IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Base Encryption

RSS Feed    Add to Google    Add to My Yahoo!
Data Base Encryption Reports
 
The Investigatory Powers Act 2016 and Internet Connections Records
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
Posted: 09 May 2017 | Published: 09 May 2017

ComputerWeekly.com

Making Data Encryption and Rekeying Easier
sponsored by HyTrust
WHITE PAPER: Data encryption is fundamental to successful cybersecurity in modern enterprises. But in a recent study, companies cited budget, performance concerns, and lack of deployment knowledge as the top 3 barriers to implementing an encryption tool. Inside, learn sweat-free secrets to performing critical data security functions.
Posted: 26 Jul 2017 | Published: 26 Jul 2017

HyTrust

Protect Your Sensitive Data, Achieve Compliance In a Multi-Cloud World
sponsored by HyTrust
WHITE PAPER: Multi-cloud adoption is on the rise – a recent study found that 64% of survey respondents expect to use multiple cloud service vendors. With such a rising popularity, how do you protect your sensitive data, while also properly complying, in a multi-cloud future?
Posted: 25 Jul 2017 | Published: 25 Jul 2017

HyTrust

CW buyer's guide: context-aware security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11-page  Computer Weekly buyer's guide  looks at how organisations should approach context-aware security technologies and what business benefits they can deliver.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Security and Trust: The Backbone of Doing Business Over the Internet
sponsored by Symantec Website Security Solutions
WHITE PAPER: Carefully managing consumers' sensitive information is an essential part of online transactions. This informative resource helps you learn how you can gain the trust of your customers and keep their valuable information safe.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Symantec Website Security Solutions

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

BitGlass

A Case for IT Security: The Future of New EU Data Protection
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

ComputerWeekly.com

Empower Data Protection with File Encryption and Bring Your Own Collaboration
sponsored by FinalCode
EGUIDE: This e-guide examines a security software that will ensure the highest level of enterprise file protection by encrypting documents individually. Learn why breach training can minimize damage when hackers attack, and access exclusive tips for creating a data classification policy.
Posted: 23 Oct 2015 | Published: 23 Oct 2015

FinalCode

Data Loss Prevention: RFP Technology Decisions
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

An Expert Guide to Data Archiving with the Hybrid Cloud
sponsored by Microsoft
RESOURCE: In this resource, you will discuss the newest technologies used for digital archiving, and discover how the Microsoft hybrid cloud solution (HCS) can be used to archive data to Windows Azure Storage. Access this resource chapter to utilize cloud replication services that provide DR protection.
Posted: 07 Jan 2016 | Published: 07 Jan 2016

Microsoft
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement