IT Management  >   Systems Operations  >   Security  >  

Data Security

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, Data-security, Data Theft, Secure Data
DEFINITION: Ransomware is a type of malware used for data kidnapping, an exploit in which the attacker encrypts the victim's data and demands payment for the decryption key. A ransomware program can be installed from an e-mail attachment, an infected program, or a compromised or malicious Web site. Malware used for this purpose is sometimes called a cryptovirus, cryptotrojan or cryptoworm.Ransomware is not new.  … 
Definition continues below.
Data Security Reports
1 - 25 of 2515 Matches Previous Page  |  Next Page
Veritas Strengthens Position in Multicloud, Hybrid IT World with Cloud Data Management and Protection Strategies
sponsored by Veritas
WHITE PAPER: This IDC Market Perspective focuses on multicloud, hybrid IT world. By adding to its collaboration with AWS, Microsoft Azure, and Red Hat OpenStack, Veritas now has a partnership with Google and IBM, and is strengthening its position to provide holistic information management capabilities and data protection in the multicloud, hybrid IT world.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Veritas

4 Ways to Ensure a Smooth Windows 10 Migration
sponsored by Citrix
RESOURCE: Download this resource to discover a workspace suite that can help enable a smooth Windows 10 transition with a 4-pronged approach to address challenges with app migration, managing Windows 10 desktops, managing all devices, and securing company data.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Citrix

2017 Veritas GDPR Report Chapter 1
sponsored by Veritas
WHITE PAPER: According to the Veritas 2017 GDPR Report, 86% of organizations worldwide are concerned that a failure to adhere to the upcoming GDPR could have a major negative impact on their business.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Veritas

7 Features You'll Find in the Most Advanced DLP Systems
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Cloud services and mobile devices have made the challenges of safeguarding company data even more severe. Explore this white paper to find 7 key features to look for when evaluating a DLP system for your company.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Symantec & Blue Coat Systems

Anti-Virus Comparative
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Malicious software poses an ever-increasing threat, not only because the number of malware programs are increasing, but also due to the continuously changing threat-landscape. Key into this white paper to uncover results from the Malware Protection Test and the Exploit Test.
Posted: 16 Oct 2017 | Published: 31 Oct 2016

Symantec & Blue Coat Systems

Case Study: Hyundai Department Store Group
sponsored by Symantec & Blue Coat Systems
CASE STUDY: Hyundia faced the challenges of needing to comply with the South Korean Personal Information Protection Act and put customers at ease that their personal information would be protected. In this case study, explore how Hyundai overcame this issue by implementing improved data loss prevention strategies.
Posted: 16 Oct 2017 | Published: 16 Oct 2017

Symantec & Blue Coat Systems

Amazon Web Services: Overview of Security Processes
sponsored by Amazon Web Services
WHITE PAPER: You may be wondering, "how does AWS help ensure that my data is secure?" This document delivers the answer to this question and is intended to provide an overview of the security processes involved with Amazon Web Services.
Posted: 16 Oct 2017 | Published: 31 May 2017

Amazon Web Services

GDPR Strategy Guide
sponsored by Veritas
WHITE PAPER: By reading this white paper, you will uncover important details you'll need to know to ensure you are compliance ready by May 2018.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Veritas

5 Data Management Tips to Build a Successful Multi-Cloud Strategy
sponsored by Veritas
WHITE PAPER: Many organizations are utilizing a multi-cloud strategy but without proper data management, this environment can increase costs and business risk. Learn how to maximize the benefits of the multi-cloud environment through these 5 data management tips.
Posted: 13 Oct 2017 | Published: 28 Apr 2017

Veritas

The Buck Stops Where?
sponsored by BitSight
WHITE PAPER: By 2020, Gartner estimates that 75% of Fortune 500 companies will treat vendor risk management as a board-level initiative to mitigate brand and reputation risk. In this white paper, gain insight into how data breaches are affecting both large and small businesses and how these businesses can mitigate their risks of future data breaches.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

BitSight

11 Steps IT Needs to Take When Adopting Cloud Apps and Services
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Cloud apps introduce a new threat vector, with lots of credentials floating around that provide direct access to business critical data. This white paper provides planning strategies for adopting cloud apps as well as information on managing the human factor.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Symantec & Blue Coat Systems

New Zealand Transport Agency Customer Success Story
sponsored by OpenText
VIDEO: Watch this brief video case study to find out how the NZ Transport Agency used enterprise content management as a service (ECMaaS) to improve the way they store, share, protect, and manage digital information.
Posted: 13 Oct 2017 | Premiered: 13 Oct 2017

OpenText

Hydro Tasmania Customer Success Story
sponsored by OpenText
VIDEO: Watch this brief video case study to find out how Hydro Tasmania unified scattered information and resolved content inefficiencies in their SAP, ERP, and SharePoint environments.
Posted: 13 Oct 2017 | Premiered: 13 Oct 2017

OpenText

How Splunk Enables Fast Data Science for Cybersecurity Operations
sponsored by Splunk
WEBCAST: Discover how to bridge the gap between data scientists and security analysts to accelerate intelligence for cybersecurity operations. Plus, find out how Splunk's machine learning-enabled analytics provides a unified system for collecting, digesting, and querying data.
Posted: 12 Oct 2017 | Premiered: Sep 30, 2017

Splunk

Why Data Protection Is the Cornerstone of Modern Enterprise Security
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: According to IDC, by 2020, the amount of digital data is expected to reach 44ZB. In this white paper, explore various trends in data protection and security as well as an information-centric approach to data protection.
Posted: 12 Oct 2017 | Published: 12 Oct 2017

Symantec & Blue Coat Systems

A 5 Minute Guide to Cognitive Search for the Life Sciences
sponsored by Attivio, Inc.
WHITE PAPER: Learn about cognitive search platforms and find out how to analyze any type of data, integrate behavioral data to personalize user experiences, scale for big data, enhance data security, and more.
Posted: 11 Oct 2017 | Published: 11 Oct 2017

Attivio, Inc.

Endpoint Security - Market Quadrant 2016
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: By 2020, the endpoint security market is expected to grow over $5.8 billion. This report offers an analysis of the market for endpoint security.
Posted: 11 Oct 2017 | Published: 30 Nov 2016

Symantec & Blue Coat Systems

AWS Security Checklist
sponsored by Amazon Web Services
WHITE PAPER: Utilize these security checklists to help secure your AWS resources. Follow recommendations from AWS for the AWS Identity and Access Management (IAM) service, Amazon EBS Encryption, Amazon S3 Resources and much more.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Amazon Web Services

Introduction to AWS Security Processes
sponsored by Amazon Web Services
WHITE PAPER: This white paper offers an explanation of how AWS can help protect your data to the nth degree.
Posted: 10 Oct 2017 | Published: 30 Jun 2016

Amazon Web Services

Proofpoint Threat Response
sponsored by Proofpoint, Inc.
WHITE PAPER: How can you prevent security alerts and incidents from escalating into full-blown breaches? In this white paper, gain insight into the benefits of a threat response platform, and see how you can use it to prioritize and execute response actions.
Posted: 10 Oct 2017 | Published: 10 Oct 2017

Proofpoint, Inc.

AWS Security Best Practices
sponsored by Amazon Web Services
WHITE PAPER: Is your data protected from accidental or deliberate theft, leakage, integrity compromise, and deletion? In this white paper, explore best practices that you can leverage to build and define an Information Security Management System (ISMS) and learn how to protect your mission-critical information.
Posted: 09 Oct 2017 | Published: 31 Aug 2016

Amazon Web Services

Encrypting Data at Rest
sponsored by Amazon Web Services
WHITE PAPER: This white paper provides an overview of different methods for encrypting your data at rest. Uncover 3 approaches on how encryption keys are managed and where they are used, so you can decide which approach is best for you.
Posted: 09 Oct 2017 | Published: 30 Nov 2014

Amazon Web Services

Security at Scale: Governance in AWS
sponsored by Amazon Web Services
WHITE PAPER: Access this white paper to explore the security and governance features built into AWS services that enable you to incorporate security benefits and best practices in building your integrated environment with AWS.
Posted: 09 Oct 2017 | Published: 30 Oct 2015

Amazon Web Services

Secure Content Delivery with Amazon CloudFront
sponsored by Amazon Web Services
WHITE PAPER: As companies respond to cybercrime, compliance requirements, and a commitment to securing customer data, their adoption of SSLs and TLSs increases. Gain insight into how you can improve the security and performance of your APIs and applications (hint: Amazon CloudFront) while lowering your content delivery costs.
Posted: 09 Oct 2017 | Published: 30 Nov 2016

Amazon Web Services

Architecting for HIPAA Security and Compliance on Amazon Web Services
sponsored by Amazon Web Services
WHITE PAPER: AWS customers with HIPAA compliance requirements have a great deal of flexibility in how they meet encryption requirements for PHI. In this white paper, uncover HIPAA privacy and security rules and learn techniques for meeting compliance requirements.
Posted: 09 Oct 2017 | Published: 30 Sep 2017

Amazon Web Services
1 - 25 of 2515 Matches Previous Page    1 2 3 4    Next Page
 
DATA SECURITY DEFINITION (continued): …  A paper entitled "Cryptovirology: Extortion-Based Security Threats and Countermeasures," written by security experts at Columbia University and IBM, clearly outlined the concept back in 1996. In the past, though, data kidnappers targeted businesses rather than individuals. In March 2006, ransomware known as Crypzip or Zippo circulated to private users on the Internet. Recipients of the Trojan horse program also received an e-mail ransom note demanding $300, to be paid by electronic transfer, for the key required to unlock all their files.A newer type of ransomware uses a Trojan to encrypt files … 
Data Security definition sponsored by WhatIs.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement