IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
226 - 250 of 2392 Matches Previous Page  |  Next Page
Optimizing Web Application Security for the New Bad Bot Threat Landscape
sponsored by Distil Networks
WHITE PAPER: Winning in today's bot battlefield takes time, expertise, and a dedicated team. In this white paper, get a glimpse into the world of anti-bot defenses and win the battle of the bots on your site.
Posted: 07 Jun 2016 | Published: 01 May 2016

Distil Networks

Understand the Business Impact and Cost of a Breach
sponsored by MASERGY
ANALYST REPORT: This Forrester Report will help security and risk leaders build a case for investment to show business leaders what kind of investment it'll take to adequately protect their organization.
Posted: 07 Jun 2016 | Published: 12 Jan 2015

MASERGY

Next Generation Cybersecurity: The Age of Artificial Intelligence
sponsored by MASERGY
WEBCAST: Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.
Posted: 06 Jun 2016 | Premiered: May 1, 2016

MASERGY

Masergy UES Offers Unique Approach to Network Defense
sponsored by MASERGY
ANALYST REPORT: Instead of applying a one-size-fits-all approach, multi-stage machine learning analysis detects events differently on different networks. Learn how this security strategy can find predictable patterns on your network and methods that work best for it.
Posted: 06 Jun 2016 | Published: 11 Nov 2015

MASERGY

EMC VNX and VNXe Family with Veeam Availability Suite
sponsored by Veeam Software
WHITE PAPER: Learn how Veeam Availability Suite v9 is designed to provide enhanced availability with storage snapshots for backup, replication, and recovery tasks. This white paper covers the issues you can expect to solve by integrating this technology, and how to connect it to a storage array.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Veeam Software

Backup & Replication for Linux OS
sponsored by Veeam Software
ESSENTIAL GUIDE: Discover a guide on how to successfully integrate and configure a backup and replication solution with Linux operating systems and virtual machines. Learn how you can ensure your enterprise performs transaction-consistent backups and full VM file restorations.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Veeam Software

Veeam withCisco UCS C240Configuration Guide
sponsored by Veeam Software
ESSENTIAL GUIDE: Discover a backup and replication solution that can increase the value of your backup and reinvent data protection in your virtual environments. This technology can enable your enterprise to benefit from features such as source-side deduplication and compression, parallel processing, 24/7 application availability, and more.
Posted: 31 May 2016 | Published: 31 May 2016

Veeam Software

SQL Server: Data Best Practices
sponsored by Tegile
ESSENTIAL GUIDE: Download this guide to learn how to avoid the common pitfalls of deploying and maintaining SQL Server and accommodate the most demanding workloads by integrating all-flash for accelerated database performance. Additionally, learn how to leverage the SAN array and database engine for effective data replication, transaction log backup, and DR.
Posted: 25 May 2016 | Published: 31 May 2016

Tegile

Understanding the Impact of Flash Storage in Healthcare Environments
sponsored by Pure Storage
WEBCAST: Storage experts discuss how to increase provider productivity and enable more patient visits with fast, reliable, flash storage. Discover how flash storage can provide your healthcare organization with the performance and storage flexibility you need to provide secure access to your data anywhere, at any time.
Posted: 20 May 2016 | Premiered: May 20, 2016

Pure Storage

Grand Theft Data – Data Exfiltration Study: Actors, Tactics, and Detection
sponsored by Intel Security
WHITE PAPER: DLP tactics & tools only work if you know how to use them properly. This data exfiltration study reveals the security tools, response plans and awareness training required to protect your infrastructure and prevent major losses.
Posted: 19 May 2016 | Published: 31 Dec 2015

Intel Security

5 Tips to Help Protect Your Data
sponsored by Intel Security
WHITE PAPER: Modern DLP needs to be rapidly incremental, focusing on derived value, successful preventative actions and increasing the risk threshold. Inside this white paper, you'll learn 5 key requirements to ensure your data protection efforts are successful.
Posted: 19 May 2016 | Published: 01 Apr 2016

Intel Security

Korott Labs Implement Next Gen Firewalls for Security and Reliability
sponsored by Barracuda Networks
RESOURCE: In this case study, find out how a large pharmaceutical and cosmetics laboratory, fulfilled their need to connect their offices and logistics warehouses with next-generation technologies. Discover how a new generation of systems offered all the network security, robustness, and flexibility the business needed.
Posted: 19 May 2016 | Published: 01 Apr 2016

Barracuda Networks

BYOD allows hackers an easy access point to corporate data
sponsored by IBM
WHITE PAPER: You need to modernize your security with a robust way to proactively detect, analyze and remediate new mobile threats. Learn the true cost of a data breach and how to best implement your own BYOD policy.
Posted: 18 May 2016 | Published: 31 Dec 2015

IBM

Obey these 10 BYOD golden rules
sponsored by IBM MaaS360
WHITE PAPER: Bring your own device (BYOD) is the facet of mobility that is leaving many organizations feeling vulnerable. Here are ten rules, each broken down, to keep you on the right track to taking full advantage of all that mobility has to offer.
Posted: 18 May 2016 | Published: 31 Mar 2016

IBM MaaS360

Forward Thinking Backup Through Unified Data Protection
sponsored by Veritas
WHITE PAPER: This white paper highlights a unified backup and recovery solution that manages workloads on multiple physical, virtual, and cloud platforms. Read on to see how this converged platform can enable your enterprise to manage and protect mixed workloads across your enterprise and reduce administration and infrastructure costs.
Posted: 18 May 2016 | Published: 18 May 2016

Veritas

Six Steps to Controlling the Uncontrollable
sponsored by Microsoft
WHITE PAPER: With a next-generation enterprise mobility strategy, you can empower your people to be productive on the devices of their choosing -- all while staying secure. Explore six ways to protect the relentless data streams of a mobile enterprise.
Posted: 18 May 2016 | Published: 01 Apr 2016

Microsoft

Controlling the Uncontrollable: Why You Need to Enable, Protect, and Manage Mobile
sponsored by Microsoft
WHITE PAPER: This guide details how you can ensure a productive and secure mobile workplace through enterprise mobility management. Learn how to control what once seemed uncontrollable now.
Posted: 18 May 2016 | Published: 11 May 2016

Microsoft

Evaluating Recovery-in-Place Strategies for Data Protection
sponsored by Veritas
EGUIDE: Inside this exclusive data protection guide, explore a detailed breakdown of recovery-in-place technology, its top use cases and three key considerations to keep in mind when evaluating data protection techniques.
Posted: 09 Jun 2016 | Published: 07 Jun 2016

Veritas

Evolving Backup Software Reduces the Necessity Of Archiving
sponsored by Veritas
EGUIDE: Access this exclusive guide to learn about the future of data backup and archiving, and the circumstances that determine whether the two should remain separate processes or not.
Posted: 09 Jun 2016 | Published: 03 Jun 2016

Veritas

Emerging security threats you're up against now
sponsored by Intel
EGUIDE: Cybercrime is now a fully functional industry with "Hacking as a Service" being a top product. Services are cheaper and more sophisticated than ever. This e-guide shows you top emerging cyber threats that could be harming your system soon.
Posted: 06 Jun 2016 | Published: 25 May 2016

Intel

Facing Network Breach Threats, Visibility Is Key
sponsored by Intel
EGUIDE: If the past three years have taught network managers anything, it's that everyone is vulnerable to a network breach by cybercriminals. Andy McInerney, data network and voice manager at Penn Mutual, one of the oldest mutual life insurance companies in the US, reveals what his business is doing to stop it.
Posted: 26 May 2016 | Published: 17 May 2016

Intel

Streamline Your Financial Data Planning to Improve Efficiency
sponsored by IBM
RESOURCE: As market conditions continue to shift, it's more important than ever to minimize time spent managing data. Discover real-time analytics that allow you to link operational changes to financial results, so you can identify and influence key drivers of costs, sales, and revenue.
Posted: 23 May 2016 | Published: 23 May 2016

IBM

Add Flexibility to Your Storage with SDS
sponsored by IBM
EGUIDE: This e-guide explores software-defined storage (SDS) as a method for managing and protecting long-term data. Read on to see how SDS can provide your enterprise with an added layer of flexibility for long-term data preservation.
Posted: 23 May 2016 | Published: 19 May 2016

IBM

10 Characteristics of a HIPAA-Compliant ePHI Application
sponsored by Coalfire
WHITE PAPER: The root cause of HIPAA-compliance gaps often lies in application software that is not HIPAA-compliant – the software simply lacks the required or implied security functionality. Uncover the 10 security requirements of a HIPAA-compliant ePHI app.
Posted: 19 May 2016 | Published: 19 May 2016

Coalfire

Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud
sponsored by Equinix
PODCAST: Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery solutions to protect important data. Access now to see how hybrid cloud DR and BC can enable your enterprise to efficiently recover full systems and implement automatic backups that can reduce your RPO and RTO.
Posted: 18 May 2016 | Premiered: Apr 18, 2016

Equinix
226 - 250 of 2392 Matches Previous Page    8 9 10 11 12 13    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement