IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
76 - 100 of 2392 Matches Previous Page  |  Next Page
CW Europe – November 2015
sponsored by
EZINE: Cloud computing has huge benefits to businesses in Europe, but data protection rules have been different for organisations in different parts of Europe.This is about to change with The final version of the General Data Protection Regulation (GDPR) expected soon. All 28 EU member states will have one set of rules to follow.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

6 Key Security Transformations for Protecting Your Enterprise
sponsored by IBM
WHITE PAPER: This white paper examines the six areas of cybersecurity that most need to transform if your business is going to stay secure in today's threat environment.
Posted: 03 Nov 2015 | Published: 30 Sep 2015


Data Protection for Virtual Environments: Extending Solutions to VMware and Hyper-V Environments
sponsored by IBM
WHITE PAPER: This white paper highlights a data protection solution for virtual environments that can adjust backups to support larger and more critical workloads. Read on to learn how this solution can make it easier for your enterprise to manage and monitor a complete data protection environment, both physical and virtual.
Posted: 03 Nov 2015 | Published: 03 Nov 2015


Case Study: Delivering Insight for Incident Investigation, Troubleshooting and Improved Security
sponsored by Splunk
WHITE PAPER: In this white paper, see how Telenor was able to more efficiently and effectively address the complexities of its IT systems. Learn how the software option Telenor chose allowed them to establish distributed search, alerting, event correlation, proactive monitoring for security, and more.
Posted: 03 Nov 2015 | Published: 03 Nov 2015


Data Privacy in the Cloud
sponsored by OpenText
WHITE PAPER: This white paper can help you navigate the complexities of international data privacy laws and cloud computing.
Posted: 03 Nov 2015 | Published: 02 Nov 2015


IBM vs. EMC Data Protection Platforms: A Competitive Test and Evaluation Report
sponsored by TCM/IBM
WHITE PAPER: This white paper evaluates two commercially available storage solutions, EMC vs. IBM, in a backup and retrieval scenario and focuses on the throughput and scalability they both bring to the table. Read on to see what solution can provide you with the right data protection for your enterprise and can fulfill your performance and scalability needs.
Posted: 02 Nov 2015 | Published: 02 Nov 2015


Stopping Cybercrime: A Guide for the Financial Sector
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper contains a list of best practices financial institutions can follow to ensure that they remain secure in the face of growing cyber-attacks.
Posted: 02 Nov 2015 | Published: 02 Nov 2015

LogRhythm, Inc.

Data Privacy vs. Data Protection
sponsored by PEER 1
WHITE PAPER: Access this white paper to learn what specific privacy challenges "ease of access" brings with it. Learn how you can protect the sensitive data of e-government.
Posted: 02 Nov 2015 | Published: 02 Nov 2015


Solidify Your Network Protection with Internal Segmentation Firewalls
sponsored by Fortinet, Inc.
WHITE PAPER: In this white paper you will learn the ins and outs of deploying an ISFW. Learn how to protect your company from the latest advanced security threats and compartmentalize access to sensitive data and apps.
Posted: 30 Oct 2015 | Published: 30 Oct 2015

Fortinet, Inc.

A Solution to Storage Encryption Inefficiencies
sponsored by IBM
WHITE PAPER: This white paper introduces an innovative way to cut down on those inefficiencies and costs with a single encryption solution that protects your entire storage environment.
Posted: 30 Oct 2015 | Published: 30 Oct 2015


Smart Parking and the Evolution of the Hybrid Cloud Service Provider
sponsored by IBM
VIDEO: This video depicts smart parking as an example of cloud services allowing enterprises to access data in real time without having to worry about data protection or management challenges. Watch how hybrid cloud service providers are evolving to providing more services that can make your enterprise's data processes efficient and easy to manage.
Posted: 29 Oct 2015 | Premiered: 09 Jun 2015


How Cloud Computing Transforms New Business Models
sponsored by OpenText
WHITE PAPER: Cloud services now include management of deployment, apps, platforms, and IT infrastructure. In this white paper, you will learn the 6 most important considerations to keep in mind for a successful cloud partnership with your provider.
Posted: 29 Oct 2015 | Published: 31 Dec 2014


Three Mobile Security Threats IT Should Know
sponsored by CloudMine
EGUIDE: Access this expert e-guide to get a detailed look at three mobile security threats and find out how to safeguard corporate-provided or employee-owned mobile devices in your enterprise. You'll also discover how mobile backend as a service (MBaaS) helps IT shops to bridge the gap between legacy systems and mobile devices.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

Internal Segmentation Firewall: Protecting Your Network from the Inside Out
sponsored by Fortinet, Inc.
WHITE PAPER: In this brief white paper, you will discover if an internal segmentation firewall is the best form of protection for your users and applications. Learn how to enforce more granular security with policy-based segmentation, and contain threats by user, device, and application.
Posted: 29 Oct 2015 | Published: 29 Oct 2015

Fortinet, Inc.

Why Your Cybersecurity Needs to Advance
sponsored by BitDefender
VIDEO: This brief video discusses the dangers of traditional security and the importance of embracing sophisticated security measures. Take a look to learn how improving your security architecture can stop the rise of cybercrime.
Posted: 29 Oct 2015 | Premiered: 13 Oct 2015


Automate Your Enterprise Apps to Ensure Secure Mobile Data Access
sponsored by Citrix
WEBCAST: In this webcast, Security Strategists Stacy Bruzek Banerjee and Kurt Roemer share their advice on how and where to protect the enterprise data that matters. Tune in to receive guidance on automating your enterprise data and apps, so that your people can access sensitive data when—and where—they need it.
Posted: 28 Oct 2015 | Premiered: Oct 28, 2015


Protect Against Threat Propagation and Damage in the Internal Network
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper examines how to add an additional security layer to your network with an internal segmentation firewall. Learn how to segment the access of potential threats vectors to critical resources, and limit potential breach damage in your internal network.
Posted: 28 Oct 2015 | Published: 28 Oct 2015

Fortinet, Inc.

How John Lewis Streamlined IT Operations
sponsored by Splunk
VIDEO: In this webcast, learn how leading retailer John Lewis has been able to finely tune its e-commerce customer experience using an operational intelligence tool. See how this has led to rapid growth in online sales and better efficiency across the company.
Posted: 28 Oct 2015 | Premiered: 01 Jul 2014


The 10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This white paper presents 10 key points to consider as you develop your enterprise mobility strategy—from security to BYOD. Unlock the full potential of your mobility, and develop a comprehensive and security-conscious mobility strategy for your organization.
Posted: 28 Oct 2015 | Published: 31 Oct 2014


Database Security: Protect your Business Reputation
sponsored by Oracle Corporation
WHITE PAPER: This report discusses how to prevent data misuse or theft with better access control and privilege management for your databases.
Posted: 28 Oct 2015 | Published: 31 Jan 2015

Oracle Corporation

Deliver Secure Enterprise Information on Android, Apple, and Microsoft Devices
sponsored by Citrix
WHITE PAPER: This white paper reviews an identity-based provisioning and control tool for all apps, data, and devices that will secure sensitive business information without hindering productivity. Learn how the security of mobile devices differs from the security of a legacy PC, and protect your information with any OS.
Posted: 27 Oct 2015 | Published: 30 Apr 2014


Deep Storage Solution Leverages Tape, NAS, and Cloud for Cost-Effective DRaaS
sponsored by FujiFilm Dternity
WHITE PAPER: This white paper discusses the benefits of a hybrid disaster recovery approach while also implementing DRaaS for data protection and recovery. Read more to see how this can offer your enterprise an easy-to-use, cost-effective approach to your data protection systems that will help improve your business continuity both on-premise and in the cloud.
Posted: 27 Oct 2015 | Published: 31 Aug 2015

FujiFilm Dternity

Case Study: Protecting Patient Data in the Public Cloud
sponsored by Alert Logic
WHITE PAPER: Access this case study to learn how a health organization secured delicate genomic data in a public cloud environment.
Posted: 27 Oct 2015 | Published: 27 Oct 2015

Alert Logic

Embracing BYOD Through Secure App & Data Delivery
sponsored by Citrix
WHITE PAPER: This white paper highlights an enterprise mobility management (EMM) platform intended for BYOD in the workplace. Learn how to harness mobile device management for secure app and data delivery, and ensure that corporate apps and data are isolated from personal content.
Posted: 27 Oct 2015 | Published: 30 Jun 2013


Report Summary: Reliability Analysis of Juniper Networks SRX5000 Line of Services Gateways
sponsored by Juniper Networks, Inc.
ANALYST REPORT: This analysis report focuses on a networking and security service that provides application security, UTM, integrated IPS, and advanced integrated threat management. Read on to see how this scalable, resilient security solution can guard your enterprise's data center against cyber threats and malware.
Posted: 26 Oct 2015 | Published: 31 Jan 2015

Juniper Networks, Inc.
76 - 100 of 2392 Matches Previous Page    2 3 4 5 6 7    Next Page
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by, powered by an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement