IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
51 - 75 of 2461 Matches Previous Page  |  Next Page
Traditional Backup Vs. Modern Data Protection
sponsored by Commvault
WHITE PAPER: From this resource, you will compare traditional backup versus modern data protection, and discover a holistic, single platform approach that will protect your company's vital data. Read on to examine the advantages modern data protection offers over traditional backup.
Posted: 20 Apr 2016 | Published: 20 Apr 2016

Commvault

Analyst Perspective: How Smart Businesses Use the Cloud
sponsored by Commvault
VIDEO: In this webcast, expert analyst Lauren Nelson discusses the rise of cloud adoption. Discover how cloud and virtualization can enable your enterprise to implement a holistic data protection and disaster recovery approach that can enable you to secure all of your applications and data under a single platform.
Posted: 19 Apr 2016 | Premiered: 08 Feb 2016

Commvault

Cybersecurity for the Digital Age: The Essential Guide
sponsored by Dimension Data
WHITE PAPER: In this resource, discover what the future of cybersecurity has in store, as well as how it's catalyzing significant transformation in today's digital enterprises. Read on to learn why organizations are shifting their cybersecurity strategies from reactive to agile, and more.
Posted: 19 Apr 2016 | Published: 12 Apr 2016

Dimension Data

Deploying an EFSS Solution: Six Steps for Success
sponsored by BlackBerry
WHITE PAPER: This white paper outlines the shortest path to implementing Enterprise File Synchronization and Sharing (EFSS) while protecting your organization against loss incidents. You'll learn that the process, not the technology, drives successful EFSS implementation and six steps to deploy EFSS with optimal security controls.
Posted: 19 Apr 2016 | Published: 01 Mar 2016

BlackBerry

Why Enterprises Need Trustworthy Data
sponsored by IBM
WHITE PAPER: In this e-book, information governance expert Paula Wiles Sigmon discusses what enterprises are doing to improve the quality of their data, who should be responsible for data that goes in and out of an enterprise data warehouse, and the emerging role of the chief data officer. Gain tips on how you can foster confidence in your data.
Posted: 18 Apr 2016 | Published: 30 Jun 2014

IBM

Developing Data Integration and Lifecycle Management Strategy for a Hybrid Environment
sponsored by IBM
WHITE PAPER: Examine the four pillars for successful information governance in hybrid environments and how to implement a successful integration and lifecycle strategy. Access now to see how you can improve the reliability, flexibility, and scalability of your data integration, management, security, and analytics solutions.
Posted: 18 Apr 2016 | Published: 30 Apr 2015

IBM

HEIDELBERG Simplifies Backups and Restores Flexibility
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Access this case study to learn how one printing press manufacturer combined hardware and software to better align its IT and business goals with its backup needs.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

Hewlett Packard Enterprise

Tracking the Most Significant Cyber Threat
sponsored by OpenDNS
WEBCAST: This webcast shows you steps you can take to better protect your organization and reduce the risk of ransomware infections.
Posted: 18 Apr 2016 | Premiered: Mar 30, 2016

OpenDNS

Backup Solution Vendors: Reviews from the Tech Community
sponsored by Hewlett Packard Enterprise
WHITE PAPER: With enterprise technology, you can't simply rely on the word of vendors. Access this list of user reviews to hear what your peers objectively think about various data backup and protection solutions.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

Hewlett Packard Enterprise

Avoid becoming the catch of the day: Four steps to combat phishing attacks
sponsored by Imprivata
WHITE PAPER: Phishing has emerged as the top security threat facing healthcare organizations. Access this white paper now for 4 steps you can take to better prepare for and defend against phishing attacks while maintaining a balance between security and clinical workflow efficiency.
Posted: 18 Apr 2016 | Published: 01 Mar 2016

Imprivata

Visual Analytics: Easily Explore Data to Make Decisions You Can Trust
sponsored by TIBCO Software Inc.
WHITE PAPER: Many organizations are looking to invest in analytics tools to empower business users, but expert users still need analytics capabilities to fulfill more complex tasks. Discover a visual analytics platform that can support the needs of business users, advanced data scientists, and everyone in between.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

TIBCO Software Inc.

Experts Discuss the Benefits of Unified Virtual Server Data Protection
sponsored by Commvault
WEBCAST: In this webcast, storage experts Jason Buffington, Arrian Mehis, and Robbie Wright discuss the benefits of a unified virtual server data protection solution that enables disaster recovery as a service (DRaaS). See how a unified virtual approach can provide your enterprise with the security you need.
Posted: 15 Apr 2016 | Premiered: Dec 9, 2015

Commvault

Consider Security in your Daily Business Operations
sponsored by IntraLinks, Inc
EGUIDE: This e-guide teaches you the importance of collaboration on a micro level for defending your organization against cyber threats. Learn how to embed security practices in your daily business practices and embrace a flexible mindset as your business needs change.
Posted: 15 Apr 2016 | Published: 06 Apr 2016

IntraLinks, Inc

Case Study: St. Luke's Uses Flash Storage for its Mission Critical EHR Software
sponsored by Pure Storage
VIDEO: This brief webcast discusses St. Luke's implementation of a flash-array storage system that enabled them to access their patient information rapidly and efficiently. Watch now to see how you can simplify and secure your infrastructure and deliver better care to your patients with high-performing flash storage.
Posted: 15 Apr 2016 | Premiered: 15 Apr 2016

Pure Storage

A Mobile Device Management Platform for the Modern Enterprise
sponsored by IBM MaaS360
DATA SHEET: Discover in this data sheet how to leverage an easy-to-use cloud platform to enforce end-to-end management of all mobile devices in your enterprise. Seamlessly integrate this cloud-based mobility management with your infrastructure and equip yourself with its MDM essentials.
Posted: 15 Apr 2016 | Published: 15 Apr 2016

IBM MaaS360

Case Study: NTT Communicatiosn Delivers Object Storage to Enterprise Cloud Service
sponsored by Cloudian
WHITE PAPER: This case study highlights a telecom company's decision to replace their outdated distributed file storage system with a robust object storage platform designed for hybrid cloud infrastructures. Read on to discover the benefits this solution could provide your enterprise, including reduced acquisition costs, configurable replication, and more.
Posted: 15 Apr 2016 | Published: 31 Dec 2015

Cloudian

AirWatch EMM gets Windows 10 support, security
sponsored by VMware
EGUIDE: This e-guide teaches you the benefits of integrating AirWatch into your business operations as well as the Privacy First polity that AirWatch abides by. Access now to learn how AirWatch can add great convenience to your organization, while not encroaching into users' personal information.
Posted: 14 Apr 2016 | Published: 12 Apr 2016

VMware

Three ways AirWatch secures mobile Office365 applications
sponsored by VMware
EGUIDE: This e-guide shows how you can better manage busienss applications on BYOD and corporate-owned mobile devices. Learn how to encrypt important organizational information and lock down apps across all personal, mobile devices.
Posted: 14 Apr 2016 | Published: 11 Apr 2016

VMware

VMware identity management adds SSO to AirWatch
sponsored by VMware
EGUIDE: This e-guide shows you how to better manage network access from mobile devices with a single sign-on (SSO) application. Access now to gain better security across all your remote locations while also adding ease of access for authorized users.
Posted: 14 Apr 2016 | Published: 11 Apr 2016

VMware

The Changing Landscape of Data Usage
sponsored by Commvault
VIDEO: In this webcast, TechTarget storage experts, Jillian Coffin and Jonathan Brown, discuss the changing landscape of data usage and the pressing need for holistic data protection. Watch now to see how one platform can overcome the challenges of today's big data environments and protect your data intelligently.
Posted: 14 Apr 2016 | Premiered: 16 Oct 2015

Commvault

Managed file transfer: Minimizing risk and strengthening compliance in data exchange
sponsored by IBM
WHITE PAPER: This white paper teaches you about managed file transfer and how it can help you meet increasing customer demands. Access now and learn how to create seamless customer experiences across your value chain and synchronize your business to become more secure, compliant and efficient.
Posted: 14 Apr 2016 | Published: 31 Dec 2013

IBM

Network security stack: How and why to consider adding new layers
sponsored by OpenDNS
EBOOK: This e-book teaches you about new tools to fully protect your employees wherever they go. Discover a cloud-delivered security that shores up your defenses and gets in front of attacks even as they increase in sophistication.
Posted: 14 Apr 2016 | Published: 01 Mar 2016

OpenDNS

Three Considerations for Modernizing Data Protection
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this report, you'll learn why backup is the cornerstone of a data protection strategy. Access now to uncover what you can do to ensure top security initiatives are met with solid data protection and backup policies, along with other top IT concerns.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

Hewlett Packard Enterprise

Case Study: API Gateway Secures Public APIs and Minimizes Costs
sponsored by Axway
CASE STUDY: APIs can help enterprises roll out apps quickly, but exposing them to third parties can create security issues. In this case study, discover the API gateway that enabled the energy supplier First Utility to secure their publicly available APIs, optimize performance and scalability, and accelerate time to market.
Posted: 13 Apr 2016 | Published: 31 Dec 2015

Axway

Future Proof your Data Storage with the Hybrid Cloud
sponsored by Equinix
WHITE PAPER: This white paper highlights one hybrid cloud platform with customizable end-to-end data center and cloud storage solutions. Read on and discover how this solution can provide your enterprise with secure storage for your mission-critical data and simplified backup and archiving.
Posted: 13 Apr 2016 | Published: 13 Apr 2016

Equinix
51 - 75 of 2461 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement