IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
226 - 250 of 2624 Matches Previous Page  |  Next Page
Data Privacy and Protection: 5 Insights from the Experts
sponsored by Iron Mountain
EBOOK: With major data breaches in the news nearly every day, the privacy of business information is on the minds of companies across the globe. Discover exclusive insight from experts on data privacy and protection—and learn how new data privacy laws affect records management, 5 steps to redefining your retention policies, and more.
Posted: 17 May 2016 | Published: 17 May 2016

Iron Mountain

E-Waste Is More Than Just Clutter
sponsored by Iron Mountain
WHITE PAPER: Do you dispose of, repurpose or recycle your old IT assets and technology? Explore why and how you should create a secure and frequent IT asset disposal program for your organization to stay compliant, safe, and clutter-free.
Posted: 17 May 2016 | Published: 31 Dec 2015

Iron Mountain

Making the Most of Hybrid Cloud for Backup and Archiving
sponsored by Equinix
PODCAST: Data storage experts, Jeff Kaplan, Domenic Steinbrueck, and Don Wiggins, discuss how cloud backup and archiving can improve both data reliability and recovery. Discover how your enterprise can achieve a greater amount of utility and flexibility when it comes to capturing and utilizing your data, without risking security.
Posted: 17 May 2016 | Premiered: Apr 18, 2016

Equinix

IT Guide: Windows 10 Migration Minus The Complexity
sponsored by Druva Software
WHITE PAPER: In just six steps, you can leverage endpoint data protection to help you ease into OS migration. Learn how to craft a migration plan that drastically simplifies the OS refresh process and provides comprehensive data protection and governance foundation for your organization.
Posted: 16 May 2016 | Published: 31 Dec 2015

Druva Software

Mining for Insight: Rediscovering the Data Archive
sponsored by Iron Mountain
WHITE PAPER: Uncover study results that highlight the struggles enterprises have with archiving their data. Discover how to implement a consistent approach to data archiving so that you can leverage your data and improve your customer service and revenue streams.
Posted: 16 May 2016 | Published: 30 Jun 2015

Iron Mountain

Understanding How IBM Spectrum Protect Enables Hybrid Data Protection
sponsored by IBM
WHITE PAPER: Moving to a hybrid cloud infrastructure is a no-brainer for many organizations as it provides greater efficiency and cost effectiveness. But, choosing a cloud services provider who provides the best data protection isn't as clear. Learn what to look for when architecting your hybrid cloud solution and how to best protect your backups.
Posted: 16 May 2016 | Published: 31 Aug 2015

IBM

Definitive Guide: Securing The Mobile Enterprise
sponsored by Aruba Networks
WHITE PAPER: Mobility, BYOD and cloud computing are changing the way people do work and this can quickly become a nightmare for security and IT managers. Access this white paper to learn how to handle the increasingly mobile workforce and turn mobility into a business advantage.
Posted: 16 May 2016 | Published: 04 May 2016

Aruba Networks

FAQ: ShareFile Cloud for Healthcare
sponsored by Citrix
WHITE PAPER: Answer your frequently asked questions regarding ShareFile Cloud, an enterprise file sync and sharing (EFSS) solution, and see its benefits for healthcare organizations. Access now to witness how your organization can manage patient files and meet HIPAA requirements with an EFSS service.
Posted: 16 May 2016 | Published: 31 Dec 2014

Citrix

The Need for Third Party Archiving
sponsored by Commvault
WHITE PAPER: Third-party email archiving solutions can address customer needs that basic archiving solutions, such as Microsoft's Office 365, can't achieve. Discover the benefits your enterprise can achieve with a third-party archiving solution, such as storage flexibility, advanced search capabilities, full audit of the archive and more.
Posted: 16 May 2016 | Published: 31 Mar 2015

Commvault

SOC Blog
sponsored by Citrix
RESOURCE: This report contains detailed information about the design and operation of shared file systems put in place to protect customer data. Access now to learn how you can provide greater customer security assurance.
Posted: 16 May 2016 | Published: 10 Mar 2016

Citrix

Five New Rules for Enterprise File Sync and Share Service Providers
sponsored by Citrix
RESOURCE: Because of those concerns, new rules for EFSS providers have been put in place. These rules provide security benefits to customer data while restricting access of files to EFSS providers.
Posted: 16 May 2016 | Published: 18 Nov 2014

Citrix

Assessing the Opportunities Presented by the Modern Enterprise Archive
sponsored by Druva Software
ANALYST REPORT: Discover business benefits your enterprise can achieve with a modern archive solution. In this report, discover how enterprise archive solutions evolved from simply being a site of preservation to driving business value through expanded archive funtionality. Additionally, realize the top 5 value proprositions of next-gen data archive solutions.
Posted: 16 May 2016 | Published: 30 Nov 2015

Druva Software

How ShareFile Works to Prevent Data Loss and Meet Compliance Requirements
sponsored by Citrix
RESOURCE: To prevent costly data leakage, data loss prevention tools must be integrated into your file sharing system. This will enable you to put restrictions on what information can leave your network giving you full visibility into your data's whereabouts. Learn more about content-aware sharing to better protect your organization.
Posted: 16 May 2016 | Published: 12 May 2015

Citrix

Computer Weekly – 17 May 2016: Countdown begins to new EU data protection rules
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, with the new EU data protection rules ready to become law, firms now have just two years to prepare – we assess the challenges. Manufacturing giant Rolls-Royce talks about why it moved its HR systems to the cloud. And we look back at 50 years of technology innovation in storage. Read the issue now.
Posted: 16 May 2016 | Published: 17 May 2016

ComputerWeekly.com

Why Move Backup and Disaster Recovery To The Cloud
sponsored by Druva Software
WHITE PAPER: Discover 20 real-world business reasons to move backup, archival, and disaster recovery (DR) to a unified cloud platform. See how public cloud can provide your enterprise with the reliability, security, and scalability you need to protect your disparate workloads.
Posted: 16 May 2016 | Published: 16 May 2016

Druva Software

Security and availability in extremely adverse environments
sponsored by Barracuda Networks
RESOURCE: Exalo Drilling chose a next-generation firewall to protect their growing infrastructure. The centralized management, application awareness and overall efficiency exceeded their expectations. Learn more about how their experience could benefit your organization's IT infrastructure.
Posted: 16 May 2016 | Published: 01 Apr 2016

Barracuda Networks

Making the Most of Hybrid Cloud for Future-Proofed Data Storage
sponsored by Equinix
PODCAST: Data storage experts, Jeff Kaplan, Domenic Steinbrueck, and Don Wiggins, discuss how hybrid cloud strategies can provide enterprises with infinite storage capacity that is secure and reliable. Access now to learn how to determine if a hybrid cloud infrastructure is best suited to meet your data management needs.
Posted: 16 May 2016 | Premiered: Apr 18, 2016

Equinix

Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud
sponsored by Equinix
WEBCAST: Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery (DR) solutions to protect important data. Access now to see how hybrid cloud DR can enable your enterprise to reduce RTO and RPO, recovery full systems or individual files, and more.
Posted: 16 May 2016 | Premiered: Apr 18, 2016

Equinix

8 Key Functions to Prevent Data Loss with User Behavior
sponsored by Exabeam
WHITE PAPER: User behavior analytics (UBA) provides the context needed to evaluate user behavior accurately and efficiently. It focuses on the user handling the data rather than the data itself. Learn how you can pair your DLP tools with UBA to best prevent data loss and exfiltration.
Posted: 16 May 2016 | Published: 01 Apr 2016

Exabeam

Overcoming 4 Key Challenges of Data Privacy
sponsored by Iron Mountain
WHITE PAPER: Data privacy must be protected on a continuous basis far beyond the requirements of passing compliance audits. Learn the 4 key challenges of data privacy and how to overcome them.
Posted: 13 May 2016 | Published: 01 Apr 2016

Iron Mountain

5-Step Guide For GDPR Compliance
sponsored by Druva Software
WHITE PAPER: This white paper shows you a 5-point plan to prepare your organization to meet the new needs of data protection regulations. Learn how to track the creation of new files on laptops and other mobile devices and automatically ensure that files containing customer data and PII are protected.
Posted: 13 May 2016 | Published: 01 Apr 2016

Druva Software

IT Guide: Protecting Corporate Data Beyond the Firewall
sponsored by Druva Software
WHITE PAPER: 24/7 data monitoring can ensure your important information stays on devices and on networks that you deem safe. Learn how to be proactive in your compliance requirements and stay on top of how your data is handled.
Posted: 13 May 2016 | Published: 01 Apr 2016

Druva Software

Critical Capabilities for Enterprise Endpoint Backup
sponsored by Druva Software
RESOURCE: Access this in-depth analysis of endpoint backup vendors, highlighting the differences in mobile device support, performance, backup frequency, scalability, security, and more. Ease your enterprise's decision-making process in determining the right endpoint backup service for your data.
Posted: 13 May 2016 | Published: 12 Nov 2015

Druva Software

Everything You Need to Know About Crypto Management
sponsored by Gemalto
WHITE PAPER: The best way to secure sensitive information is by placing safeguards around the data itself through encryption. Learn how to better manage your encrypted data to enable greater security enforcement and overall better efficiency.
Posted: 13 May 2016 | Published: 01 Apr 2016

Gemalto

Secur ing Productivity in the Border less Enterprise
sponsored by Microsoft
WHITE PAPER: The combination of cloud and mobility can allow for great employee productivity and greater customer responsiveness. However, these new business opportunities mean nothing if you can't protect against the new security challenges they bring.
Posted: 13 May 2016 | Published: 01 Apr 2016

Microsoft
226 - 250 of 2624 Matches Previous Page    8 9 10 11 12 13    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement