IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Base Encryption

RSS Feed    Add to Google    Add to My Yahoo!
Data Base Encryption Reports
 
Tips for Accelerating EHR Systems and Improving Productivity
sponsored by Pure Storage
WHITE PAPER: When VDI implementations fail, the root cause is most often storage. This white paper highlights the ultimate storage strategy that provides the best virtual desktop experience for healthcare. Read now to find out how you can accelerate EHR systems, improve productivity, encrypt PHI, and more.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Pure Storage

Essential Enterprise Mobile Security Controls
sponsored by SearchSecurity.com
EGUIDE: How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

SearchSecurity.com

Carbonite: A Cornerstone For Ransomware Protection And Recovery
sponsored by Carbonite
WHITE PAPER: Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day and this number is only increasing. In this white paper learn how to reduce exposure to ransomware and the best practices involved in recovering from ransomware attacks.
Posted: 30 Dec 2016 | Published: 31 Dec 2016

Carbonite

Kicking off an e-health revolution
sponsored by ComputerWeekly.com
EGUIDE: It has been hailed as the next big thing for many years but, it is fair to say, e-health has failed to fulfill its potential. Issues around cost, ease of use and privacy have held back its adoption. Now, find out how Telefonica hopes to kick start the e-health revolution.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

ComputerWeekly.com

Security University: Database Security Issues
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: The start of many data security issues is, of course, the database. Here's a look at currently predominant types of database security vulnerabilities and how best to monitor database access to detect potential security incidents.
Posted: 10 Jun 2013 | Premiered: 10 Jun 2013

SearchSecurity.com

Industry Perspectives: The Impact of HIPAA and HITECH
sponsored by Symantec Corporation
WHITE PAPER: This white paper features a set of solutions that address not only compliance concerns, but the overarching risk potential in today's healthcare environments.
Posted: 24 Apr 2014 | Published: 30 Jun 2011

Symantec Corporation

Data Loss Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

TechTalk Presentation Transcript: Analyst Jon Toigo discusses tape media today
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: In this transcript of a Jon Toigo video, learn about tape's usefulness in areas like disaster recovery and archiving, and learn about options for tape encryption and best practices for optimizing your tape performance.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

Iron Mountain

Putting the Pieces Together: The Complete Picture of Hybrid Cloud Storage
sponsored by Microsoft
RESOURCE: This resource explains how the Microsoft HCS solution manages storage capacity and archives data by leveraging fingerprints as data objects that are accessed directly on Windows Azure Storage and on-premises. Read on now to access multiple deployment scenarios for Microsoft HCS.
Posted: 07 Jan 2016 | Published: 07 Jan 2016

Microsoft

May Technical Guide on PCI DSS Guidance
sponsored by SearchSecurity.com
EGUIDE: This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.
Posted: 08 May 2012 | Published: 07 May 2012

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement