IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed    Add to Google    Add to My Yahoo!
Secure Data White Papers (View All Report Types)
 
Best Practices for Your Disaster Recovery/Business Continuity Plan
sponsored by McKesson Corporation
WHITE PAPER: In this expert guide, discover 10 best practice tips to ensure your disaster recovery/business continuity plan meets your enterprise's data security needs. Also learn how backup and disaster recovery, historically treated as separately, are converging to provide a more cohesive data management plan.
Posted: 13 Sep 2016 | Published: 12 Sep 2016

McKesson Corporation

At-Risk Data in the Cloud: 3 Strategies to Stop the Data Bleed
sponsored by Absolute
WHITE PAPER: Learn about each type of insider threat and discover strategies to mitigate their impact on your organization. Visibility through routine scans to discover sensitive data in cloud-sync folders can help IT move from paranoia or a false sense of security to peace of mind.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Absolute

Top 10 Data Security Tips to Safeguard Your Business
sponsored by Absolute
WHITE PAPER: New IT trends typically advance faster than the processes to secure them. However, as high profile data breaches hit the headlines on a daily basis, data protection regulations are catching up. Discover 10 tips on how to safeguard your business.
Posted: 03 Nov 2016 | Published: 31 Oct 2016

Absolute

7 Steps to Protect Your Data Against Insider Threats
sponsored by Imperva
WHITE PAPER: Security teams can use this checklist to evaluate their current data security program and identify gaps pertaining to insider threats. Uncover a side-by-side list of ways to protect data and contain these threats.
Posted: 15 Nov 2016 | Published: 15 Nov 2016

Imperva

APIs and Mobile: Creating an Integrated Physical-Digital Consumer Experience
sponsored by TIBCO Software Inc.
WHITE PAPER: Learn how retailers are leveraging APIs to improve mobile strategies and enhance consumer engagement. Discover how APIs make your digital assets consumable in any sort of app across a variety of platforms, allowing you to improve customer experiences without sacrificing security for sensitive data.
Posted: 02 Dec 2016 | Published: 03 Oct 2016

TIBCO Software Inc.

Reasonable Security Best Practices: Learning From Notable Data Breaches
sponsored by Global Knowledge
WHITE PAPER: Has your company implemented "reasonable security"? If so, you should be able to avoid lawsuits and fines after a breach. But what is "reasonable security," and is there a definition?
Posted: 01 Dec 2016 | Published: 28 Nov 2016

Global Knowledge

Beyond Next-Gen: Defining Future-ready Endpoint Security
sponsored by TrendMicro
WHITE PAPER: In this ESG report, discover how to achieve your desired level of high fidelity to get the most out of your endpoint protection. Learn how other organizations are buying their endpoint protection and make determinations for your own endpoint solution moving forward.
Posted: 10 Nov 2016 | Published: 31 Oct 2016

TrendMicro

Why the Cloud Should Be Part of Your Data Protection Strategy
sponsored by Microsoft
WHITE PAPER: This white paper explores the role that the cloud plays in strong data protection strategies for agile IT organizations. Access now to learn more about a hybrid approach to data management and cloud-connected backups.
Posted: 01 Nov 2016 | Published: 31 Jul 2016

Microsoft

The Modern Cybercriminal's Attempt to Stay Undetected
sponsored by Dell SecureWorks
WHITE PAPER: This short infographic gives you an in-depth look at the timeline of the average data breach from penetration to detection. Learn the game plan of a cybercriminal looking to steal your data and prepare a defensive scheme of your own to stop hackers in any phase of the breach lifecycle.
Posted: 09 Sep 2016 | Published: 01 Aug 2016

Dell SecureWorks

Swisslos Increases Uptime, Improves Customer Experience and Security
sponsored by Splunk Services UK Ltd
WHITE PAPER: This case study explores how the international lottery company Swisslos found a scalable analysis program that could replace their outdated legacy system. Go inside to learn how they were able to respond quickly to security threats, significantly diminished overhead costs, cut-down on IT maintenance time, and more.
Posted: 03 Nov 2016 | Published: 03 Nov 2016

Splunk Services UK Ltd
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement