IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
51 - 75 of 2764 Matches Previous Page  |  Next Page
Making the Most of Hybrid Cloud for Backup and Archiving
sponsored by Equinix
TRANSCRIPT: Data storage experts discuss the approach of implementing a cloud backup and archive solution to improve data reliability and recovery in today's world of big data. Explore how your enterprise can achieve a greater amount of utility and flexibility when it comes to capturing and utilizing your data, without risking security.
Posted: 14 Jun 2016 | Published: 14 Jun 2016

Equinix

DLP Tools Essential to Data Protection Strategy
sponsored by Intel Security
EGUIDE: Network-based data loss prevention (DLP) tools are designed to track, log and prevent unauthorized access to sensitive data. In this e-guide, learn more about DLP concepts, and products designed to support a robust sensitive data protection strategy.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

Six Steps to Buying Data Loss Prevention Products
sponsored by Intel Security
EGUIDE: Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

The Essential Guide to Managed Backup
sponsored by Solarwinds N-able
EBOOK: Even a couple of hours downtime could cause your customers to experience lost revenue, lost customers, and the permanent loss of data. Can your business take that hit? Read this eBook to discover how you can manage, store, and protect your customers' data, as well as streamline your backup routine.
Posted: 14 Jun 2016 | Published: 14 Jun 2016

Solarwinds N-able

Log Monitoring & Analysis: Strengthen Information Security While Respecting User Privacy
sponsored by Intersect Alliance
EGUIDE: Log monitoring and analysis tools can be used to bolster information security and improve incident response without infringing on user privacy. In this expert e-guide, security pros evaluate options based on criteria such as alerts and reporting capabilities.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intersect Alliance

The World Sees 80,000 New Malware Threats Each Day -- Don't Be a Victim
sponsored by Unisys
WHITE PAPER: Micro-segmentation, paired with advanced analytics, can help you manage malware and other risks. Learn now about multi-dimensional cyber-attack detection through machine learning and predictive algorithms, for definable security analysis to determine who your organization can trust.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Unisys

Making the Most of Hybrid Cloud for Future-Proofed Data Storage Part 1
sponsored by Equinix
TRANSCRIPT: Data storage experts discuss how the right hybrid cloud solution, if implemented successfully, can provide infinite storage capacity that is secure and reliable. Access now to learn what characteristics you need in a hybrid cloud infrastructure to meet your data management needs.
Posted: 13 Jun 2016 | Published: 13 Jun 2016

Equinix

A Smart Way to Protect Windows Server 2003
sponsored by Unisys
WHITE PAPER: Explore ways to protect data with endpoint-to-endpoint encryption while you make Windows Server 2003 and other endpoints elusive to hackers.
Posted: 13 Jun 2016 | Published: 30 Jun 2014

Unisys

Expert Q&A: How Can I Prevent Healthcare Cyberattacks?
sponsored by Symantec Corporation
EGUIDE: When it comes to data breaches, never assume that you're good. In this Q&A, Principal Advisor and former healthcare CIO Gary Seay reveals the most common mistakes healthcare organizations make that leave them vulnerable to an attack.
Posted: 13 Jun 2016 | Published: 07 Jun 2016

Symantec Corporation

Putting the “Secure” in Secure Remote Access
sponsored by Citrix
WHITE PAPER: Security pros today are challenged to establish comprehensive protection for all kinds of remote access use cases – but it isn't impossible. Learn how you can deliver a single, consolidated remote access infrastructure featuring comprehensive access, threat and data protection.
Posted: 13 Jun 2016 | Published: 01 May 2016

Citrix

Integrating Data Protection andActive Archiving
sponsored by HGST
WHITE PAPER: Learn how to easily integrate data protection with scalability. An integrated solution demonstrates data availability at scale, manageability, disaster recovery capabilities and simplicity agreeable to the demands of current and future enterprise data center environments.
Posted: 13 Jun 2016 | Published: 01 Apr 2016

HGST

Integrated Solution for Workforce Mobility and Secure Hybrid Cloud
sponsored by Hitachi Data Systems
WHITE PAPER: Discover a content platform portfolio that combines object storage software with hybrid cloud to efficiently consolidate, automate, mobilize and archive data. See how this solution can bring structure to your unstructured data, simplify your storage management and ensure efficiency, reliability, and security.
Posted: 13 Jun 2016 | Published: 31 Jan 2015

Hitachi Data Systems

Security Questions You Should Be Asking Your Cloud Service Provider
sponsored by Intel Security
WEBCAST: Understand these questions and other crucial concerns that'll ensure you select the right cloud service provider. Learn how to dig in and conduct extensive groundwork, reviewing every aspect of each CSP before you make a final decision.
Posted: 13 Jun 2016 | Premiered: May 1, 2016

Intel Security

Hitachi Content Platform: Intelligent Structure for Unstructured File Data
sponsored by Hitachi Data Systems
DATA SHEET: Object storage solution can bring efficiency and structure to your data management by enabling organizations to store, protect, analyze and retrieve file data from a single system. Discover how this content platform can also enable your enterprise to control data mobility, reduce backup via built-in data protection, and more.
Posted: 13 Jun 2016 | Published: 31 Jan 2016

Hitachi Data Systems

How to Protect Our Digital World from Cyber Attacks
sponsored by IBM
VIDEO: Our digital world is under attack. But you can fight back. Adaptive threat intelligence allows you to gather information from all your devices and develop countermeasures against malware for the future. It's not enough to be ready for yesterday's attacks; it's about staying one step ahead of the bad guys throughout the entire cybercrime arms race.
Posted: 13 Jun 2016 | Premiered: 14 May 2014

IBM

Make Emm Part Of a Broader Mobile Enterprise Strategy
sponsored by Microsoft
EGUIDE: If management is the centerpiece of your mobile enterprise strategy, you're doing it wrong. Learn how adding MAM and MCM capabilities to your EMM strategy can help you enforce mobile security policies, but also enable your workers to be more productive, transforming how your business operates.
Posted: 10 Jun 2016 | Published: 03 Jun 2016

Microsoft

Support Unstructured Data with Multipurpose Distributed Object Storage
sponsored by Hitachi Data Systems
WHITE PAPER: Explore a single, multipurpose distributed object-based storage system that can support large-scale repositories of unstructured data throughout a wide range of workloads. Discover the benefits this platform can bring to your enterprise, including multitenancy, adaptive cloud tiering, spin-down capability, and more.
Posted: 10 Jun 2016 | Published: 30 Nov 2014

Hitachi Data Systems

7 Critical Capabilities for Enterprise Information Archiving
sponsored by Proofpoint, Inc.
WHITE PAPER: This Gartner Report helps you understand and compare the critical capabilities of the enterprise information archiving solutions available in today's market.
Posted: 10 Jun 2016 | Published: 16 Dec 2015

Proofpoint, Inc.

The Rise of Object Storage
sponsored by Cleversafe
WHITE PAPER: Object storage solutions can meet requirements for data protection and management that traditional external storage solutions cannot at high capacity. Discover key considerations your enterprise should include when evaluating an object storage solution and see the many use cases for object storage.
Posted: 10 Jun 2016 | Published: 30 Sep 2015

Cleversafe

Closing the Loop with Advanced Endpoint Protection and Forensics
sponsored by Check Point Software Technologies Ltd.
WEBCAST: You need access to insights that allow you to understand and triage attacks so you can quickly determine the path of resolution. Learn solid strategies that can help your organization secure end-user systems from today's most sophisticated attacks and zero-day threats.
Posted: 10 Jun 2016 | Premiered: Jun 10, 2016

Check Point Software Technologies Ltd.

Few Fully Prepared for Software Security Risks
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper shows you results from a recent security survey and the value of testing your security measure regularly.
Posted: 10 Jun 2016 | Published: 10 Jun 2016

Hewlett Packard Enterprise

Piecing Together the Hybrid Cloud Management Puzzle
sponsored by IBM
EGUIDE: While the hybrid cloud gives users the ability to reap the benefits of the public cloud, yet still maintain control over critical applications through the private cloud, that doesn't mean hybrid cloud management is a walk in the park. This e-guide explores questions to answer before taking on a hybrid cloud project.
Posted: 09 Jun 2016 | Published: 06 Jun 2016

IBM

The IBM-VMware Partnership: How Will This Affect The Move To Hybrid Cloud
sponsored by IBM
EGUIDE: Moving on-premises workloads to the cloud might now get a little easier. IBM and VMware have partnered up to help streamline the move to the hybrid cloud. This exclusive e-guide highlights this partnership and how it's allowing users to extend their existing workloads from their on-premises data center to the cloud.
Posted: 09 Jun 2016 | Published: 06 Jun 2016

IBM

Backup Target Features Evolve for Better Data Protection
sponsored by Veritas
EGUIDE: Over the years, disk-based backup targets have evolved to become far more than just cheap disk arrays. SearchDataBackup.com experts explain how as IT professionals consider upgrading or replacing their current technology, they need to understand the different capabilities these systems can offer.
Posted: 09 Jun 2016 | Published: 07 Jun 2016

Veritas

Top Object Storage Enterprise Use Cases
sponsored by Cleversafe
EGUIDE: Access this exclusive guide to learn about object storage trends, why its use cases are growing, and how to determine which, if any, would be right for your storage strategy.
Posted: 13 Jun 2016 | Published: 10 Jun 2016

Cleversafe
51 - 75 of 2764 Matches Previous Page    1 2 3 4 5 6    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement