IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed    Add to Google    Add to My Yahoo!
Secure Data White Papers (View All Report Types)
 
2017 Unisys Security Index Australia Supplemental Research
sponsored by Unisys
WHITE PAPER: Telsyte estimates that Australian households are expected to have 311 million connected devices by 2021. This white paper identifies Australians' security concerns regarding IoT and data protection.
Posted: 29 Sep 2017 | Published: 29 Sep 2017

Unisys

Anatomy of a Cyberattack
sponsored by Infocyte
WHITE PAPER: According to Ponemon, the cost of a data breach is significantly less if you contain it within 30 days. Check out this white paper to uncover the anatomy of cyberattacks to see where different "hunt tools" can be used for your protection to detect data breaches early.
Posted: 05 Sep 2017 | Published: 05 Sep 2017

Infocyte

Your Employee Security Checklist: 10 Tips
sponsored by Kaspersky Lab
WHITE PAPER: Careless employees were the single biggest cause of serious incidents involving data loss or leakage— involved in 1 in 5 serious data breaches. Find 10 tips for employee security to prevent serious incidents at the employee level.
Posted: 01 Sep 2017 | Published: 01 Sep 2017

Kaspersky Lab

GDPR Compliance: How Can You Adapt to the New Regulation?
sponsored by CA Technologies.
WHITE PAPER: The General Data Protection Regulation (GDPR) is set to begin in May 2018 – is your organization ready to comply? Learn from a technology perspective what's needed to comply with the GDPR. Topics covered include data breach reporting, accountability, rights and more.
Posted: 08 Sep 2017 | Published: 08 Sep 2017

CA Technologies.

5 Tips to Slay the Cloud Disaster Recovery Dragon
sponsored by Commvault
WHITE PAPER: As more companies look to the cloud to handle the onslaught of data, current cloud-based data recovery strategies are leaving a lot to be desired. Cloud-based DR may look like a monstrous dragon to some, but this white paper offers five control tips to a more fully enveloped cloud DR strategy. Read on here. .
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Commvault

A Practical Guide for GDPR Compliance
sponsored by Smarsh
WHITE PAPER: GDPR is coming fast and complying with the regulation is not optional. In this research report, discover why GDPR is important, the essential requirements of it, and a checklist for GDPR compliance.
Posted: 06 Oct 2017 | Published: 31 Jul 2017

Smarsh

Synchronized Security: Best-of-breed defense that's more coordinated than attacks
sponsored by Sophos, Inc.
WHITE PAPER: Today's attacks are more sophisticated and coordinated than ever. According to ESG Group, 46% of organizations believe they have a problematic shortage of cybersecurity skills. Inside, learn how to protect against known and emerging threats.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Sophos, Inc.

Securely Managing your UNIX Environment
sponsored by One Identity
WHITE PAPER: Take a look at this white paper to uncover how IAM challenges within UNIX can be overcome with the right practices and tools.
Posted: 22 Sep 2017 | Published: 22 Sep 2017

One Identity

A 5 Minute Guide to Security for Cognitive Search and Knowledge Management
sponsored by Attivio, Inc.
WHITE PAPER: Examine the resurgence of knowledge management, in conjunction with cognitive search and security, as a viable option for coordinating the vast amounts of information buried in big data environments.
Posted: 13 Sep 2017 | Published: 13 Sep 2017

Attivio, Inc.

GDPR Compliance: The Implications for Test Data Management
sponsored by CA Technologies.
WHITE PAPER: Learn about the key implications of GDPR regulations for test data management and explore topics like data masking, synthetic data generation, and more.
Posted: 11 Sep 2017 | Published: 31 Dec 2016

CA Technologies.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement