IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2269 Matches Previous Page  |  Next Page
ow Windows Server 2012 Will Impact Your Windows Storage Pools
sponsored by Dell and Microsoft
EGUIDE: This e-guide describes the steps you need to take to preserve your current storage pools in a Windows Server 2012 environment.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

Dell and Microsoft

Private Cloud: A Compelling Infrastructure Delivery Model
sponsored by Solidfire
WHITE PAPER: Access this white paper to uncover five key benefits of building a private cloud and learn why these characteristics make private cloud a compelling infrastructure delivery model to many organizations.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

Solidfire

From the Backroom to the Boardroom: Building A Case for Resiliency and Business Continuity
sponsored by IBM
WHITE PAPER: This white paper serves as a guideline for IT professionals, and explains how to generate investment for resiliency initiatives by linking IT risks to business risk using one resiliency services framework. Access this white paper to learn how to uncover the critical connections between IT and the business.
Posted: 31 Aug 2015 | Published: 31 May 2015

IBM

Build Confidence in Your Resiliency Program Through Functional Validation
sponsored by IBM
WHITE PAPER: This white paper will explore the requirements for a structured approach to exercising the various components of an enterprise resiliency program. Read on here to access the directions for this three-part business resiliency testing process.
Posted: 31 Aug 2015 | Published: 31 Oct 2014

IBM

Accelerate Business Transformation Through IT Innovation: The IT Mandate
sponsored by Dimension Data
WHITE PAPER: This report serves as a comprehensive guide to examine how well enterprise-level companies are embracing a new model of business-responsive data centers and networks to support their innovation.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

Dimension Data

The Price You Pay for a Data Breach
sponsored by IBM
WHITE PAPER: This research report reveals just how much American businesses stand to lose to a cyber-attack, breaking down costs by industry, enterprise size, and more.
Posted: 31 Aug 2015 | Published: 31 May 2015

IBM

Adopt New Enterprise UC Technologies with Speed, Agility, and Security
sponsored by Red Hat
WHITE PAPER: This white paper will introduce you to several third-party collaboration technologies that will help you innovate ahead of business demands. Access this white paper to learn how to select the proper collaboration technologies for you that can foster interoperability in your organization.
Posted: 31 Aug 2015 | Published: 31 Aug 2015

Red Hat

Updated Machine Data Platform Offers Improved Performance
sponsored by Splunk
WEBCAST: This webcast explores a machine data platform that allows organizations to search, navigate, and interact with data that is generated in real time. Watch now to learn more about how all of your data can not only become available and useful, but also how it can be protected with this data platform.
Posted: 31 Aug 2015 | Premiered: Aug 31, 2015

Splunk

Achieving Security Success by Quickly Sifting Through Data
sponsored by Splunk
WEBCAST: This webcast investigates how one company built an analytics-enabled security operations center in less than six months. Watch now to learn more about how this company is able to identify important data points and address security risks in hours rather than days with data monitoring software.
Posted: 31 Aug 2015 | Premiered: Aug 31, 2015

Splunk

What Part Do Service Providers Play In the Cloud?
sponsored by Dell, Inc.
WEBCAST: In this webcast, Stephen Lernihan, EMEA Business Developer at Dell, explains why service providers will play an increasingly key role in defining and evangelizing the possibilities of the cloud. View this webcast here to get a brief look at the role these providers play in the expansion of cloud services.
Posted: 31 Aug 2015 | Premiered: Aug 11, 2015

Dell, Inc.

Coping With the Video “Data Bulge”
sponsored by LTO
WHITE PAPER: This white paper shows how many organizations are turning to updates tape backup technology to protect data from critical apps like video surveillance. Read on to learn more about how the features of this system, like tiered storage, can provide simplified storage management as well as solid protection.
Posted: 28 Aug 2015 | Published: 28 Aug 2015

LTO

Healthcare Data Security in the Private Cloud
sponsored by BlueBox
WEBCAST: This brief webcast explores how one healthcare organization, BioIQ, configured their private cloud architecture to protect sensitive medical data. View now to learn how the private cloud can protect sensitive data at rest and more.
Posted: 28 Aug 2015 | Premiered: Jul 22, 2015

BlueBox

Vendor Lab Validation Report: Catalogic Copy Data Services
sponsored by Catalogic Software
WHITE PAPER: This report analyzes the Copy Data Services portion of Catalogic's overall Data Solution services and their instant virtualization and bare metal recovery of virtual servers. Access this white paper to view the highlights of this service.
Posted: 28 Aug 2015 | Published: 30 Sep 2014

Catalogic Software

Security Essentials for CIO's: Secure the Extended Workplace
sponsored by IBM
WHITE PAPER: This white paper discusses the problems 3rd party contractors pose to security and gives tips for ensuring your business partnerships are as safe as possible.
Posted: 28 Aug 2015 | Published: 30 Sep 2012

IBM

Security in the Cloud: Tips on How to Protect Your Data
sponsored by Procore
WHITE PAPER: This white paper outlines the basics of cloud storage security and the capabilities to look for in providers to ensure data protection.
Posted: 27 Aug 2015 | Published: 05 Aug 2015

Procore

Guide to Bimodal IT Strategy: Leveraging Traditional & Cloud-Based Apps
sponsored by Red Hat
WHITE PAPER: This e-book will instruct IT leaders on creating a bimodal infrastructure strategy that will enable you to support both traditional and new cloud-based agile IT applications. Read on to see how you can leverage the key benefits.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Red Hat

Accelerate Application Performance with Cloud Bare Metal Configuration
sponsored by BlueBox
WHITE PAPER: This white paper discusses the typical database problems in the cloud, describes several use cases for bare metal database servers, and outlines a cloud server solution for each. Read on to access future guidelines for enhancing your cloud and bare metal servers.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

BlueBox

Case Study: Meeting the Need for Seamless, Scalable Backups
sponsored by Commvault
WHITE PAPER: This case study examines how Revera, a leading MSP, was able to support an ever-growing customer demand for quick and efficient backups.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Commvault

Case Study: Increasing Backup Ability while Decreasing Administrative Overhead
sponsored by Commvault
WHITE PAPER: This case study describes how Catholic Education obtained a more efficient backup capabilities, increasing the data volumes it could backup without increasing administrative overhead.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Commvault

Why Current Backup Needs to Be Revolutionized
sponsored by LogicNow
WHITE PAPER: This white paper outlines how to provide your clients with innovative backup and recovery tools. Read on to learn how you can successfully backup, restore, and scale with minimal effort while simplifying management of backup processes.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

LogicNow

Video Brief: Data Protection Appliances
sponsored by arcserve
VIDEO: Find out what you need to know about data protection appliances in this video brief by the Enterprise Strategy Group's Sr. Data Protection Analyst, Jason Buffington.
Posted: 25 Aug 2015 | Premiered: 11 May 2015

arcserve

E-guide Exclusive: The Top 3 Tips for Selecting a DRaaS Provider
sponsored by Assuritive
EGUIDE: In this exclusive e-guide, expert Paul Kirvan shows you the pitfalls to avoid when considering DRaaS to support your mission-critical enterprise systems. Read on here to access the following guiding principles when choosing DRaaS.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

Assuritive

Flash Array for Better Performance and Data Protection
sponsored by IBM
WHITE PAPER: This white paper shows how flash arrays are best for improving performance and protecting data. Read on to learn about the features of one particular flash array and how it performs in comparison to hard disk drives.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

IBM

How to Secure Data While Improving Storage Performance
sponsored by IBM
WHITE PAPER: This white paper details how one financial services company was able to improve storage performance and security by implementing an all-flash array. Read on to learn how this company was able to achieve lowered latency, consistent performance of financial applications, resiliency, and more.
Posted: 24 Aug 2015 | Published: 31 Jul 2014

IBM

The Data-Driven Organization: How to Unlock Greater Value from Data
sponsored by Commvault
WHITE PAPER: This white paper explores today's data management challenges in the context of the 3rd Platform, particularly around cloud and Big Data/analytics, and explains how organizations can drive real value from their data.
Posted: 24 Aug 2015 | Published: 24 Aug 2015

Commvault
1 - 25 of 2269 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement