IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed    Add to Google    Add to My Yahoo!
Secure DataWhite Papers (View All Report Types)
 
Prevent Data Leakage and Keep Business Users Happy
sponsored by BlackBerry
WHITE PAPER: This white paper explains how mobile device containerization technologies vary on a wide scale, and can significantly impact the effectiveness of enterprise mobility management (EMM).
Posted: 13 Aug 2014 | Published: 25 Jul 2014

BlackBerry

Top 5 Malware Trends for 2014 and How to Combat Them
sponsored by Webroot
WHITE PAPER: This white paper describes the top five malware trends that are expected to grow throughout this year and the ways that your enterprise can protect its sensitive data.
Posted: 18 Jul 2014 | Published: 18 Jul 2014

Webroot

Why You Need Backup and Disaster Recovery
sponsored by N-able Technologies
WHITE PAPER: This white paper explains the main threats to data and highlights the reasons that organizations adopt backup and disaster recovery solutions.
Posted: 31 Jul 2014 | Published: 31 Jul 2014

N-able Technologies

How to Stay Compliant with PCI DSS Standards
sponsored by LogRhythm, Inc.
WHITE PAPER: This white paper explores a solution that has plenty of experience in helping organizations improve their overall security and compliance standings while reducing costs.
Posted: 29 Jul 2014 | Published: 29 Jul 2014

LogRhythm, Inc.

Imprivata Cortext: Secure Communications Platform for Healthcare
sponsored by Imprivata
WHITE PAPER: This IDC Health Insights white paper, sponsored by Imprivata, presents key findings of interviews with three healthcare IT executives at Atlantic Health System, Carolinas Pathology Group, and Beaufort Memorial Hospital regarding the deployment of Imprivata Cortext, a secure communications platform.
Posted: 11 Jul 2014 | Published: 31 May 2014

Imprivata

Solitaire Interglobal-Platform Security Report-Tracked, Hacked, and Attacked
sponsored by IBM
WHITE PAPER: This white paper provides insight on the main behavioral characteristics of hardware and software used for security purposes.
Posted: 16 Jul 2014 | Published: 31 Dec 2013

IBM

Best Practices for Disaster Recovery Planning
sponsored by CommVault Systems, Inc.
WHITE PAPER: This expert e-guide explains the top 10 mistakes that organizations often make in terms of planning a disaster recovery process. It also gives tips on how to can avoid these mistakes as well as advice for selecting the proper operational scenario during disaster recovery testing to ensure a successful DR plan.
Posted: 15 Jul 2014 | Published: 15 Jul 2014

CommVault Systems, Inc.

Symantec Intelligence Report: Internet Security Threats - May 2014
sponsored by Symantec Corporation
WHITE PAPER: Read this Symantec Intelligence Report for an in-depth analysis of the trends in internet security that we have seen in the past year, including data on targeted attacks and data breaches; malware tactics; social media and mobile threats; and more.
Posted: 07 Jul 2014 | Published: 31 May 2014

Symantec Corporation

Mobile File Sharing: Balancing Productivity, Security, and Control
sponsored by Acronis
WHITE PAPER: This solution brief highlights the challenges organizations feel in the face of IT consumerization and BYOD trends. It also mentions one solution that improves the productivity of mobile file sharing without sacrificing security or compliance.
Posted: 21 Jul 2014 | Published: 31 Mar 2014

Acronis

Context-Aware Vulnerability Management: The Basics
sponsored by BeyondTrust Corporation
WHITE PAPER: This white paper outlines the benefits of context-aware vulnerability management solutions, and if it is the right security solution for your organization.
Posted: 01 Aug 2014 | Published: 31 Jan 2014

BeyondTrust Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement