IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
226 - 250 of 2580 Matches Previous Page  |  Next Page
Case study - Cherokee Investment Co.
sponsored by Citrix
VIDEO: Secure file sync and sharing is of high importance to every business. When a massive amount of information is being shared on a daily basis, maintaining security can seem like a full-time job. Watch this video now to learn how one investment company enabled secure file sharing and mobility to meet the collaboration needs of users.
Posted: 13 May 2016 | Premiered: 23 Feb 2015

Citrix

Your Software: Does the End Justify the Business Value Means?
sponsored by Commvault
WHITE PAPER: Explore important productivity issues and offers tips for enhancing your approach to data management and protection. Learn how to improve your administrative, IT task, and organization productivity with a data management software solution.
Posted: 13 May 2016 | Published: 13 May 2016

Commvault

Making the Most of Hybrid Cloud for Backup and Archiving
sponsored by Equinix
WEBCAST: Data storage experts discuss the approach of implementing a cloud backup and archive solution to improve data reliability and recovery in today's world of big data. Access now to see how your enterprise can achieve a greater amount of utility and flexibility when it comes to capturing and utilizing your data, without risking security.
Posted: 13 May 2016 | Premiered: Apr 18, 2016

Equinix

Data Backup and Disaster Recovery Made Simple
sponsored by SimpliVity
EGUIDE: This e-guide highlights several backup software products that are evolving to include DR functionality. Read on to learn how your enterprise can integrate DR into your backup systems with cloud.
Posted: 12 May 2016 | Published: 10 May 2016

SimpliVity

Staying out of the next Data Breach Headline
sponsored by Intel Security
VIDEO: Learn about outbound data protection as your last line of defense against data exfiltration. Discover how you can achieve greater DLP, disk encryption and device control to from wherever your data lives.
Posted: 12 May 2016 | Premiered: 28 Apr 2016

Intel Security

Endpoint Encryption Keeps Your Data Safe
sponsored by Intel Security
WHITE PAPER: Discover customizable solutions to keep your enterprise data safe using endpoint encryption. Confidently ensure consistent and persistent data protection across all your network devices with a proven solution that allows you to secure data on office desktop PCs, Macs, mobile laptops, VDI workstations.
Posted: 12 May 2016 | Published: 01 Apr 2016

Intel Security

Making the Most of Hybrid Cloud for Future-Proofed Data Storage
sponsored by Equinix
WEBCAST: Data storage experts discuss how the right hybrid cloud solution, if implemented successfully, can provide infinite storage capacity that is secure and reliable. Access now to learn what characteristics you need in a hybrid cloud infrastructure to meet your data management needs.
Posted: 12 May 2016 | Premiered: Apr 18, 2016

Equinix

IT Security Vendor Analysis by Bizety
sponsored by Distil Networks
WHITE PAPER: This white paper examines five major vendors and evaluates their security solutions. Learn how well they can coordinate their systems to successfully secure your web infrastructure and online data.
Posted: 12 May 2016 | Published: 01 Apr 2016

Distil Networks

Top 10 Data Protection Time Wasters
sponsored by Commvault
RESOURCE: This brief infographic highlights the top 10 data protection time wasters and offers tips for preventing these hurdles. Access now to learn how you can implement a more efficient data protection solution in your enterprise.
Posted: 12 May 2016 | Published: 31 Dec 2015

Commvault

Barracuda Backup: An All-In-One Cloud Integrated Solution
sponsored by Barracuda Networks
VIDEO: This lighthearted video introduces an all-in-one, cloud-integrated, backup solution. Watch now to see how you can protect your physical and virtual environments with an easy, cost-efficient solution.
Posted: 11 May 2016 | Premiered: 10 Jul 2015

Barracuda Networks

Case Study: San Mateo Credit Union Reduces Backup Footprint with a Unified Data Protection Appliance
sponsored by arcserve
CASE STUDY: This brief case study showcases how San Mateo Credit Union implemented a unified data protection appliance that provided them with space and cost savings. Access now to see how you can protect all your machines under one solution and ensure an efficient data recovery process.
Posted: 11 May 2016 | Published: 31 Dec 2015

arcserve

Plan for Hybrid Data Protection Media
sponsored by Druva Software
WHITE PAPER: Learn how to implement a hybrid data protection media strategy that will enable your enterprise to achieve the agility needed to meet today's storage demands - all within your budgetary limits, of course. Read on to discover how the combination of tertiary disk, cloud, and tape can result in a foolproof data protection strategy.
Posted: 11 May 2016 | Published: 31 Jan 2016

Druva Software

IBM QRadar - Sense and Detect Modern Threats with the Most Sophisticated Security Analytics Platform
sponsored by IBM
WHITE PAPER: This white paper shows you how to "sense" chains of malicious activities and rapidly deploy security tools across your entire network including cloud-based resources. Access now to greatly improve your remediation efforts and minimize potential damage to your organization.
Posted: 11 May 2016 | Published: 01 Apr 2016

IBM

Eliminate On-Premise Tape Management with Cloud-Based Data Protection
sponsored by Iron Mountain
WHITE PAPER: This brief white paper highlights a scalable, secure cloud-based data protection solution that eliminates the need for on-premise tape backup. See the benefits this software can provide to your enterprise, such as modernized backup and recovery, cost-efficient data replication, reliable network connection, and more.
Posted: 11 May 2016 | Published: 11 May 2016

Iron Mountain

Snapshot Management & Replication: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: Access this white paper for a checklist that will enable your enterprise to determine the 'must-have" features needed for snapshots to deliver what you require in your application environment or private cloud. See how you can realize the full potential of snapshots.
Posted: 11 May 2016 | Published: 31 Dec 2015

Commvault

Infographic: Principles of Data Management
sponsored by Commvault
RESOURCE: In this infographic, discover seven essential principles for providing a true, holistic data protection. Read on to access this checklist so that your enterprise can advance your data management strategy for the future.
Posted: 10 May 2016 | Published: 31 Dec 2015

Commvault

Making the Case for a Hybrid Backup Strategy
sponsored by Iron Mountain
WHITE PAPER: This white paper highlights a cost-effective hybrid backup and recovery solution that combines cloud network-based replication with tape-based archiving. Read on to see how you can ensure high levels of security and compliance without a hybrid data protection solution that won't raise your overall data costs.
Posted: 10 May 2016 | Published: 10 May 2016

Iron Mountain

Leveraging the Public Cloud for Enterprise Data Protection
sponsored by Druva Software
WHITE PAPER: In this white paper, discover how to leverage the public cloud for data backup, archiving, and disaster recovery. See how the cloud can enable your enterprise to not only improve the efficiency, reliability, and security of your enterprise, but also boost your total cost of ownership and save on your data protection strategy.
Posted: 10 May 2016 | Published: 10 May 2016

Druva Software

A Secure, IT-approved Alternative to Personal File Sharing Services in the Enterprise
sponsored by Citrix
WHITE PAPER: Personal file sharing invites data leakage and compliance violations by allowing files being shared to escape beyond IT's control. Simply blocking network access of personal file sharing services is no longer a viable option. Learn how enterprise-ready file sharing solutions exceed employee needs while securing and mobilizing business data.
Posted: 10 May 2016 | Published: 31 Dec 2015

Citrix

The Demand for Hybrid Online File Sharing Solutions
sponsored by Citrix
RESEARCH CONTENT: Learn about the overwhelming need for online file sharing and collaboration (OFS) solutions, approaches being taken to providing alternative solutions, and what is prompting so many enterprises to search for the solution that best suits their needs.
Posted: 10 May 2016 | Published: 31 Dec 2014

Citrix

Transforming the Data Center: SimpliVity delivers hyperconverged platform with native data protection
sponsored by SimpliVity
ANALYST REPORT: This report shows you from real world experiences how hyperconvergence not only compresses and stores data, but also thoroughly protects it. Learn how you can eliminate your traditional data protection tools and replace them with an all-in-one storage option.
Posted: 10 May 2016 | Published: 01 Jan 2016

SimpliVity

Server Backup: A Premier, Automated Cloud Backup Solution
sponsored by Iron Mountain
WHITE PAPER: This white paper highlights a cloud backup solution that automates the backup process with features such as continuous data protection, flexible retention settings, security that goes beyond data encryption, and an optional local appliance for faster restorations. Access now to learn how your enterprise can enhance your backup.
Posted: 10 May 2016 | Published: 31 Dec 2014

Iron Mountain

Threat Defense Isn't Just About Detection: It's How Your Respond
sponsored by Intel Security
WHITE PAPER: EDR can mitigate threats before they impact your organization. Discover 5 key factors to look for when researching EDR to best determine which solutions are most proactive in helping to prevent attacks.
Posted: 10 May 2016 | Published: 31 Dec 2015

Intel Security

Cloud Storage: The New Black in Tiered Data Protection
sponsored by Iron Mountain
RESOURCE: In this infographic, discover how to ease the adoption of a cloud-based tiered data storage with the help of a secure, reliable cloud storage provider. With a provider, your enterprise can build a cost-effective and secure tiered data protection strategy, leverage existing investments in data protection, and more.
Posted: 10 May 2016 | Published: 31 Dec 2015

Iron Mountain

Making the Case for Cloud-to-Cloud Backup
sponsored by Datto, Inc.
WHITE PAPER: Learn the importance of backing up cloud storage with a layered approach that integrates efficient data management processes, SaaS application training, robust password policies, and automated backup. Discover how you can ensure your information is secure and readily available whenever you need it.
Posted: 12 May 2016 | Published: 11 Dec 2015

Datto, Inc.
226 - 250 of 2580 Matches Previous Page    8 9 10 11 12 13    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement