IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed    Add to Google    Add to My Yahoo!
Secure Data White Papers (View All Report Types)
2016 Cost of Data Breach Study United States
sponsored by IBM
WHITE PAPER: This Ponemon Institute Study includes data breach information over the past year from 64 organizations in 16 industry sectors located in the United States.
Posted: 01 Sep 2016 | Published: 01 Jun 2016


Protect Yourself from Antivirus: Why Traditional AV Doesn't Offer Meaningful Security Value
sponsored by Palo Alto Networks
WHITE PAPER: Traditional antivirus (AV) is no longer the solution to preventing endpoint breaches—it's the problem. Access this resource to learn why traditional AV no longer offers meaningful security value for your organization, and see how to get started protecting your endpoints without AV.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

Palo Alto Networks

sponsored by Trustwave
WHITE PAPER: Discover a better answer to target malware within this white paper. Learn how to protect against dynamic, cross-component malware threats and get a full view into your past with historical views of web usage and threats, malware detected and malicious activity blocked.
Posted: 17 Oct 2016 | Published: 30 Sep 2016


File Sync and Share with Backup and Recovery Functionality
sponsored by Intermedia
WHITE PAPER: Explore an enterprise file sync and share strategy with additional backup and recovery features to ensure an extra level of file resilience. See how this cost-effective solution can protect your enterprise data against any data-loss case, including both user error and threats to the environment.
Posted: 02 Sep 2016 | Published: 18 Mar 2016


Reeling in Ransomware Data Protection for You and Your Users
sponsored by Code42
WHITE PAPER: In this white paper, learn how you can protect your devices and negate the effects of ransomware. Explore how continuous endpoint backup enables IT to quickly and easily restore files to minutes before the infection, as well as ensures that those files are healthy with no end-user intervention required.
Posted: 26 Sep 2016 | Published: 26 Sep 2016


Battling Malware, Intrusion, and Insider Threats with Endpoint Data Protection
sponsored by Code42
WHITE PAPER: With the growing popularity of third-party apps and BYOD initiatives, it's becoming increasingly difficult to secure your data from malware. Use this white paper to explore the potential ways in which endpoint data protection can help you build a security network focused around saving each piece of data for reliable access and retrieval.
Posted: 26 Sep 2016 | Published: 26 Sep 2016


Avnet, Inc: Serving up Insight to Customers Faster than Ever with Data Analytics and Warehousing in the Cloud
sponsored by IBM
WHITE PAPER: Learn how to accelerate analytics and reporting with a cloud-based data warehousing platform that combines high-performance in-memory technology with in-database analytics processing. Download now to turn data into actionable insights, and fast.
Posted: 03 Oct 2016 | Published: 31 Dec 2016


8 Tips to Stay Ahead of the Top 2016 Data Protection Trends
sponsored by HDS and Veritas
WHITE PAPER: Data protection has never been more in the forefront, as information is the lifeblood and differentiator in a constantly changing world. Discover 8 tips to help you stay ahead of the top 2016 data protection trends, ultimately helping you innovate and create business value.
Posted: 13 Oct 2016 | Published: 30 Sep 2016

HDS and Veritas

Content Security in the Cloud Era
sponsored by Barracuda Networks
WHITE PAPER: Discover a cloud-based approach to content filtering and other benefits for network user and administrators. Learn the most effective new approaches to cloud security in the face of the changing security landscape.
Posted: 18 Oct 2016 | Published: 30 Sep 2016

Barracuda Networks

Tick! Tock! Have You Detected the Intruder Inside Your Network Yet?
sponsored by Dell Software
WHITE PAPER: In this precautionary white paper, get in the mind of a cyber attacker and learn the key ways for preventing a breach by quickly identifying suspicious behavior and containing the attackers inside your network. Also, learn about key benefits and limitations of both native tools and security information and event management (SIEM) solutions.
Posted: 03 Oct 2016 | Published: 01 Jul 2016

Dell Software
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement