IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed    Add to Google    Add to My Yahoo!
Secure Data White Papers (View All Report Types)
 
GDPR and Citrix ShareFile
sponsored by Citrix
WHITE PAPER: The General Data Protection Regulation (GDPR) was approved and adopted by the EU Parliament in April 2016 with the goal to protect all EU citizens from privacy and data breaches. What is the scope of the GDPR? How does it impact your organisation? This white paper guides you so your organization can meet the needs of GDPR.
Posted: 18 Jul 2017 | Published: 27 Dec 2016

Citrix

The History of Ransomware
sponsored by KnowBe4
WHITE PAPER: Learn a brief history of ransomware, its evolution and the different malware families it's been a part of. By understanding where ransomware came from and how it's attacked in the past, you can best predict where it's going in the future and design an effective defense strategy for your organization.
Posted: 13 Dec 2016 | Published: 30 Nov 2016

KnowBe4

Achieving Security Through Data-Driven Intelligence: Splunk for Defense Overview
sponsored by Splunk
WHITE PAPER: In this product guide, learn how Splunk can be used for security purposes, allowing you to achieve security and efficiencies through data-driven intelligence.
Posted: 10 Aug 2017 | Published: 10 Aug 2017

Splunk

Reliable Data Protection Designed for Virtualized Environments
sponsored by Veeam Software
WHITE PAPER: Modernizing your data center can seem overwhelming, especially when you consider the exponential data growth you can expect to realize every year. Access this white paper to learn about data protection and backup for virtualized environments.
Posted: 31 May 2017 | Published: 29 Apr 2016

Veeam Software

3 Ways EFSS Enables Secure Content Collaboration for the Modern Mobile Workforce
sponsored by Citrix
WHITE PAPER: When your business doesn't provide adequate digital collaboration tools, your employees are likely to use their own – potentially compromising security. Read this informative whitepaper for three ways to improve employee collaboration while ensuring compliance with security policies.
Posted: 17 Jul 2017 | Published: 31 May 2017

Citrix

Middleware and Operating System Machine Data
sponsored by Splunk
WHITE PAPER: This white paper explores how to enhance your big data strategies so that you can derive actionable intelligence from your organization's machine data. Find out how to optimize the value you get from the machine data created by middleware and OS and support data security, analytics, and more.
Posted: 23 May 2017 | Published: 23 May 2017

Splunk

The Essential Guide Data Protection and Disaster Recovery
sponsored by Tintri
WHITE PAPER: Download this guide to understand the must-have storage features that are essential to modern DP and DR practices;provided are specific guidelines on what to look for, how to strategize DR in your organization, and more.
Posted: 24 Mar 2017 | Published: 24 Mar 2017

Tintri

What GDPR Means for Your Security Strategy
sponsored by Dell SecureWorks
WHITE PAPER: Due to the GDPR, compliance is mandatory by 25th May 2018. Access this whitepaper to discover what data security requirements are laid down by the GDPR, and how to ensure your organization is ready.
Posted: 20 Jun 2017 | Published: 20 Jun 2017

Dell SecureWorks

Cloud Security and Content Management: Box Case Study
sponsored by IBM
WHITE PAPER: Learn how to secure Box on the cloud, and in doing so yield more benefits than just keeping your data safe.
Posted: 06 Feb 2017 | Published: 06 Feb 2017

IBM

The Massive Mobile Migration
sponsored by IBM
WHITE PAPER: The move to mobile devices, data and apps to make work happen anytime, anywhere is continuing to experience massive adoption. Download this infographic to see the numbers you can't ignore this year.
Posted: 03 Mar 2017 | Published: 27 Apr 2016

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement