IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
76 - 100 of 2764 Matches Previous Page  |  Next Page
The Disk vs. Tape vs. Cloud Data Protection Debate
sponsored by Veritas
EGUIDE: Take a closer look at data protection in today's complex IT environments, and explore the key factors to consider when evaluating which option is right for your organization.
Posted: 09 Jun 2016 | Published: 03 Jun 2016

Veritas

Evaluating Recovery-in-Place Strategies for Data Protection
sponsored by Veritas
EGUIDE: Inside this exclusive data protection guide, explore a detailed breakdown of recovery-in-place technology, its top use cases and three key considerations to keep in mind when evaluating data protection techniques.
Posted: 09 Jun 2016 | Published: 07 Jun 2016

Veritas

Corporate Data Backup Expands Its Use Cases
sponsored by Veritas
EGUIDE: Products from backup software and hardware vendors have evolved to answer a broader array of challenges such as high-availability functionality, copy data management, archiving and data classification. Hear from our experts as they dive into new use cases of data backup.
Posted: 09 Jun 2016 | Published: 07 Jun 2016

Veritas

Evolving Backup Software Reduces the Necessity Of Archiving
sponsored by Veritas
EGUIDE: Access this exclusive guide to learn about the future of data backup and archiving, and the circumstances that determine whether the two should remain separate processes or not.
Posted: 09 Jun 2016 | Published: 03 Jun 2016

Veritas

FINRA Regulat ions Requi re TechnologyInnovat ion to Address Supervision andMoni tor ing Workload
sponsored by Proofpoint, Inc.
WHITE PAPER: Business leaders need to find a healthy balance between flexible business solutions and data monitoring abilities. Learn how to protect and govern your sensitive information to help mitigate risk and, in the process, better comply with regulatory requirements.
Posted: 08 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

B2B Success Story: E-Commerce Strategy for Thousands of Daily Transactions
sponsored by Axway
WEBCAST: In this video, Shawn Buske discusses the e-commerce system that Jabil chose to handle thousands of daily B2B transactions. Jabil was also able to easily meet SLA compliance and security compliance requirements.
Posted: 08 Jun 2016 | Premiered: Jan 11, 2016

Axway

The Essential DBA Playbook for Optimized SQL Server Management
sponsored by Dell, Inc.
ESSENTIAL GUIDE: Discover the essentials of optimizing SQL Server management in your organization in this comprehensive guide. Read on to determine how successful DBAs optimize their SQL Server environment, and gain exclusive insight into how to establish highly available backup and recovery, take advantage of database automation, and more.
Posted: 07 Jun 2016 | Published: 31 Dec 2015

Dell, Inc.

Optimizing Web Application Security for the New Bad Bot Threat Landscape
sponsored by Distil Networks
WHITE PAPER: Winning on today's bot battlefield takes time, expertise, and a dedicated team. Get a glimpse into the world of anti-bot defenses and win the battle of the bots on your site.
Posted: 07 Jun 2016 | Published: 01 May 2016

Distil Networks

Improving payment Card Compliance
sponsored by Verizon
WHITE PAPER: Learn how the bank was able to secure customer data in a cost-efficient manner by focusing on the most important applications. With ongoing consulting, the bank can maintain the strong PCI stance it has built and continue to earn customer trust while driving business growth.
Posted: 07 Jun 2016 | Published: 01 May 2016

Verizon

Defend Against Threats of Global Operations
sponsored by Verizon
WHITE PAPER: Learn how the organization decided to replace the company's global remote-access infrastructure with platforms that allow it greater overall visibility to areas of increased vulnerability. Discover how to guard both your global network and application delivery platforms to help protect your reputation and maintain business continuity.
Posted: 07 Jun 2016 | Published: 01 May 2016

Verizon

Secure your mobile devices, data and apps
sponsored by Verizon
WHITE PAPER: This white paper teaches you how to assess your existing security policies, giving you advice on potential weaknesses and best practices to strengthen your mobile security. Get better peace of mind with policies that keep data, devices and apps in line no matter where your workforce roams.
Posted: 07 Jun 2016 | Published: 01 May 2016

Verizon

Modernize and Simplify the Data Center with All-Flash
sponsored by EMC
WEBCAST: Witness how an all-flash solution with a dual active controller system that provides optimal performance, density, and cost. This simplified, flexible, modern flash solution can provide your enterprise with faster backup and recovery, integrated copy data management, built in encryption, and more.
Posted: 07 Jun 2016 | Premiered: Jun 7, 2016

EMC

Understand the Business Impact and Cost of a Breach
sponsored by MASERGY
ANALYST REPORT: This Forrester Report will help security and risk leaders build a case for investment to show business leaders what kind of investment it'll take to adequately protect their organization.
Posted: 07 Jun 2016 | Published: 12 Jan 2015

MASERGY

Deduplication and Backups — On Purpose for a Purpose
sponsored by Dell, Inc.
WHITE PAPER: This tech brief highlights the different deduplication methods used in today's computing environments, focusing on backups. Read on to see which method is right for your enterprise, and learn about the strengths and weakness of the most popular methods, including post-process deduplication, inline deduplication, fixed block deduplication, and more.
Posted: 06 Jun 2016 | Published: 06 Jun 2016

Dell, Inc.

Evaluating Today's Enterprise Backup Software and Integrated Appliances
sponsored by Commvault
ANALYST REPORT: The following report examines the top data protection vendors and includes strategic planning assumptions about data protection, and expert comparison of each vendor and offerings, and more. Access now and learn what it takes to ensure the complete safety of your data.
Posted: 06 Jun 2016 | Published: 30 Jun 2015

Commvault

Next Generation Cybersecurity: The Age of Artificial Intelligence
sponsored by MASERGY
WEBCAST: Traditional cybersecurity strategies are failing and need advanced intelligence and analytics to sort through an enormous amount of data that organizations possess. This webinar will show how artificial intelligence can augment existing security solutions with patented network behavioral analysis to fill the gaps in current effort.
Posted: 06 Jun 2016 | Premiered: May 1, 2016

MASERGY

Masergy UES Offers Unique Approach to Network Defense
sponsored by MASERGY
ANALYST REPORT: Instead of applying a one-size-fits-all approach, machine learning detects events differently on different networks. It uses multistaged analysis to learn predictable patterns on your network and methods that work best for it. Discover how unified enterprise security can benefit your unique network architecture.
Posted: 06 Jun 2016 | Published: 11 Nov 2015

MASERGY

Advanced threat protection add-on comes to Microsoft EOP
sponsored by Symantec Corporation
EGUIDE: This e-guide explores what advanced threat protection (ATP) can do for your cloud-based email tools. Protect end users against unknown malware and viruses and get real-time, time-of-click protection against malicious URLs.
Posted: 06 Jun 2016 | Published: 23 May 2016

Symantec Corporation

Emerging security threats you're up against now
sponsored by Intel
EGUIDE: Cybercrime is now a fully functional industry with "Hacking as a Service" being a top product. Services are cheaper and more sophisticated than ever. This e-guide shows you top emerging cyber threats that could be harming your system soon.
Posted: 06 Jun 2016 | Published: 25 May 2016

Intel

Data breach lawsuits indicate a troubling trend for enterprises
sponsored by Intel Security
EGUIDE: Take a closer look at the rash of data breach lawsuits and the settlements to see why and how enterprises have found themselves on the losing end of these legal battles. Get insight from industry experts about what you can do now to secure your infrastructure and how you can protect your organization into the future.
Posted: 06 Jun 2016 | Published: 25 May 2016

Intel Security

Put Time On Your Side: The Heavy Cost Of Putting Off Your Cybersecurity Decisions SMB
sponsored by Kaspersky Lab
EBOOK: A lot can happen with IT security in one day, too. In fact, at Kaspersky Lab, we detect 310,000 new pieces of malware every day, which means that every day you put off the decision to upgrade your IT security system is a day that thousands of pieces of new malware can slip through.
Posted: 06 Jun 2016 | Published: 01 May 2016

Kaspersky Lab

Find, Classify, Protect your data
sponsored by Verizon
WHITE PAPER: Understanding, identifying and classifying your data correctly are the first steps in information security. Learn how to evaluate your data landscape and create a plan to manage and secure it.
Posted: 06 Jun 2016 | Published: 31 Dec 2015

Verizon

Encryption as an IT Service
sponsored by Gemalto
WHITE PAPER: To build a sustainable security foundation, organizations need to employ encryption as an IT service — centrally and cohesively managing encryption across an entire enterprise. Gain significant benefits in overall security, administrative efficiency and business agility.
Posted: 03 Jun 2016 | Published: 31 Dec 2015

Gemalto

Resiliency and Data Protection with Riverbed SteelFusion
sponsored by Riverbed Technology, Inc.
RESOURCE: Enterprise Strategy Group (ESG) graphically summarizes the hands-on lab review, Zero Branch IT with Riverbed SteelFusion. Access this at-a-glance view now, complete with live links to download the complete report and learn more details about SteelFusion.
Posted: 03 Jun 2016 | Published: 03 Jun 2016

Riverbed Technology, Inc.

Quick Steps to Integrate Office 365 and ZixGateway® Hosted
sponsored by ZixCorp
WHITE PAPER: Add greater protection emails by routing Office 365 to ZixGateway Hosted. It automatically scans routed outbound email from Office 365 connectors. If sensitive information triggers Zix content policies, those messages and their attachments are automatically encrypted.
Posted: 03 Jun 2016 | Published: 01 May 2016

ZixCorp
76 - 100 of 2764 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement