IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Base Encryption

RSS Feed    Add to Google    Add to My Yahoo!
Data Base EncryptionWhite Papers (View All Report Types)
 
Taking Your Enterprise Mobile: The Executive Checklist
sponsored by Citrix
WHITE PAPER: Read on to find an executive checklist that will help you ensure that you are ready to handle both enterprise mobility and bring-your-own-device programs.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

Citrix

PGP Whole Disk Encryption - Proactively secure confidential data on disks and removable media
sponsored by PGP Corporation
WHITE PAPER: PGP Whole Disk Encryption provides enterprises with comprehensive, nonstop disk encryption for Microsoft Windows and Apple Mac OS X, enabling quick, cost-effective protection for data on desktops, laptops, and removable media. The encrypted data is continuously safeguarded from unauthorized access, providing strong security.
Posted: 03 Feb 2010 | Published: 03 Feb 2010

PGP Corporation

Securing Data Stored On Tape With Encryption
sponsored by Quantum Corporation
WHITE PAPER: With companies storing data for longer periods of time to meet compliance regulations and business best practices, the inherent risk of a data breach is growing significantly. Organizations should develop sound encryption key management processes to minimize administrative overhead and maximize the value of data encryption.
Posted: 08 Oct 2009 | Published: 01 Jul 2009

Quantum Corporation

Is Your Data at Risk?: Why Physical Security is Insufficient for Laptop Computers
sponsored by Sophos, Inc.
WHITE PAPER: Evaluating the various data security options to protect your PCs can be challenging. This paper examines the options, discusses why passwords alone are not sufficient and makes the case for strong data encryption.
Posted: 17 Jul 2009 | Published: 01 Jun 2009

Sophos, Inc.

Controlling High Fraud Risk of International Transactions iovation Reputation Services
sponsored by iovation, Inc.
WHITE PAPER: Iovation has pioneered a technology for online fraud screening. This white paper examines how e-Commerce businesses can fight online fraud without turning away business based on the geographic locations of customers.
Posted: 13 Oct 2008 | Published: 01 May 2007

iovation, Inc.

Five Best Practices for Protecting Backup Data
sponsored by Iron Mountain.
WHITE PAPER: Backup encryption should be a key element in any security strategy. To achieve that goal, corporations should follow five best practices. This paper details them.
Posted: 30 Jun 2010 | Published: 30 Jun 2010

Iron Mountain.

Secure File Transfer in the Era of Compliance
sponsored by Ipswitch WhatsUp Gold
WHITE PAPER: Regulatory compliance mandates are forcing organizations to document all their business processes. This white paper outlines a new class of file transfer solutions, which provide secure and reliable exchange of business information.
Posted: 01 Aug 2007 | Published: 30 Jul 2007

Ipswitch WhatsUp Gold

Drive Disposal Best Practices: Guidelines for Removing Sensitive Data Prior to Drive Disposal
sponsored by Seagate Technology
WHITE PAPER: When a hard drive is disposed, many times, the data is not fully removed - leading to serious consequences. This white paper provides guidelines and best practices to assist you in properly removing data on your hard drives prior to their disposal.
Posted: 13 Nov 2007 | Published: 01 Nov 2007

Seagate Technology

The New Encryption Generation: Closing the Gap
sponsored by CREDANT Technologies
WHITE PAPER: This white paper examines the limitations of first-generation encryption processes that often deliver less-than-promised performance, spur user resistance, conflict with operational infrastructure and process requirements.
Posted: 23 Sep 2008 | Published: 23 Sep 2008

CREDANT Technologies

Stopping data leakage: Exploiting your existing security investment
sponsored by Sophos, Inc.
WHITE PAPER: This paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
Posted: 01 Oct 2008 | Published: 01 Jun 2008

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement