IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed    Add to Google    Add to My Yahoo!
Secure DataWhite Papers (View All Report Types)
 
How to Improve Disaster Recovery with Object Storage
sponsored by SwiftStack
WHITE PAPER: In this whitepaper, you'll discover two particular use cases in which object storage is changing the dynamics of disaster recovery.
Posted: 01 Dec 2014 | Published: 01 Dec 2014

SwiftStack

Securing your company's digital assets so they don't fall into the wrong hands
sponsored by K2
WHITE PAPER: Access this brief paper to learn how Square Enix Europe, a video game creator, improved the security of its mastering request process, which ultimately helped the company ensure top quality of its products.
Posted: 25 Nov 2014 | Published: 31 Dec 2013

K2

All you need to know about Bash bug and how to protect your data with IBM Endpoint Manager
sponsored by IBM
WHITE PAPER: This white paper examines how the "Bash bug" allows attackers to execute malicious code within a bash shell, allowing them to gain access to confidential information by taking control of the operating system. It also highlights how you can better identify which systems are vulnerable and protect your endpoints and data from this bug.
Posted: 11 Nov 2014 | Published: 26 Sep 2014

IBM

Magic Quadrant for Mobile Data Protection
sponsored by Digital Guardian
WHITE PAPER: This informative resource from Gartner compares mobile data protection solutions from a number of reputable companies, which defend access to secure data on storage systems in notebooks, removable media, desktops, and servers.
Posted: 02 Dec 2014 | Published: 08 Sep 2014

Digital Guardian

How Frequently Should you Conduct Failover Testing?
sponsored by Symantec Corporation
WHITE PAPER: This expert e-guide details the importance of failover testing for disaster recovery processes and possibly hurdles to regular testing such as time, personnel, or budgets.
Posted: 02 Dec 2014 | Published: 02 Dec 2014

Symantec Corporation

Weighing Risk Against the Total Cost of a Data Breach
sponsored by Akamai Technologies
WHITE PAPER: This white paper provides an approach to determine the risk of web application cyber-attacks that could potentially affect your company.
Posted: 11 Nov 2014 | Published: 01 Aug 2014

Akamai Technologies

Top 5 Facts to Know About Data Protection from SafeNet
sponsored by SafeNet, Inc.
WHITE PAPER: This infographic showcases 5 facts about SafeNet, a leading provider of data protection solutions. View now to learn about the protection that SafeNet could bring to your organization's sensitive data.
Posted: 15 Dec 2014 | Published: 15 Dec 2014

SafeNet, Inc.

Measuring ROI for Online Backup & Recovery
sponsored by Hewlett-Packard Limited
WHITE PAPER: Access this white paper to learn about the savings you'd see with a move to cloud data protection. You'll get insight into how you can avoid the operational costs of server backup and recovery by investing in cloud server data protection. You'll also learn how cloud data protection is better suited for meeting modern backup and recovery demands.
Posted: 13 Nov 2014 | Published: 16 Aug 2011

Hewlett-Packard Limited

Post Breach Industry Report: A Real-world View of Ongoing Cyber Security Attacks
sponsored by Vectra Networks
WHITE PAPER: This informative report uses real-world data to reveal what attackers do within a network once they evade perimeter defenses.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Vectra Networks

Best Practices to Help Overcome Cloud Security Concerns
sponsored by CDW Corporation
WHITE PAPER: This report gives your IT shop a better understanding of the threats against cloud technologies, as it highlights 9 top threats along with their implications to enterprise security and possible solutions to address each threat.
Posted: 27 Oct 2014 | Published: 27 Oct 2014

CDW Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement