IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
26 - 50 of 2420 Matches Previous Page  |  Next Page
How Shannon Medical Center is Scaling VDI
sponsored by Pure Storage
WEBCAST: In this webcast, Mike Russell, Assistant IT Director at Shannon Medical, explains how VDI has enabled them to boost IT efficiency and patient care. Watch now to learn how to utilize flash storage to overcome the VDI I/O challenge and secure provider access to your desktops, clinical apps, and patient information.
Posted: 26 Apr 2016 | Premiered: Apr 26, 2016

Pure Storage

Solution Guide: Optimize VM Backup and Recovery
sponsored by Commvault
RESEARCH CONTENT: This brief resource highlights a VM backup and recovery solution that provides end-to-end VM backup, recovery, and cloud management. Access now to discover the features and benefits that your enterprise can leverage, including server virtualization and cloud-ready data management, integrated archiving and eDiscovery, and more.
Posted: 25 Apr 2016 | Published: 25 Apr 2016

Commvault

IBM 2015 Cyber Security Intelligence Index for Information and Communication
sponsored by IBM
WHITE PAPER: This white paper outlines cyber attack incidents of organizations in the information and communications industry. Access now to learn about past trends of cyber criminals and what to look for in the future of cyber crime.
Posted: 25 Apr 2016 | Published: 31 Dec 2015

IBM

Compliance Beyond Email: Navigating the Complexities within Healthcare
sponsored by Actiance
WHITE PAPER: This white paper explores how you can provide doctors and patients diverse communications coupled with strong compliance and data protection. Uncover 5 ways to mitigate legal and security risks in your healthcare organization.
Posted: 25 Apr 2016 | Published: 25 Apr 2016

Actiance

2015 Frost & Sullivan Asia-Pacific Intrusion Detection & PreventionVendor of the Year - IBM
sponsored by IBM
WHITE PAPER: This white paper shows you how greatly IDS/IPS is growing in Asia Pacific are other methods they are using to stay ahead of advanced threats. Access now to improve your organization's awareness of these threats and prepare yourself against sophisticated threats in the future.
Posted: 25 Apr 2016 | Published: 31 Dec 2015

IBM

2015 Gartner Group Magic Quadrant on Managed Security Services
sponsored by IBM
ANALYST REPORT: This Gartner report evaluates MSSPs to support global service requirements and leading-edge services.
Posted: 25 Apr 2016 | Published: 23 Dec 2015

IBM

Stop the Bad Guys Cold: Securing Your Mobile Data
sponsored by Commvault
WHITE PAPER: This white paper teaches you about the growing popularity of mobile endpoint solutions. They contain a spectrum of capabilities ranging from a simple solution set to a mobile protection platform. Access now to see critical security features that your solution set must have.
Posted: 22 Apr 2016 | Published: 31 Dec 2015

Commvault

Harness the Power of Array-Based Snapshots to Accelerate Backup and Recovery
sponsored by Commvault
DATA SHEET: This white paper highlights a snapshot management solution that streamlines and simplifies complex processes to make snapshots more valuable and effective at protecting and recovery data and applications. Read on to see how you can take advantage of this solution to unify your data protection and recovery across all storage tiers.
Posted: 22 Apr 2016 | Published: 22 Apr 2016

Commvault

A Foundation for Next-Generation Datacenter and Cloud-Based Security
sponsored by Citrix
WHITE PAPER: Your data is a constant target for cybercriminals. Not only are they coming up with new threats, but they are constantly improving the existing ones. With more technology at your fingertips, attackers have more choices. Access this white paper to learn about a security solution that covers your datacenter and the common attack avenues.
Posted: 22 Apr 2016 | Published: 29 May 2015

Citrix

Security essentials for CIO's enabling mobility - their device, your data
sponsored by IBM
WHITE PAPER: This white paper teaches you how to safely embark on your own BYOD program. The main goal is to show you how BYOD is a feasible option for your organization by seamlessly securing corporate data and applications on each devices while providing separation from personal activity and data.
Posted: 22 Apr 2016 | Published: 01 Mar 2016

IBM

An Overview of Today's Most Wanted Cloud Storage Features
sponsored by EMC
VIDEO: Tune into this video to watch Diana Gao, Senior Product Marketing Manager at EMC, illustrate the latest storage market trends, address existing challenges that IT managers face with traditional storage and public cloud management, and discover one cloud storage solution that can cater to all of your needs.
Posted: 22 Apr 2016 | Premiered: 24 Mar 2016

EMC

10 Questions to Ask Your Vendor about File Gateway Consolidation
sponsored by IBM
RESOURCE: When you embark on a file gateway consolidation project, there are hundreds of questions you may have considered—and many more that may not have even occurred to you. Read on to access 10 questions that will help you determine if a vendor's Managed File Transfer (MFT) offering is suitable.
Posted: 21 Apr 2016 | Published: 31 Dec 2015

IBM

How Healthcare Organizations Both Enable Mobile Users and Stay Compliant
sponsored by BlackBerry
WHITE PAPER: Discover how to stay HIPAA compliant even when mobile devices come into play. Read on to uncover insight for securing your enterprise and BYOD to protect sensitive data, and learn about containerization, application-wrapping, and more.
Posted: 21 Apr 2016 | Published: 21 Apr 2016

BlackBerry

Governing in the Cloud
sponsored by EMC
RESOURCE: The cloud is transforming IT and data storage, but government and large public organizations have obvious restrictions on how they can use the public cloud to store data. Access this microsite to how the government is benefiting from on-premise object storage.
Posted: 21 Apr 2016 | Published: 06 Apr 2016

EMC

Top Reasons to Choose EMC Isilon Scale-Out NAS
sponsored by EMC
WHITE PAPER: This white paper highlights 8 reasons why your enterprise should consider investing in a scale-out NAS solution with a single volume, single file system architecture. Access now and discover how you can improve your storage scalability, efficiency, and flexibility, and expand your data lake.
Posted: 21 Apr 2016 | Published: 31 Jan 2016

EMC

Next-Generation IPS in the Era of Targeted Attacks
sponsored by IBM
WHITE PAPER: This white paper talks about the future of IPS and gives you statistics from the current IPS market. Access now to learn about the features, capabilitie, costs and impacts of next-generation IPS and the future of cyberattacks in general.
Posted: 21 Apr 2016 | Published: 01 Jan 2016

IBM

Data Center Applications Standards Reference Guide: Networking and Storage
sponsored by CommScope
WHITE PAPER: In this technical white paper, discover a detailed overview of the most prevalent networking and storage applications in today's modern data centers. Additionally, read on to get instruction on computer clustering, SAN and server cabling, data security, and more.
Posted: 21 Apr 2016 | Published: 21 Apr 2016

CommScope

The Power of Collaboration with an Expiration Date
sponsored by BlackBerry
WHITE PAPER: This white paper teaches you about data-centric security which embeds persistent controls in your files so they are always protected no matter where they are shared. Access now and find out how you can protect your most important assets – your privacy and your business data.
Posted: 20 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Storage Analyst Discussion: The Shift to Array-Based Snapshots
sponsored by Commvault
VIDEO: In this webcast, Senior Storage Analyst, Dave Simpson, discusses the shift to array-based snapshots that integrate backup software and hardware to create a more efficient, holistic data protection solution. Watch now to see how you can manage all of your arrays under one platform and transform stagnant data into a business resource.
Posted: 20 Apr 2016 | Premiered: 07 Dec 2015

Commvault

Six Tools Users Need for Mobile Files And How to Provide Them Securely
sponsored by BlackBerry
WHITE PAPER: This white paper identifies and details the key tools users need and outlines what IT should consider in evaluating these products. Access now to discover how you can safely access, share, sync and collaborate on even the most sensitive files through any device.
Posted: 20 Apr 2016 | Published: 01 Mar 2016

BlackBerry

EMC ScaleIO: Software-defined, Scale-out SAN
sponsored by EMC
DATA SHEET: Growing infrastructures are a major challenge for data center operation teams. Access this data sheet to learn about a solution to keep your infrastructure from being what holds your business back.
Posted: 20 Apr 2016 | Published: 31 Jul 2015

EMC

Create a Solid Incident Response Plan and Respond to Threats Efficiently
sponsored by Dell SecureWorks
EGUIDE: In this e-guide, you will discover steps your organization should take in order to develop and implement a cybersecurity incident response plan. Access now to learn how to create overarching goals for your plan, determine the people in your organization who need to be involved and determine incident response triggers
Posted: 20 Apr 2016 | Published: 18 Apr 2016

Dell SecureWorks

Securing the Internet of Things: 6 Crucial Steps
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: Although a majority of large companies are actively working on Internet of Things (IoT) initiatives, data security continues to be a low priority for boards of directors. This resource explores the new security risks prompted by the IoT and reveals 6 crucial actions that CIOs need to take to counteract them.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

Hewlett-Packard Enterprise

Software-Defined Scale-Out NAS: Simple and Efficient Storage for Enterprise Edge Locations
sponsored by EMC
WHITE PAPER: This white paper discusses a software-defined storage solution with scale-out NAS that extends the data lake to enterprise edge locations. Read on to learn how this solution can reduce your costs and simplify management by consolidating your unstructured data, eliminating inefficient storage silos, and streamlining data protection.
Posted: 20 Apr 2016 | Published: 31 Jan 2016

EMC

Traditional Backup Vs. Modern Data Protection
sponsored by Commvault
WHITE PAPER: From this resource, you will compare traditional backup versus modern data protection, and discover a holistic, single platform approach that will protect your company's vital data. Read on to examine the advantages modern data protection offers over traditional backup.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

Commvault
26 - 50 of 2420 Matches Previous Page    1 2 3 4 5    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement