IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Encription

RSS Feed    Add to Google    Add to My Yahoo!
Data EncriptionWhite Papers (View All Report Types)
 
When 'Secure enough' isn't enough
sponsored by Imation Corp.
WHITE PAPER: This white paper explains the reason why compliance alone may not be enough to provide the security you need, in order to prevent data breaches from occurring.
Posted: 24 Sep 2014 | Published: 01 Feb 2013

Imation Corp.

Industry Perspectives: The Impact of HIPAA and HITECH
sponsored by Symantec Corporation
WHITE PAPER: This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
Posted: 24 Apr 2014 | Published: 30 Jun 2011

Symantec Corporation

Three Key Steps to Achieving Mobile Security Harmony
sponsored by IBM
WHITE PAPER: In order to protect sensitive data, you'll need to take special care to ensure that you are implementing the robust controls needed to prevent both unintentional loss and malicious theft. Read this informative whitepaper in order to learn how to choose and implement data security controls effectively.
Posted: 10 Jun 2013 | Published: 10 Jun 2013

IBM

Why and How You Should Use a VPN
sponsored by Global Knowledge
WHITE PAPER: This resource explains why VPNs are instrumental in eliminating the risk of public wired and wireless connections; how to use VPN at home and on the go; and how to choose a VPN provider.
Posted: 27 Aug 2014 | Published: 27 Aug 2014

Global Knowledge

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014


New eGuide: How to Fully Protect Your Storage Environment
sponsored by Quantum Corporation
WHITE PAPER: Storage systems are severely susceptible to attack and it is time for organizations to rethink their security tactics. Read this eGuide to learn about concepts regarding storage security and solutions like encryption that can help defend against attack.
Posted: 28 Jan 2008 | Published: 28 Jan 2008

Quantum Corporation

Secure File Transfer in the Era of Compliance
sponsored by Ipswitch WhatsUp Gold
WHITE PAPER: Regulatory compliance mandates are forcing organizations to document all their business processes. This white paper outlines a new class of file transfer solutions, which provide secure and reliable exchange of business information.
Posted: 01 Aug 2007 | Published: 30 Jul 2007

Ipswitch WhatsUp Gold

Closing the Gaps in Enterprise Data Security: A Model for 360 degree Protection
sponsored by Sophos, Inc.
WHITE PAPER: This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations.
Posted: 17 Jul 2009 | Published: 01 Jun 2009

Sophos, Inc.

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

Security in the Cloud Planning Guide
sponsored by Intel
WHITE PAPER: Security is a top concern for businesses looking to implement a cloud computing environment throughout their systems.  This white paper provides a comprehensive guide on building security in the cloud from the ground up so you can ensure your data and platforms are protected.
Posted: 23 Feb 2012 | Published: 01 Sep 2011

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement