IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
76 - 100 of 2272 Matches Previous Page  |  Next Page
5 Ways Vera Makes Office 365 More Secure
sponsored by Vera
WHITE PAPER: In this white paper, learn how you can protect every document your team creates, without sacrificing the simple, consistent user experience you count on.
Posted: 25 Jan 2016 | Published: 02 Dec 2015

Vera

After the Perimeter: How a ‘Segment of One’ Simplifies and Improves Security
sponsored by Cryptzone
WHITE PAPER: This white paper outlines how to improve and simplify network security through a "segment of one" approach. Read on to learn about this new approach to network access, and how it works to see if it's right for your organization.
Posted: 25 Jan 2016 | Published: 25 Jan 2016

Cryptzone

5 Ways to Extend Security Beyond Dropbox
sponsored by Vera
WHITE PAPER: Access this white paper to discover how you can better protect your files in Dropbox. Learn to protect, secure and track all you confidential and sensitive content.
Posted: 25 Jan 2016 | Published: 09 Dec 2015

Vera

Virtualized Data Risks: How to Assess, Protect and Recover From Data Loss
sponsored by Acronis
WHITE PAPER: This white paper details seven virtualization backup/data protection "must-haves". Download now to find out how you can keep your data safe in virtualized environments.
Posted: 25 Jan 2016 | Published: 30 May 2014

Acronis

Complexity and Data Growth Driving Small and Medium-Sized Environments Toward a New Generation of Data Protection
sponsored by Acronis
WHITE PAPER: Continue reading this white paper to learn how different businesses are utilizing a variety of strategies to manage their cloud, virtual and physical servers. Discover how to manage your hybrid IT environment efficiently.
Posted: 25 Jan 2016 | Published: 18 Jun 2014

Acronis

How to Stop Cyber Attacks Using Adaptive Authentication
sponsored by SecureAuth
WEBCAST: This informative webinar takes a look at how next generation adaptive authentication so that you can stay a step ahead of criminals. Tune in to learn how you can easily identify suspicious actors before they enter your network, not after they violate a policy.
Posted: 24 Jan 2016 | Premiered: Dec 2, 2015

SecureAuth

What to Expect in 2016: Top 5 Predictions for Security and Access Control
sponsored by SecureAuth
WEBCAST: This informative webinar outlines the top 5 identity and access management trends for 2016. Tune in to learn what's on the horizon for IAM and take a closer look at next generation adaptive authentication so that you can stay a step ahead of the bad guys.
Posted: 24 Jan 2016 | Premiered: Jan 24, 2016

SecureAuth

Customer Stories: "No Limits" Data Protection
sponsored by Hewlett Packard Enterprise
VIDEO: In this brief webcast, hear from real customers – your peers – as they discuss HPE's data protection solution and its benefits. Watch now to see how you can increase the scalability, efficiency, and affordability of your data protection strategy.
Posted: 22 Jan 2016 | Premiered: 01 Dec 2015

Hewlett Packard Enterprise

Computer Weekly – 26 January 2016: Beyond India – the emerging outsourcing destinations
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we look at the growing number of offshore alternatives to the dominant outsourcing destination of India. We examine how to respond if your organisation is affected by a data breach. And we analyse how virtualisation technology can help improve your disaster recovery strategy. Read the issue now.
Posted: 22 Jan 2016 | Published: 26 Jan 2016

ComputerWeekly.com

Forward Thinking Backup: Data Protection for the Digital Business
sponsored by Veritas
WHITE PAPER: This white paper discusses the challenges of protecting data in today's digital world and highlights a converged backup and recovery platform with scalable storage appliances that enable cost savings and simplified management. Access now to see the benefits this platform can provide, including instant data recovery, cloud integration, and more.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

Veritas

Top 5 Pitfalls to Avoid in Your Data Protection Strategy
sponsored by Veritas
WHITE PAPER: This white paper uncovers five common, critical pitfalls to avoid when building a data protection strategy. Read on to learn how to navigate through these pitfalls so that your enterprise can implement a data protection solution that eliminates complexity, reduces staff inefficiencies, enables faster decisions, and accelerates your ROI.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

Veritas

New Rules of Data Security Virtual Portal
sponsored by IBM
WHITE PAPER: This portal is your hub for the latest data security strategies and best practices. Watch this series of informative videos to help shed light on the real world implications of data breaches, the importance of ensuring regulatory compliance and how to leverage best breed security solutions.
Posted: 22 Jan 2016 | Published: 09 Dec 2015

IBM

8 Tips to Stay Ahead of the Top 2016 Data Protection Trends
sponsored by Veritas
WHITE PAPER: This resourceful white paper offers 8 tips to maximize the value of your data protection investment and stay on top of the 2016 data protection trends. Read on to learn how your enterprise can accelerate your digital transformation, reduce cost and complexity, get ahead of exponential data growth, and more.
Posted: 22 Jan 2016 | Published: 22 Jan 2016

Veritas

8 Noble Truths of Backup and Recovery
sponsored by Acronis
WHITE PAPER: This white paper provides eight guidelines for successful backup and recovery. Access now and learn how to effectively protect your data and prevent data loss after a potential disaster.
Posted: 21 Jan 2016 | Published: 31 Dec 2014

Acronis

The Data Protection Playbook For All-Flash Storage
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper, you will discover four key factors to consider when optimizing efficiency and reducing the cost of data backup in your flash environment. Read on to utilize flash-integrated flat backup, learn how to combine snapshots and backups for best-practice data protection, and more.
Posted: 21 Jan 2016 | Published: 31 Dec 2015

Hewlett Packard Enterprise

Backup for Dummies
sponsored by Acronis
EBOOK: This e-book provides a comprehensive guide for putting data protection and disaster recovery systems in place for use cases ranging from simple file recovery to the most complex systems. Read on to learn how to manage your enterprise's data with ten tips for easier backup and recovery.
Posted: 21 Jan 2016 | Published: 31 Dec 2014

Acronis

Update your current Apple and Oracle software now
sponsored by WatchGuard Technologies, Inc.
VIDEO: Watch this video to learn about the latest updates to Mac OSX, iOS 9 and Oracle patch that will keep your network secure.
Posted: 20 Jan 2016 | Premiered: 19 Jan 2016

WatchGuard Technologies, Inc.

Simplifying Server Workload Migrations With Effective Disaster Recovery
sponsored by Acronis
WHITE PAPER: This white paper describes the challenges faced when migrating production systems to dissimilar hardware or another hypervisor platform. Read on to see how a backup technology can address these challenges and allow your enterprise to migrate production workloads to and from any platform, support disaster recovery and system replication, and more.
Posted: 20 Jan 2016 | Published: 30 Sep 2014

Acronis

ROI of IT Disaster Recovery
sponsored by Acronis
WHITE PAPER: This white paper discusses the importance of a disaster recovery (DR) solution using an ROI analysis as an argument for the investment. Read on to learn how your enterprise can choose a DR and business continuity strategy that will match your needs and how to calculate ROI for your DR solutions.
Posted: 20 Jan 2016 | Published: 31 Dec 2015

Acronis

Evaluating Cloud Security Solution for Amazon Web Services
sponsored by Palerra Inc.
WHITE PAPER: This buyer's guide outlines various requirements you must consider when purchasing an AWS security solution.
Posted: 19 Jan 2016 | Published: 30 Dec 2015

Palerra Inc.

The Threat Landscape of 2015
sponsored by Forcepoint
WHITE PAPER: This report examines new technological trends and discusses what these trends mean for your security.
Posted: 19 Jan 2016 | Published: 14 Sep 2015

Forcepoint

How to Vet and Deliver Better Mobile App Security
sponsored by Kony
EGUIDE: This complimentary resource provides two articles direct from the experts at SearchSecurity.com on how to achieve better mobile app security. Learn how to design a mobile-app security policy and discover four steps for vetting and delivering secure mobile apps.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

Kony

Forrester Total Economic Impact (TEI) Study of IBM Security Guardium
sponsored by IBM
WHITE PAPER: In this white paper you will learn how to improve process efficiency while meeting security and compliance requirements. Continue reading to learn how you can reduce the time and cost of compliance.
Posted: 19 Jan 2016 | Published: 30 Sep 2015

IBM

A Guide to Cyber Risk
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.
Posted: 19 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

Data Theft Prevention: The Key to Security, Growth and Innovation
sponsored by Forcepoint
WHITE PAPER: In this white paper, you will discover how Data Theft Prevention allows you to successfully embrace technological change and new opportunities.
Posted: 18 Jan 2016 | Published: 18 Jan 2016

Forcepoint
76 - 100 of 2272 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement