IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Encription

RSS Feed    Add to Google    Add to My Yahoo!
Data EncriptionReports
 
Jericho Forum: Data Protection
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Data protection needs to provide stronger, more flexible protection mechanisms around the data itself, the Jericho Forum/Open Group argues in this report.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

ComputerWeekly.com

Encryption Strategies: Decoded
sponsored by Iron Mountain
WHITE PAPER: Find out exactly how and why in this white paper. Discover best practices for determining what data is most important and should be encrypted, learn exactly how encryption works and receive a checklist of three critical aspects of any encryption plan. Read on to learn more.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

Iron Mountain

Secure your data – protect your business
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide for C-level executives explains the risks faced by businesses and the practical solutions they can take to secure their data.
Posted: 12 Nov 2012 | Published: 12 Nov 2012

ComputerWeekly.com

Stopping Data Leakage: Making the Most of Your Security Budget
sponsored by Sophos, Inc.
WHITE PAPER: This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefits of encryption in securing data in the event that it does get stolen or lost.
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

Data Security and Privacy Concerns Pushed into the Spotlight
sponsored by GeoTrust, Inc.
EGUIDE: In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

GeoTrust, Inc.

FAQ Guide: Data Backup & Security Pain Points
sponsored by Quantum Corporation
EGUIDE: This FAQ Guide can help you get started on the right path to securing your stored and backed up data. Access it now to find questions and answers about data encryption challenges and appliances, cloud storage security, and tape, host-based or disk encryption approaches.
Posted: 31 Oct 2012 | Published: 31 Oct 2012

Quantum Corporation

IT in Europe - May 2012
sponsored by SearchNetworking.co.UK
EZINE: While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.
Posted: 22 Jun 2012 | Published: 15 Jun 2012


Expert Guide to Securing Emerging Endpoints
sponsored by Sophos, Inc.
EGUIDE: Encrypting enterprise laptops and other increasingly popular mobile devices is now common practice for users who store or interact with sensitive data. This expert e-guide takes an in-depth look at various data encryption methods and best practices for securing today’s emerging endpoints.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

Sophos, Inc.

Top Mobile Data Protection Best Practices
sponsored by McAfee, Inc.
EGUIDE: Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

McAfee, Inc.

Challenges With Data Protection in the Cloud
sponsored by Varonis
ANALYST BRIEF: This expert e-guide from SearchSecurity.com will help you discover the ways you can ensure better protection for your cloud-hosted data. Inside, you'll find out the major challenges involved with cloud security, as well as tips for protecting your intellectual property.
Posted: 12 Jun 2013 | Published: 12 Jun 2013

Varonis
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement