IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed    Add to Google    Add to My Yahoo!
Secure Data White Papers (View All Report Types)
 
9 Best Practices to Build a Digital Business Architecture
sponsored by Axway
WHITE PAPER: APIs can help you leverage third-party development talent and encourage collaboration, but there are several security and performance issues you have to address in order to ensure responsible, effective use of APIs. Discover 9 best practices to optimize your digital business architecture with APIs.
Posted: 12 Apr 2016 | Published: 31 Dec 2015

Axway

Some Deduplication Solutions Skimp on Security – Yours Doesn't Have To
sponsored by Sempre Technologies Ltd
WHITE PAPER: This white paper highlights security features in data deduplication, and why it matters to you. Access this resource now and learn about encryption capabilities that protect data being replicated from one system to another, while preserving deduplication bandwidth.
Posted: 30 Mar 2016 | Published: 30 Sep 2015

Sempre Technologies Ltd

Build A High-Performance, Customer-Obsessed Security Organization
sponsored by AllClear ID
WHITE PAPER: This white paper provides CISOs with an end-to-end look at what it takes to build a high-performance security practice. Access now to learn how to build a risk management framework that's designed to support changing business models and retain customer trust.
Posted: 28 Apr 2016 | Published: 09 Feb 2016

AllClear ID

Top 5 Reasons to Refresh your Data Domain
sponsored by Sempre Technologies Ltd
WHITE PAPER: In the following brief, yet informative white paper, uncover five compelling reasons to trade up to the next generation Data Domain system.
Posted: 04 Apr 2016 | Published: 04 Apr 2016

TOPICS:  Data Security
Sempre Technologies Ltd

Backup and Recovery for SAP with Oracle Environments
sponsored by EMC & NextNet
WHITE PAPER: In this white paper, review the EMC data protection suite, which features the necessary SAP integration and support to make backup and recovery more efficient and easier to manage. Read on to discover the new features this technology can provide to your enterprise's backup solution.
Posted: 10 Mar 2016 | Published: 30 Sep 2015

EMC & NextNet

Drive Performance Up and the Cost of Hybrid Flash Down with Deduplication
sponsored by EMC
WHITE PAPER: This white paper highlights a solution that offers simple and flexible data deduplication management while providing efficient storage utilization to the applications that can take advantage of the technology. Learn how this solution can improve your enterprise's overall data center efficiency and storage infrastructure management.
Posted: 24 Mar 2016 | Published: 31 Aug 2015

EMC

Top Reasons to Choose EMC Isilon Scale-Out NAS
sponsored by EMC
WHITE PAPER: This white paper highlights 8 reasons why your enterprise should consider investing in a scale-out NAS solution with a single volume, single file system architecture. Access now and discover how you can improve your storage scalability, efficiency, and flexibility, and expand your data lake.
Posted: 21 Apr 2016 | Published: 31 Jan 2016

EMC

Operationalizing Data Governance with Living Metadata
sponsored by ERwin
WHITE PAPER: This white paper teaches you the importance of updating and reviewing your organization's metadata regularly. Explore best practices in maintaining "living" metadata platforms.
Posted: 07 Apr 2016 | Published: 01 Mar 2016

ERwin

Gartner Market Guide for Data-Centric Audit and Protection (DCAP).
sponsored by IBM
WHITE PAPER: This white paper helps CISOs identify emerging data-centric audit and protection tools that they can apply across their data silos. Access now to identify the data security controls required to mitigate risks and threats to your sensitive data.
Posted: 26 Apr 2016 | Published: 15 Dec 2015

IBM

Your Legal Liability Following a Cybersecurity Breach
sponsored by SurfWatch Labs
WHITE PAPER: This resource explores recent legal rulings that put more pressure on organizations to develop a comprehensive cyber risk management program. Read on to discover how an effective threat intelligence strategy can enable you to defend against the growing litigation that inevitably results from being the victim of a cyberattack.
Posted: 01 Apr 2016 | Published: 01 Apr 2016

SurfWatch Labs
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement