IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed    Add to Google    Add to My Yahoo!
Secure Data White Papers (View All Report Types)
 
Beyond Application Visibility and Control: What an NGFW Must Be
sponsored by Cisco Systems, Inc.
WHITE PAPER: Explore the ways in which digital transformation is changing businesses' security, and discover why typical NGFWs that focus primarily on app visibility offer an incomplete approach to threat defense. Read on to employ a NGFW that protects across the entire attack continuum, and integrates with existing security investments.
Posted: 12 Sep 2016 | Published: 12 Sep 2016

Cisco Systems, Inc.

Harnessing the Power of Metadata for Security
sponsored by Gigamon
WHITE PAPER: Discover how metadata, rich in context, can help analyze security metrics faster to enable rapid threat remediation. Learn how to enable more in-depth security analysis of traffic that is focused on the areas of concern, ultimately resulting in faster time to detection, response, and mitigation.
Posted: 23 Sep 2016 | Published: 31 Aug 2016

Gigamon

Uncovering the Risk of SAP Cyber Breaches
sponsored by Onapsis
WHITE PAPER: The purpose of this Ponemon Institue study is to understand the threat of an SAP cyber breach and how organizations are managing the risk of information theft, modification of data and disruption of business processes.
Posted: 25 Aug 2016 | Published: 01 Jul 2016

Onapsis

Allow Your Enterprise Greater Mobile App Security
sponsored by MobileIron
WHITE PAPER: This white paper explains how your enterprise can boost the security of its information across a variety of devices, without putting unnecessary restraints on growth or accessibility. Learn how you can Allow your IT admins disable keyboard options to block unrestricted access, simply track data usage, and more.
Posted: 13 Sep 2016 | Published: 13 Sep 2016

MobileIron

Grow Your Business with NetApp and Veeam
sponsored by Veeam Software
WHITE PAPER: Discover how NetApp and Veeam backup and recovery products can provide your enterprise with an efficient disaster recovery and availability solution. By combining these products, your enterprise can benefit from accelerated enterprise application performance, easy data protection and recovery, a cloud-ready data center, and more.
Posted: 14 Sep 2016 | Published: 30 Apr 2016

Veeam Software

Questions to Ask Your Cloud Service Provider: Know how your Data will be Protected in the Cloud
sponsored by Intel Security
WHITE PAPER: As you evaluate potential CSPs, keep these security, privacy, and operational questions in mind. Explore ways to determine who has access to your data, how your data is kept private, and more.
Posted: 22 Sep 2016 | Published: 22 Sep 2016

Intel Security

Bloor: For the EU's New Data Protection Regulation, Encryption Should Be the Default
sponsored by Vormetric
WHITE PAPER: This report by Bloor Research discusses the changes being made to the EU data protection landscape and suggests that encryption should be the default choice for protecting data. Discover how you can make it part of a comprehensive, consistent data security strategy.
Posted: 28 Jul 2016 | Published: 01 Jun 2016

Vormetric

Application Defense In Depth
sponsored by IMMUNIO, Inc.
WHITE PAPER: Discover how to build a layer of protection inside and around your apps. Learn how to control access, monitor activity, clean up input to your apps, and more.
Posted: 17 Aug 2016 | Published: 01 Jul 2016

IMMUNIO, Inc.

Aberdeen Group: Selecting Encryption for "Data at Rest" in Back-End Systems.
sponsored by Vormetric
WHITE PAPER: In this paper, the Aberdeen Group explores why full-disk encryption has become an attractive solution for the risks to data in use at the endpoints—and why file-level encryption is a better fit for the risks associated with data at rest in back-end systems.
Posted: 27 Jul 2016 | Published: 01 Jun 2015

Vormetric

Moving Beyond Masking and Subsetting: Realizing the Value of Test Data Management
sponsored by CA Technologies
WHITE PAPER: This paper describes common problems and potential benefits of Test Data Management (TDM) in a testing and development environment. Debunk assumptions that could be holding you back from better TDM, learn why masking production data is not a simple solution, and discover a more efficient and easier TDM policy for IT.
Posted: 22 Sep 2016 | Published: 31 Jul 2016

CA Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement