IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
26 - 50 of 2620 Matches Previous Page  |  Next Page
Top Reasons Why Customers Deploy Hybrid Storage
sponsored by TechData - EMC
WHITE PAPER: Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology.
Posted: 29 Nov 2016 | Published: 30 Apr 2016

TechData - EMC

Building Better Business Analytics to Improve BI
sponsored by Pyramid Analytics
RESOURCE: Many organizations struggle with inefficient, overly complex business intelligence processes that leave them with fragmented data and incomplete information. Discover a business intelligence platform that empowers users outside of IT to dive into data, with the security of a governed analytics environment.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

Pyramid Analytics

Protecting the Distributed Enterprise
sponsored by Fortinet, Inc.
WHITE PAPER: Discover how to protect your distributed enterprise without compromising data access. Uncover the 5 requirements for a distributed enterprise firewall.
Posted: 28 Nov 2016 | Published: 31 Oct 2016

Fortinet, Inc.

When "Free" is not Free: The True Costs of Open Source
sponsored by Rogue Wave Software
WEBCAST: In this webinar, director of product management and OSS expert, Richard Sherrard examines how to know exactly what packages are used in your company, specific technical, security, and licensing hurdles that many organizations face and What "free" actually means when it comes to OSS.
Posted: 28 Nov 2016 | Premiered: Oct 31, 2016

Rogue Wave Software

The Evolution of Cloud Security: Perception vs. Reality
sponsored by BitGlass
WHITE PAPER: This survey of over 2,200 cybersecurity professionals offers insight into both the current perception and the reality of cloud security. Access now to learn more about how security is catching up with cloud apps, and affecting areas like shadow IT, legacy security tools, popular business apps like Office 365, and more.
Posted: 28 Nov 2016 | Published: 28 Nov 2016

BitGlass

How Midmarket IT Leaders Can Improve Their Data Security
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: This Gartner report was put together to help midmarket organizations overcome their resource constraints and improve their security postures.
Posted: 28 Nov 2016 | Published: 13 Sep 2016

Arctic Wolf Networks, Inc.

EU data protection: Essential guide
sponsored by ComputerWeekly.com
EGUIDE: The European Union's General Data Protection Regulation (GDPR) comes into effect on 25 May 2018. GDPR will introduce new accountability obligations and stronger rights and restrictions on international data flows.
Posted: 24 Nov 2016 | Published: 24 Nov 2016

ComputerWeekly.com

The Future Of Data Security And Privacy: Growth And Competitive Differentiation
sponsored by Absolute
ANALYST REPORT: Data security and privacy is a competitive differentiator in today's data-centric business environments. In this Forrester report, learn how to put security closer to your data and gain that competitive advantage over your peers. Get greater visibility to control access to resources and watch user behavior diligently.
Posted: 22 Nov 2016 | Published: 07 Jul 2016

Absolute

The Evolution of Enterprise File Sync and Share
sponsored by ibm box
EGUIDE: Enterprise file sync and share (EFSS) tools have evolved significantly over the past few years. Given these changes, it can be difficult to know exactly which business needs any given tool will meet. Read on to gain an understanding of the changes happening in EFSS, the market, which deployment model is best for your organization, and more.
Posted: 22 Nov 2016 | Published: 16 Nov 2016

ibm box

Solving the DLP Puzzle: Learnings for a Successful Deployment
sponsored by Intel Security
PODCAST: What's steps do you take to implement a mature DLP solution? What are some of the best practices for long term DLP success? And how are data breaches evolving? In this podcast, a security industry veteran answers these questions and more so you can solve the DLP puzzle. Ensure successful DLP deployment now.
Posted: 22 Nov 2016 | Premiered: Sep 8, 2016

Intel Security

Secure Your Connected Medical Devices
sponsored by Zingbox
WHITE PAPER: Unprotected medical devices are the top security vulnerability for the healthcare industry. Access this fact sheet to discover how to protect your medical IT network and ensure operational continuity and reliability of all your connected medical devices.
Posted: 22 Nov 2016 | Published: 31 Oct 2016

Zingbox

Expert Report for Enterprise File Synchronization and Sharing
sponsored by ibm box
RESOURCE: 70% of today's EFSS destination vendors will cease to exist, be acquired or be put out of business by 2018. Access this expert report to learn how EFSS vendors need to evolve in order to survive. Find out which vendor best meets your business' EFSS needs and which ones will last.
Posted: 21 Nov 2016 | Published: 21 Jul 2016

ibm box

Three Mistakes IT Makes That Could Cost Your Organization Millions
sponsored by Globalscape
WHITE PAPER: IT teams are busy and there's little time for planning. When details get lost in the shuffle, mistakes happen that can carry a heavy price.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Globalscape

10 Reasons You Should Consider Commvault for Data Protection
sponsored by Commvault
WHITE PAPER: Discover how to make the right choices in data center backup and recovery software. You'll learn 10 reasons why choosing the right vendor is critical to your organization's future and how to be prepared for virtually every technology transition ahead.
Posted: 21 Nov 2016 | Published: 31 Oct 2016

Commvault

Resource Center: Stop Threats and Prevent Data Loss
sponsored by Intel Security
RESOURCE: Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
Posted: 21 Nov 2016 | Published: 30 Sep 2016

Intel Security

Resource Center: How to Safeguard Data
sponsored by Intel Security
RESOURCE: This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Intel Security

Best Practices for Ransomware Detection and Remediation
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Ransomware is a booming business for cybercriminals, and right now it's bigger than ever. Learn how ransomware attacks work and discover best practices to keep your files secure and your organization protected.
Posted: 18 Nov 2016 | Published: 31 Oct 2016

Arctic Wolf Networks, Inc.

Building a Next-Gen Storage Infrastructure for SaaS Applications
sponsored by NetApp
PODCAST: In this podcast, you will discover how to build a next-gen storage infrastructure for SaaS implementations, with a node-based architecture that can scale without impacting production workloads and the development cycle.Also, learn how integrated RAID-based data protection can eliminate workload disruption.
Posted: 17 Nov 2016 | Premiered: Nov 17, 2016

NetApp

Building a Next-Gen Storage Infrastructure for SaaS Applications
sponsored by NetApp
WEBCAST: Tune into this webcast to discover how to build a next-gen storage infrastructure for SaaS implementations, with a node-based architecture that can scale without impacting production workloads and the development cycle.Also, learn how integrated RAID-based data protection can eliminate workload disruption.
Posted: 17 Nov 2016 | Premiered: Nov 17, 2016

NetApp

Building a Next-Gen Storage Infrastructure for SaaS Applications
sponsored by NetApp
PRESENTATION TRANSCRIPT: Access this expert resource to discover how to build a next-gen storage infrastructure for SaaS implementations, with a node-based architecture that can scale without impacting production workloads and the development cycle.Also, learn how integrated RAID-based data protection can eliminate workload disruption.
Posted: 17 Nov 2016 | Published: 17 Nov 2016

NetApp

Guide to Encrypted Traffic Management
sponsored by Blue Coat Systems
WHITE PAPER: This short guide will help you understand how encrypted traffic is growing and how it's increasingly being exploited. Get tips on how to protect your SSL/TLS traffic, and learn how to effectively monitor your network traffic for potential intrusions.
Posted: 17 Nov 2016 | Published: 31 Oct 2016

Blue Coat Systems

Remote and Branch Offices: Leveraging Modern Storage and Data Centers
sponsored by Veeam Software
WHITE PAPER: This white paper explores how remote and branch offices (ROBOs) can build the modern data center, a highly virtualized environment that leverages up-to-date storage and has a cloud strategy in place. Uncover useful tips and options for setting up critical systems like backup, recovery, replication, and more.
Posted: 17 Nov 2016 | Published: 16 Nov 2016

Veeam Software

Demo video: How QRadar Works - IBM Security Intelligence and Analytics Whiteboard
sponsored by IBM
WEBCAST: This video shows you how to get greater network visibility and risk management out of your security solution. Discover how to instantly sense and detect a breach as it happens in real-time.
Posted: 16 Nov 2016 | Premiered: Feb 3, 2016

IBM

Comprehensive Protections for Cloud Networks
sponsored by Check Point Software Technologies Ltd.
WHITE PAPER: Uncover advanced threat prevention security for internal traffic inside a virtual infrastructure. Access now and explore scalability of security that adjusts to dynamic network changes, context-aware security policies that leverage security groups, and more.
Posted: 16 Nov 2016 | Published: 16 Nov 2016

Check Point Software Technologies Ltd.

Storage Outlook: Prepping for Upcoming Challenges and Opportunities
sponsored by Oracle Corporation UK Ltd
EBOOK: This e-book explores the outlook for storage technology, infrastructure, and management. Discover how to manage high volumes of data more efficiently, create cost-effective storage strategies for each tier, and prep for other developing challenges and opportunities that lie ahead.
Posted: 16 Nov 2016 | Published: 30 Jun 2016

Oracle Corporation UK Ltd
26 - 50 of 2620 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement