IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Encription

RSS Feed    Add to Google    Add to My Yahoo!
Data EncriptionReports
 
Challenges With Data Protection in the Cloud
sponsored by SearchSecurity.com
ANALYST BRIEF: This expert e-guide from SearchSecurity.com will help you discover the ways you can ensure better protection for your cloud-hosted data. Inside, you'll find out the major challenges involved with cloud security, as well as tips for protecting your intellectual property.
Posted: 12 Jun 2013 | Published: 12 Jun 2013

SearchSecurity.com

Securing Data at Rest with Encryption
sponsored by Amazon Web Services and Intel
WHITE PAPER: This white paper provides an overview of various methods for encrypting data at rest in Amazon Web Services (AWS).
Posted: 02 Sep 2014 | Published: 30 Nov 2013

Amazon Web Services and Intel

Customers Discuss Oracle Database Security
sponsored by Oracle Corporation
WEBCAST: Oracle customers, TransUnion, CMC Markets, Diamond Resorts International and National Marrow Donor Program, discuss defense-in-depth database security with data encryption, privileged user access control, data masking, and consolidated auditing and reporting.
Posted: 24 May 2012 | Premiered: May 24, 2012

Oracle Corporation

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014


The Evolution of Data Loss Prevention: Reducing Complexity
sponsored by BlueCoat
WHITE PAPER: In recent years, organizations have come to recognize the critical importance of safeguarding sensitive information. Read this white paper to discover the important role Data Loss Prevention (DLP) plays in maintaining the security of sensitive data.
Posted: 09 Sep 2010 | Published: 09 Sep 2010

BlueCoat

PCI DSS Compliance with Riverbed Stingray Traffic Manager and Stingray Application Firewall
sponsored by Riverbed Technology, Inc.
WHITE PAPER: PCI DSS is mandatory for any business that handles confidential cardholder data. Riverbed® Stingray™ Traffic Manager and Stingray Application Firewall Module help with many parts of the PCI DSS specification, notably the web application firewall (WAF) requirements of section 6.6.
Posted: 12 Jan 2012 | Published: 12 Jan 2012

Riverbed Technology, Inc.

7 Reasons Businesses are Shifting to Cloud Backup
sponsored by CoreVault
WHITE PAPER: Managing data has become one of the most important and complex IT challenges for businesses of all sizes. For many businesses, the best solution to these complex challenges is a simple one: Manage backup in the cloud. Check out this paper for the top seven reasons businesses are switching to cloud backup.
Posted: 04 Apr 2011 | Published: 04 Apr 2011

CoreVault

A Full-Service Network With Secure, Encrypted Communications
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this guide, discover how to design a full-service network with secure, encrypted communications with VPN technology.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Cisco Systems, Inc.

Acronis Backup & Recovery® 11.5 for Workstation
sponsored by Acronis
WHITE PAPER: This data sheet highlights the benefits of a backup solution for built for laptops and desktops.
Posted: 24 Feb 2014 | Published: 31 Mar 2013

Acronis

Understanding the Reasons Behind Data Loss Disasters
sponsored by Websense, Inc.
WHITE PAPER: While the importance of establishing the right IT systems and security policies have been expressed time and time again, a quick glance at the news headlines on data disasters reveal that not all organizations have a grasp on data leak protection. View this paper to explore some data loss incidents and the key leassons learned.
Posted: 02 Feb 2012 | Published: 02 Feb 2012

Websense, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement