IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
51 - 75 of 2285 Matches Previous Page  |  Next Page
Key Considerations For Protecting Data on All-Flash Arrays
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper argues how flash-integrated flat backup protects data better and is more efficient than traditional backup methods. Read on to learn how data protection can be a function of primary storage, eliminating the need for traditional backup.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Hewlett-Packard Limited

Evolving Data Protection For Business Critical Applications
sponsored by Hewlett-Packard Limited
WHITE PAPER: This white paper details how converged data protection can provide effective backup and recovery data without disruptions. Read on to learn how converged data protection combines availability with remote snapshots and backups to increase reliability without increasing costs.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Hewlett-Packard Limited

Keep Data Secure in Today's High-Risk Environment
sponsored by Hewlett-Packard Limited
VIDEO: This video discusses how you can adopt data protection that provides the security you need in today's high-risk environment.
Posted: 25 Aug 2015 | Premiered: 31 Dec 2014

Hewlett-Packard Limited

Streamlining Data Backup and Recovery
sponsored by Hewlett-Packard Limited
VIDEO: This video breaks down a storage platform than can provide a centralized approach to data backup and recovery. Tune in to learn how this platform can help you manage copies, snapshots, replication, and more.
Posted: 25 Aug 2015 | Premiered: 25 Aug 2015

Hewlett-Packard Limited

Flash Array for Better Performance and Data Protection
sponsored by IBM
WHITE PAPER: This white paper shows how flash arrays are best for improving performance and protecting data. Read on to learn about the features of one particular flash array and how it performs in comparison to hard disk drives.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

IBM

How to Secure Data While Improving Storage Performance
sponsored by IBM
WHITE PAPER: Access this white paper to see how one financial services company was able to improve storage performance and security by implementing an all-flash array. Read on and learn how your company can also achieve lowered latency, consistent performance of financial applications, and more.
Posted: 24 Aug 2015 | Published: 31 Jul 2014

IBM

Data Center Protection for the Growing Data Environment
sponsored by Hewlett-Packard Limited
VIDEO: This brief video describes how you can adopt a data protection strategy that will keep your data secure and enable you to meet SLAs without increasing cost or complexity. Tune in now to discover how you can protect more data more efficiently and with less money.
Posted: 24 Aug 2015 | Premiered: 24 Aug 2015

Hewlett-Packard Limited

The Data-Driven Organization: How to Unlock Greater Value from Data
sponsored by Commvault
WHITE PAPER: This white paper explores today's data management challenges in the context of the 3rd Platform, particularly around cloud and Big Data/analytics, and explains how organizations can drive real value from their data.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault

Why Mobile Security Matters
sponsored by Lookout
WHITE PAPER: This white paper discusses the five critical questions modern CISO's are asking about mobile security.
Posted: 24 Aug 2015 | Published: 12 Aug 2015

Lookout

Fort Knox or House of Cards: What Did Our Data Protection Survey Reveal?
sponsored by arcserve
WHITE PAPER: This white paper discusses the prevalence of flawed data protection strategies, drawing on survey results to show just where the average organization stands and how it needs to improve.
Posted: 21 Aug 2015 | Published: 21 Aug 2015

arcserve

Bring Archiving and Compliance to Your Office 365 Environment
sponsored by Commvault
WHITE PAPER: This white paper discusses the benefits of partner software that can bring better archiving and reporting capabilities to your Office 365 environment.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Commvault

Simplify Backup Using Disk Imaging
sponsored by Acronis
WHITE PAPER: This white paper outlines how to use disk-imaging to backup and recover your data. Read on to learn about the benefits of this simplified backup process.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Acronis

Hybrid Storage for Backup and Data Protection
sponsored by Quantum Corporation
WHITE PAPER: This white paper introduces the convenience and flexibility of using hybrid storage for your data backups.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Quantum Corporation

Strong Authentication for Secure Employee Access
sponsored by Gemalto
WHITE PAPER: This white paper describes how to enable two-factor authentication to all users and resources using a single automated backend—either from the cloud or on-premises. Download now to see how your organization could benefit from strong authentication.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Gemalto

Strong Authentication: Securing Identities and Enabling Productivity
sponsored by Gemalto
WHITE PAPER: Access this informative white paper to learn how strong authentication methods like USB tokens and smart cards are helping organizations to stay ahead of the security curve.
Posted: 20 Aug 2015 | Published: 20 Aug 2015

Gemalto

Data Sovereignty and the Cloud
sponsored by IntraLinks, Inc
WEBCAST: In this webinar, security experts discuss exactly what the cloud means for compliance and data protection.
Posted: 20 Aug 2015 | Premiered: May 21, 2015

IntraLinks, Inc

Solutions enhance compliant digital identity protection for healthcare
sponsored by VASCO Data Security International
WHITE PAPER: Learn the key building blocks of a secure, compliant healthcare system, and how to solve security problems such as identity proofing, HIPAA and HITECH Act compliance, secure access to data, and more.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

VASCO Data Security International

Urgency Grows for Automated Archiving Capabilities
sponsored by Commvault
WHITE PAPER: This white paper outlines the importance for automated archiving, and how it can help reduce the resources used to manage data. Read on to learn about what options organizations are considering for archiving, and why archiving should be incorporated into a comprehensive, enterprise-wide information management framework.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

Commvault

What You Need to Know Now About Next Generation Data Protection Architecture
sponsored by arcserve
WHITE PAPER: This white paper walks you through the driving forces behind rapidly evolving data protection architectures, the trends you'll want to keep an eye on, and more.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

arcserve

Data Sovereignty and the Cloud
sponsored by IntraLinks, Inc
WHITE PAPER: This white paper discusses the complex issue of achieving data sovereignty without sacrificing the benefits of the cloud.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

IntraLinks, Inc

5 Fundamentals of Virtual Server Protection
sponsored by Commvault
WHITE PAPER: Server virtualization has its benefits – and consequences. Learn how to deal with storage and preservation problems that can arise, and how to revamp your data protection strategy.
Posted: 19 Aug 2015 | Published: 19 Aug 2015

Commvault

Case Study: Strong Authentication Provides Intellectual Property Security
sponsored by Gemalto
WHITE PAPER: This case study describes how outerwear company O'Neill adopted a new authentication solution to heighten the security of its valuable intellectual property.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Gemalto

Safeguarding Access in the Distributed Network
sponsored by HID
WHITE PAPER: This white paper introduces a method of identity management that will safeguard any access point, even mobile and virtual ones.
Posted: 18 Aug 2015 | Published: 12 Feb 2013

HID

Kent Police Nabs Acronis for Faster, Easier, and More Efficient Backups
sponsored by Acronis
CASE STUDY: This case study details how the Kent Police Department was able to deploy a backup system that utilizes data deduplication to effectively backup and recover their complex mix of data across Windows, Linux, and VMware. Read on to learn how deduplication also made their data management much easier.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

Acronis

Authentication That Keeps Your Mobile Devices Secure
sponsored by HID
WHITE PAPER: This white paper introduces a way for you to boost mobile security by enhancing your authentication practices.
Posted: 18 Aug 2015 | Published: 20 Feb 2013

HID
51 - 75 of 2285 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement