IBM MaaS360
WHITE PAPER: Bring your own device (BYOD) is the facet of mobility that is leaving many organizations feeling vulnerable. Here are ten rules, each broken down, to keep you on the right track to taking full advantage of all that mobility has to offer.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Data Protection in Two Dimensions
sponsored by IBM
WHITE PAPER: Uncover an all-flash storage array that provides two independent dimensions of data protection to help monitor and predict upcoming flash failures. See how you can increase your flash storage efficiency and endurance without sacrificing protection.
Posted: 18 May 2016 | Published: 31 Jan 2016

IBM

Forward Thinking Backup Through Unified Data Protection
sponsored by Veritas
WHITE PAPER: This white paper highlights a unified backup and recovery solution that manages workloads on multiple physical, virtual, and cloud platforms. Read on to see how this converged platform can enable your enterprise to manage and protect mixed workloads across your enterprise and reduce administration and infrastructure costs.
Posted: 18 May 2016 | Published: 18 May 2016

Veritas

A Step-By-Step Guide to Finding the Right Safenet Data Protection Solution for Your Organization
sponsored by Gemalto
WHITE PAPER: Deploy a unified, efficient data protection platform that can be leveraged to secure all data types. Whether it is data in motion or data living on your physical, cloud or hybrid environment, this white paper makes it quick and easy to pinpoint a system that best fits your security needs.
Posted: 18 May 2016 | Published: 31 Dec 2015

Gemalto

SB Enterprise Firewall
sponsored by Fortinet, Inc.
RESOURCE: Network firewall security must evolve to secure the extended enterprise. You need end-to-end network security that protects the entire attack surface from IoT to cloud. Take a more collaborative approach across your entire network infrastructure to deploy a dynamic, long term defense strategy.
Posted: 18 May 2016 | Published: 01 Apr 2016

Fortinet, Inc.

Six steps to control the uncontrollable
sponsored by Microsoft
WHITE PAPER: Your employees need to be productive where and when they want to be. If you don't provide ways for them to accomplish this, they'll do it themselves. So how sure are you that you're in full control of your company? Explore six key focus areas to managing your enterprise's mobility and empowering your employees while ensuring security.
Posted: 18 May 2016 | Published: 04 May 2016

Microsoft

Security essentials for CIO's enabling mobility - their device, your data
sponsored by IBM MaaS360
WHITE PAPER: Your goal is to make BYOD policies feasible by seamlessly securing corporate data on the device while providing logical separation from personal activities. Learn five key steps you should consider before putting your BYOD program in place.
Posted: 18 May 2016 | Published: 31 Dec 2012

IBM MaaS360

Controlling the uncontrollable
sponsored by Microsoft
WHITE PAPER: 29% of workers use three or more devices, work from many locations, and use many apps, and this number is growing. The problem is enabling employees without compromising security throughout the enterprise. Read on to learn about an enterprise mobile management solution that will make the process easier than you may realize.
Posted: 18 May 2016 | Published: 11 May 2016

Microsoft

Enable Better Decisions for Everyone in Your Organization
sponsored by Pyramid Analytics
WHITE PAPER: Many organizations struggle with inefficient, overly complex business intelligence processes that leave them with fragmented data and incomplete information. Discover a business intelligence platform that empowers users outside of IT to dive into data, with the security of a governed analytics environment.
Posted: 18 May 2016 | Published: 18 May 2016

Pyramid Analytics

The State of Mobile Application Insecurity - Ponemon Institute Research Report
sponsored by IBM MaaS360
RESOURCE: This Ponemon Institute study, which encapsulates 640 individuals involved in the application development and security process, will help you understand how organizations are reducing the risk of unsecured mobile apps used in their business practices.
Posted: 18 May 2016 | Published: 28 Feb 2015

IBM MaaS360

Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud
sponsored by Equinix
PODCAST: Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery solutions to protect important data. Access now to see how hybrid cloud DR and BC can enable your enterprise to efficiently recover full systems and implement automatic backups that can reduce your RPO and RTO.
Posted: 18 May 2016 | Premiered: Apr 18, 2016

Equinix
201 - 225 of 2769 Matches Previous Page    7 8 9 10 11 12    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement