IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2767 Matches Previous Page  |  Next Page
Case Study: NCG Safeguards Learning Experience for Students with UDP
sponsored by arcserve
CASE STUDY: NCG, an education organization, decided to implement a Unified Data Protection (UDP) solution with robust deduplication and compression features to solve their data management struggles. Discover how a UDP solution can safeguard your data and enable your enterprise to save significantly in terms of storage space, staff time, and licensing fees.
Posted: 27 Jun 2016 | Published: 29 Feb 2016

arcserve

Case Study: Konvert Reduces Business Risk and Simplifies IT Management withUDP
sponsored by arcserve
CASE STUDY: Witness how Konvert, an employment agency, replaced their existing, unstable backup with a Unified Data Protection (UDP) solution for better backup management across all of their offices. Explore how this solution enabled Konvert to minimize data storage requirements, simplify backup management, speed up data recovery, and more.
Posted: 27 Jun 2016 | Published: 31 Mar 2016

arcserve

VM Data Protection for Dummies
sponsored by Veeam and Quantum
EBOOK: Discover innovative, modern data protection solutions for data in virtualized environments and explore best practices for choosing the VM protection solution that's right for your enterprise. With the right solution, your enterprise can cost-efficiently secure your virtual environments and backup your data.
Posted: 27 Jun 2016 | Published: 27 Jun 2016

Veeam and Quantum

The Top Five Requirements for Secure Enterprise File Sync and Sharing
sponsored by Citrix
WHITE PAPER: Making sure you can provide secure I.T. oversight is the first step in considering a file sync and share solution for your organization. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for next-generation workspaces.
Posted: 24 Jun 2016 | Published: 01 May 2016

Citrix

Case Study: Hunters Safeguards 150TB of Architectural Data with Arcserve UDP
sponsored by arcserve
CASE STUDY: In this case study, witness how Hunters, a consultancy firm, implemented a Unified Data Protection (UDP) solution that automatically generated backup reports and minimized their storage requirements and costs with integrated deduplication capabilities.
Posted: 24 Jun 2016 | Published: 29 Feb 2016

arcserve

EMEA: Rethinking the Cyber Security Disconnect to Save Money
sponsored by VMware
WHITE PAPER: Discover five ways you can improve your security posture today and instruct employees on more secure data handling. Learn why it's important for business leaders in Africa, Europe, and the Middle East to understand cyber security as a top priority and ultimately save money in mitigating threats rather than reacting to them.
Posted: 24 Jun 2016 | Published: 01 May 2016

VMware

IBM Security QRadar: SIEM Product Overview
sponsored by IBM
EGUIDE: In this e-guide, expert Karen Scarfone looks at QRadar, IBM's enterprise security information and event management (SIEM) tool. Learn how its features allow you to easily collect log data from hosted assets, operating systems, applications, vulnerabilities and user behavior.
Posted: 23 Jun 2016 | Published: 01 May 2016

IBM

Top 10 Reasons to choose EMC Data Protection Solutions
sponsored by Richardson Eyres
WHITE PAPER: Learn 10 reasons why changing your data protection platform to enable efficiency and TCO is a must. Discover enterprise-class data protection across on premise, virtualized, hybrid, and cloud consumption models.
Posted: 23 Jun 2016 | Published: 01 May 2016

Richardson Eyres

The Axway MFT Solution Transcript
sponsored by Axway
WHITE PAPER: It's critical your organization implements MFT to manage and secure the giant wave of data moving forward. MFT is innovating, securing and optimizing business for the future. Whether your organizational value is banking transactions, trades, manufacturing, etc., MFT can increase customer satisfaction and engagement.
Posted: 23 Jun 2016 | Published: 01 May 2016

Axway

Axway Use Cases- Transcript
sponsored by Axway
WHITE PAPER: Learn how a globally recognized watch manufacturer is maintaining its brand equity and commerce with global partners. See how they optimized the transfer, communication and security of information from HQ to their partners.
Posted: 22 Jun 2016 | Published: 01 May 2016

Axway

MFT as a Shared Service- Transcript
sponsored by Axway
TRANSCRIPT: Learn how to meet this bandwidth demand head-on. See how managed file transfer as a service can actually help industries in trying to navigate this explosion of data in the digital space more clearly and securely.
Posted: 22 Jun 2016 | Published: 01 May 2016

Axway

Best Practices for Safeguarding Patient Records and Sensitive Information
sponsored by Symantec Corporation
WHITE PAPER: In this exclusive white paper uncover the 101 on safeguarding patient records and sensitive information. Read on to learn about topics like, managing data on-premises and in the cloud, data loss prevention, and much more.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Symantec Corporation

Unlocking the Lucrative Criminal Business Model: An Analyst Report
sponsored by Palo Alto Networks
ANALYST REPORT: Cryptographic ransomware has quickly become one of the greatest cyberthreats facing organisations around the world. Access this analyst report to properly understand today's brand of ransomware, examine the future of ransomware, and identify 6 key strategies with which you will execute your defense.
Posted: 22 Jun 2016 | Published: 22 Jun 2016

Palo Alto Networks

eCommerce Payments 101 (Part 2)
sponsored by CyberSource
VIDEO: Tune into this brief video to discover how to automate payment operations while simplifying fraud management and payment security. Watch this tutorial to streamline the efficiency of payroll in your financial organization, and get the lowdown on securing online payments.
Posted: 22 Jun 2016 | Premiered: 16 Jan 2015

CyberSource

Data Refinement: Facilitating the data-driven organization
sponsored by IBM
WHITE PAPER: This comprehensive Forrester report found that well-planned and executed data refinement is the new benchmark of success. Read on to learn more about data refinement including key aspects, where you should place your investments, and how to make it work for your business.
Posted: 22 Jun 2016 | Published: 30 Jun 2015

IBM

Top Reasons Why Customers Deploy Hybrid Storage
sponsored by EMC and Netsync
WHITE PAPER: Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology.
Posted: 21 Jun 2016 | Published: 30 Apr 2016

EMC and Netsync

Top Reasons Why Customers Deploy Hybrid Storage
sponsored by TechData - EMC
WHITE PAPER: Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology.
Posted: 21 Jun 2016 | Published: 30 Apr 2016

TechData - EMC

Top Reasons Why Customers Deploy Hybrid Storage
sponsored by EMC and Arraya
WHITE PAPER: Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology.
Posted: 21 Jun 2016 | Published: 30 Apr 2016

EMC and Arraya

Top Reasons Why Customers Deploy Hybrid Storage
sponsored by EMC and Wrightcore
WHITE PAPER: Discover a modern, hybrid storage solution that combines built-in data protection, cloud-based management, and all inclusive software to deliver the price and performance needs of your data center. See the benefits your enterprise can take advantage of with this technology.
Posted: 21 Jun 2016 | Published: 30 Apr 2016

EMC and Wrightcore

Robust Payment Security Builds Customer Confidence in your Brand
sponsored by CyberSource
WHITE PAPER: Frictionless payment transactions are key to your competitive advantage. Discover ways to avoid the costly risks of storing sensitive payment data by using various credential-based payment models.
Posted: 20 Jun 2016 | Published: 20 Jun 2016

CyberSource

Mobile Data Security Threats: Hype vs. Reality
sponsored by Lookout
EGUIDE: As threats such as mobile malware evolve, so do the tools to combat them. It's a chess match, and you must stay well-educated to ensure protection. In this e-guide, learn about today's common mobile threats so you can prepare your network to combat them.
Posted: 20 Jun 2016 | Published: 14 Jun 2016

Lookout

A Comprehensive, Innovative Approach to Mobile Security
sponsored by Unisys
WHITE PAPER: Because of new mobile threat vectors, security at the device-level is no longer enough. Discover how to strengthen your mobile endpoints from the inside-out with software-defined security, securing mobile data along the entire path to the destination server.
Posted: 20 Jun 2016 | Published: 30 Sep 2015

Unisys

Object Storage Erasure Coding and Self Protecting Technologies
sponsored by HGST
WHITE PAPER: Scale-out object storage solution can provide disk-based access performance with high levels of durability, scalability, and simplicity. Discover how this storage system can enable your enterprise to simplify your storage architecture and take advantage of your data without requiring your budgets to significantly increase.
Posted: 20 Jun 2016 | Published: 30 Apr 2016

HGST

Object Storage Architecture Removes File Crawl Issues
sponsored by Cloudian
EGUIDE: In this expert guide, find out the many differences of object storage that make it that much more efficient and economical fit for your enterprise, such as active or cold archiving, search, analytics, and more.
Posted: 20 Jun 2016 | Published: 06 Jun 2016

Cloudian

Customer Use Cases: Implementing Unified Data Protection Solutions
sponsored by arcserve
EGUIDE: In this e-guide, witness how two institutions in the UK streamlined their data backup and recovery systems by implementing a Unified Data Protection (UDP) solution with physical and virtual server backup. Discover the benefits they achieved and how they successfully integrated this solution.
Posted: 27 Jun 2016 | Published: 24 Jun 2016

arcserve
1 - 25 of 2767 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement