IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Base Encryption

RSS Feed    Add to Google    Add to My Yahoo!
Data Base Encryption Reports
 
Network Encryption and its Impact on Enterprise Security
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: This white paper explores why SSL/TSL decryption and inspection methodologies are being abandoned in favor of more strategic approaches. View now to learn the three crucial characteristics of and how to improve the resiliency and performance of your network security strategy.
Posted: 06 Apr 2015 | Published: 11 Feb 2015

Symantec & Blue Coat Systems

Data Sovereignty Challenges
sponsored by VMware
WHITE PAPER: As countries adopt their own unique data sovereignty laws, its important companies remain cognizant of where their data is stored to avoid international ramifications. In this brief infographic, learn about the projected growth of cloud, international data flow and key steps countries have taken to instate compliance measures for data access.
Posted: 17 Aug 2016 | Published: 17 Aug 2016

VMware

Top 10 Reasons Quorum Beats the Competition
sponsored by QuorumLabs Inc.
PRODUCT REVIEW: Discover how Quorum's backup and disaster recovery solution can benefit your enterprise and how they compare to the competition.
Posted: 08 Feb 2017 | Published: 08 Feb 2017

QuorumLabs Inc.

Provide Secure, Ubiquitous Data For Your Users, Or Face The Consequences!
sponsored by SearchSecurity.com
EBRIEF: This E-Brief from SearchConsumerization.com explores the issues of data management and how enterprise-level file sharing and syncing solutions can allow corporate data to be safely managed on employee-owned devices.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

SearchSecurity.com

Building confidence in data security
sponsored by ComputerWeekly.com
ANALYST REPORT: Businesses need to engage online with users from external organisations and mobile workers about data security. Analysts Bob Tarzey and Clive Longbottom explain why.
Posted: 12 Jan 2016 | Published: 12 Jan 2016

ComputerWeekly.com

Your data on the move: secure mobile devices in your network
sponsored by Vera
EGUIDE: In this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.
Posted: 15 Feb 2016 | Published: 12 Feb 2016

Vera

After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
sponsored by Lumension
WHITE PAPER: This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Lumension

An Expert Guide to Data Archiving with the Hybrid Cloud
sponsored by Microsoft
RESOURCE: In this resource, you will discuss the newest technologies used for digital archiving, and discover how the Microsoft hybrid cloud solution (HCS) can be used to archive data to Windows Azure Storage. Access this resource chapter to utilize cloud replication services that provide DR protection.
Posted: 07 Jan 2016 | Published: 07 Jan 2016

Microsoft

Top 5 Questions Answered on How to Best Protect Your Data in the Cloud
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Discover the top 5 questions (and answers) you need to consider when crafting your cloud security strategy. The sad truth is there is no silver bullet to keep your data safe, but there are simple steps to keep hackers out. View now to find out what they are.
Posted: 05 Jan 2016 | Published: 18 Nov 2015

Symantec & Blue Coat Systems

Developing Your Authentication Strategy
sponsored by i-Sprint Innovations
WHITE PAPER: This white paper offers advice for protecting your data with several authentication strategies.
Posted: 03 Jun 2014 | Published: 31 Dec 2013

i-Sprint Innovations
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement