IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Sensitive Personal Data

RSS Feed    Add to Google    Add to My Yahoo!
Sensitive Personal Data Multimedia (View All Report Types)
 
Secure, Scalable Content Collaboration
sponsored by IBM
VIDEO: This short video highlights how a CIO of a national leading bank improved critical steps of a loan application process to ensure sensitive customer information and documents are being handled in the best way. Gain ideas on how you can improve your content management processes to keep important information secure and help improve customer service.
Posted: 27 Jul 2016 | Premiered: 17 Mar 2016

IBM

Rabobank International Enabling Customers to Bank Safe With HP
sponsored by Hewlett-Packard Enterprise
WEBCAST: View this brief webcast to see what one financial industry leader sees as a solution fit for the security future of his organization, and how strategies involving big data and education can keep customers' money and data safe from cybercrime.
Posted: 27 Nov 2013 | Premiered: Nov 27, 2013

Hewlett-Packard Enterprise

Improving Passwords is Critical to Modern Security
sponsored by Verizon
VIDEO: Discover how hackers gain access to your networks using password vulnerabilities. In this short video you'll find out how to begin improving your defenses based on this prevalent, but easily manageable, vulnerability.
Posted: 27 Jun 2016 | Premiered: 04 May 2016

Verizon

Tale of the Tape: Moving Backup and Recovery to the Cloud
sponsored by Iron Mountain
VIDEO: Discover a cloud-based data replication solution that effectively protects and recovers data as well as boosts efficiency and connectivity. Watch and explore how this solution can allow your enterprise to simplify recovery and preserve data for the long-term.
Posted: 19 Jul 2016 | Premiered: 31 Aug 2015

Iron Mountain

Behavioral threat analytics
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: This school examines the kinds of products that fit into the real-time behavioral threat analytics approach to security and what we know so far about deploying them successfully.
Posted: 20 Jul 2016 | Premiered: 15 Jul 2016

SearchSecurity.com

The Importance of DDoS Mitigation
sponsored by Arbor Networks
WEBCAST: In this quick video see how important DDoS mitigation has become and what your organization can do to secure itself against these insidious types of attacks.
Posted: 17 Aug 2016 | Premiered: Nov 2, 2015

Arbor Networks

How to Conquer IT Costs with Portable Red Hat Enterprise Linux
sponsored by Red Hat
VIDEO: Tune into this video to learn how a transition to Red Hat Enterprise Linux can reduce costly downtime, migration time, and TCO in your organization. Take advantage of a platform that supports business-critical workloads with 99.999% uptime and creates scalable, high-performing IT for next-gen infrastructure.
Posted: 13 Jul 2016 | Premiered: 14 Apr 2014

Red Hat

The Top Five Requirements for Secure Enterprise File Sync and Sharing
sponsored by Citrix
WEBCAST: Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.
Posted: 28 Jun 2016 | Premiered: Jun 16, 2016

Citrix

Best Practices for Oracle Database High Availability and Data Protection
sponsored by Oracle Corporation
WEBCAST: Hear from Bill Callahan, Director and Principal Engineer of CCC Information Services, Inc. about integrated hardware and software from Oracle that can reduce the cost and complexity of HA, eliminate data loss, increase ROI, and more.
Posted: 12 Jul 2016 | Premiered: Dec 31, 2015

Oracle Corporation

What to Look for in a Security Partner
sponsored by Arbor Networks
WEBCAST: Learn the qualifications that a network security and management partner need to have. Uncover why DDoS is such a major threat, and how to reduce the risk these types of attacks pose to enterprise networks.
Posted: 18 Aug 2016 | Premiered: Mar 28, 2016

Arbor Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement