IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
76 - 100 of 2717 Matches Previous Page  |  Next Page
How to Unlock EMS: 3 Things You Need to Know to Capitalize on Enterprise Mobility Suite
sponsored by Microsoft
PRESENTATION: In the era of mobility, BYOD is a major concern. The Enterprise Mobility Suite (EMS) is a sweeping platform that works with existing cloud platforms, and covers mobile management and data protection. Access this brief resource to learn just what EMS is capable of and the value it has to offer.
Posted: 31 Aug 2016 | Published: 31 Aug 2016

Microsoft

Is the Hybrid Storage Array Dying?
sponsored by Dell EMC
EGUIDE: Is hybrid storage heading toward extinction? Discover if hybrid storage with HDDs is indeed a dying breed, as well as examine the challenges confronting today's flash data storage simplification. Additionally, learn the top 9 reasons for the increased adoption of object-level storage.
Posted: 30 Aug 2016 | Published: 29 Aug 2016

Dell EMC

Utilizing SSD Flash and Object Storage: Should Both Be Used Simultaneously?
sponsored by Dell EMC
EGUIDE: Is it possible to increase object storage performance by as much as 100 times? Now may be the time to deploy SSD flash and object storage together, and in this guide, learn the performance and reliability benefits of utilizing both simultaneously. As a bonus, read on to access seven tips for improving data storage efficiency.
Posted: 30 Aug 2016 | Published: 29 Aug 2016

Dell EMC

Trusted Backup and Recovery Software Solutions Simplify Administration
sponsored by IBM
DATA SHEET: Discover how to take the pressure off your backup admins by simplifying data protection, whether it is hosted in physical, virtual, software-defined or cloud environments. Read on to optimize data protection and recovery for core apps and critical workstations.
Posted: 30 Aug 2016 | Published: 30 Aug 2016

IBM

IBM Data Protection Modernization and Strategy: An ESG Webinar
sponsored by IBM
VIDEO: In order to meet a wide variety of SLAs, you need a continuum of backup technologies suitable for every type of data protection instance. Tune into this webinar as ESG Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, analyze today's vast range of data protection modernization issues and strategies.
Posted: 30 Aug 2016 | Premiered: 31 Mar 2016

IBM

2016 Cyber Security Intelligence Index
sponsored by IBM
WHITE PAPER: This in-depth analysis outlines what IT and security professionals learned from 2015's cyberattacks. Discover which industries were most targeted, the role insiders played in exploitation of vulnerabilities and, most importantly, what you can do to avoid catastrophic data loss.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

IBM

Trends in SAP Cybersecurity
sponsored by IBM
WHITE PAPER: The purpose of this Ponemon Institute study, which encapsulates the survey results of 607 IT and IT security practitioners, is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 29 Aug 2016 | Published: 01 Feb 2016

IBM

ESG Video Interview: Virtualization-Driven Data Protection Modernization
sponsored by IBM
VIDEO: ESG Principal Analyst Jason Buffington and Greg Van Hise, IBM Senior Technical Staff Member, hash out the essentials of modern virtualization-driven data protection. Tune in now to learn how to modernize continuous protection that keeps up with your accelerated production.
Posted: 29 Aug 2016 | Premiered: 31 Mar 2016

IBM

Help Minimize Impact to Patient Care in the Event of a Disaster
sponsored by McKesson Corporation
WHITE PAPER: Disaster recovery (DR) services can keep your critical patient data and systems safe and accessible with cost-efficient replication and infrastructure recovery for virtual environments. Discover how a DR service can help your health care organization limit disruptions to patient care, reduce infrastructure, storage and staffing costs, and more.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

McKesson Corporation

Simplified Data Protection for the Modern Enterprise: An Expert Evaluation
sponsored by IBM
VIDEO: Tune into this video as ESG Senior Lab Analyst Vinny Choinski breaks down an advanced data backup and recovery platform for virtual, physical, cloud, and software-defined environments. Watch now to enhance your enterprise's data protection by mitigating the risk of data loss, reducing total cost of protection, and more.
Posted: 29 Aug 2016 | Premiered: 30 Mar 2016

IBM

Tolly Test Report: Evaluating a Web Protection Vendor
sponsored by IBM
WHITE PAPER: In this test report, The Tolly Group evaluates a top web protection vendor to see how they stack up in the highly vulnerable web threat landscape. Learn how you can gain flexible risk-based access with strong authentication capabilities while protecting against a wide range of application exploits.
Posted: 29 Aug 2016 | Published: 01 Jun 2016

IBM

Ransomware Multi-layered Approach
sponsored by TrendMicro
WHITE PAPER: Discover four ways you can prepare your corporate network for ransomware attacks to prevent data and financial losses. Learn how a layered approach to security can minimize your malware risk and educate your users on how exactly ransomware can attack your data.
Posted: 29 Aug 2016 | Published: 01 Jul 2016

TrendMicro

Simplify Your Google Apps Collaboration and Management with IDaaS
sponsored by OneLogin
WEBCAST: This informative webinar is designed to get you through the most complex of Google App deployments.
Posted: 29 Aug 2016 | Premiered: Jul 1, 2016

OneLogin

7 Key Challenges to Value-Based Care: Ensuring Patient-Centered Care With Information Management
sponsored by Information Builders
WHITE PAPER: This white paper explores how to address some of the challenges of moving towards value-based healthcare with a strategy for improving the way patient data is collected, managed, and exchanged. Access now to find out more about an integrated approach to master data management, data quality, information management, and more.
Posted: 29 Aug 2016 | Published: 29 Aug 2016

Information Builders

TRC Case Study: Securing the Multi-Cloud Environment
sponsored by TrendMicro
CASE STUDY: Lacking security in your AWS can leave your data and your customers' data at risk. This case study examines how one engineering company was able to secure their workloads on AWS by implementing a comprehensive server security platform. Access now to learn about this platform and how it closes security gaps and controls costs.
Posted: 26 Aug 2016 | Published: 31 May 2016

TrendMicro

Computer Weekly – 30 August 2016: Get protected
sponsored by ComputerWeekly.com
EZINE: It is not uncommon for computer systems to be compromised by a company's own employees. In this week's issue we look at the Sage data breach, which highlights the risk every organisation faces from its staff. Staff are often motivated by revenge, but sometimes internal logins can be compromised, enabling hackers to circumvent firewalls.
Posted: 26 Aug 2016 | Published: 30 Aug 2016

ComputerWeekly.com

Manufacturing Company's AWS Success Story
sponsored by TrendMicro
CASE STUDY: If you're migrating to AWS, then you need to have comprehensive security in place to protect confidential data. Access this case study that details how one, large manufacturing company was able to secure their move to AWS and protect critical information.
Posted: 26 Aug 2016 | Published: 31 Dec 2015

TrendMicro

Modernizing Data Protection
sponsored by IBM
WEBCAST: Should you store all data forever? What should the life-cycle of data be? What, if anything, can you learn from old data? How do you modernize your data protection? Watch this episode of #Cubeconversations, where 3 industry veterans address these questions by discussing the cloud, dealing with data growth, and the systems of insight into data.
Posted: 26 Aug 2016 | Premiered: Jan 26, 2016

IBM

Clearing the Confusion of Modern Data Protection
sponsored by IBM
WEBCAST: One aspect of IT that everyone agrees upon is the need for better data protection. But what they don't always agree on is how to provide it. View this webcast where Jason Buffington, senior analyst at ESG, takes an in-depth look at modern data protection and explains why when you modernize production, you must modernize protection.
Posted: 26 Aug 2016 | Premiered: Jan 7, 2016

IBM

Protecting Data is a Snap with Cloud-Based Replication
sponsored by Dell, Inc.
TECHNICAL ARTICLE: In this tech brief, explore how to replicate on-premises backups from a rapid recovery core to the cloud for simplified data protection and disaster recovery. See how your enterprise can benefit from easy scalability, redundancy, and cost savings, by replicating to the cloud.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Dell, Inc.

IDaaS: Modernize Your IAM in the Cloud
sponsored by OneLogin
WEBCAST: Learn how identity management as a service (IDaaS) can help you modernize your IAM and roll out applications as quickly as possible while ensuring your data is kept secure.
Posted: 25 Aug 2016 | Premiered: Jul 12, 2016

OneLogin

5 Ways to Safeguard Sensitive Data from Insider Threats and External Attacks
sponsored by IBM
WHITE PAPER: A modular security strategy that allows you to deploy defense capabilities as you need them is the key to future protection. Discover how you can monitor your entire network continuously to prevent the 5 most harmful occurrences.
Posted: 25 Aug 2016 | Published: 01 Nov 2015

IBM

The Right Backup and Recovery Solution Can be a Business Enabler
sponsored by Veritas
WHITE PAPER: Your data protection strategy needs to deliver the quality and service levels required to enable your digital business. Discover a backup solution built on a converged platform that enables efficient and cost-effective data management that will truly help put your data to good use.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Veritas

Protecting Large Scale Environments with Veritas NetBackup
sponsored by Veritas
DATA SHEET: In this resource, discover a comprehensive, converged backup platform that supports both physical and virtual infrastructures. This solution can support your present and future data protection needs with benefits such as lower ongoing operating costs, greater scalability, simplified maintenance, and more.
Posted: 25 Aug 2016 | Published: 25 Aug 2016

Veritas

Uncovering the Risk of SAP Cyber Breaches
sponsored by Onapsis
WHITE PAPER: The purpose of this Ponemon Institue study is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

Onapsis
76 - 100 of 2717 Matches Previous Page    2 3 4 5 6 7    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement