IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Privacy

RSS Feed    Add to Google    Add to My Yahoo!
Data PrivacyReports
 
Why You Can't Ignore Endpoint Backup Protection (TechTarget)
sponsored by Code42
WHITE PAPER: Hacked, stolen, or lost end-user devices means organizations are vulnerable to compliance failures, data loss, customer privacy breaches, damaged brand reputation, and more. It is crucial to regularly and fully back up endpoints to avoid these risks. This resource provides what to look for in an endpoint backup solution.
Posted: 13 Oct 2014 | Published: 13 Oct 2014

Code42

Privacy, Security and Compliance - What You Don’t Know May Just Hurt You
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
WHITE PAPER: In this document, explore the changing nature and increasing value of data and how organizations are responding to changes in regulation.
Posted: 19 Aug 2014 | Published: 19 Aug 2014

NTT Communications ICT Solutions and Hitachi Data Systems

Three Ways Online Anonymity Hurts Businesses and Consumers
sponsored by Gigya
WHITE PAPER: While protecting one's online identity has traditionally been a huge concern for Internet users, consumers and businesses alike are realizing the value of a more open, connected social web. In this white paper, explore three ways that user anonymity can negatively impact ROI for businesses and customer experiences.
Posted: 27 Jan 2014 | Published: 31 Dec 2013

Gigya

Web Application Security: Automated Scanning versus Manual Penetration Testing
sponsored by Logicalis
WHITE PAPER: This paper explains the two primary methods for discovering Web application vulnerabilities: using manual penetration testing and code review or using automated scanning tools and static analysis.
Posted: 11 Dec 2008 | Published: 11 Dec 2008

Logicalis

Practical Approaches for Securing Web Applications across the Software Delivery Lifecycle
sponsored by IBM
WHITE PAPER: Enterprises understand the importance of securing web applications to protect critical corporate and customer data. What many don’t understand, is how to implement a robust process for integrating security and risk management throughout the web application software development lifecycle.
Posted: 16 Jun 2010 | Published: 08 Jul 2009

IBM

PCI DSS Compliance in the UNIX/Linux Datacenter Environment
sponsored by BeyondTrust Corporation
WHITE PAPER: Read this whitepaper to discover a solution that enables IT organizations to create a secure access control infrastructure through granular authorization and "delegation" of the UNIX/Linux root or super user password to users based on their role and duties in the organization.
Posted: 17 Feb 2009 | Published: 16 Feb 2009

BeyondTrust Corporation

Pocket E-Guide: Data Breach Dangers -- Learn to How to Protect Data and Lower Security Spending
sponsored by IBM
EGUIDE: Information security is important, but justifying increased security spending isn't. Even though important factors such as stock performance and customer loyalty are directly affected by security breaches. This E-Guide outlines three specific actions for your company to take in order to protect and promote brand trust by preventing data breaches.
Posted: 08 Oct 2009 | Published: 08 Oct 2009

IBM

Crypto Complete Case Study: Field-Level Encryption Helps Retail Chain Achieve PCI Compliance
sponsored by Linoma Software
CASE STUDY: In this case study, Love's Travel Stops and Country Stores, a retail chain, used Crypto Complete in an effort to meet PCI standards. Love's found that Crypto Complete encrypted credit card numbers in a way that satisfies PCI compliance auditors.
Posted: 01 Aug 2008 | Published: 01 Jul 2008

Linoma Software

Consumer Trust Test: Does Your E-business Pass the Test?
sponsored by VeriSign, Inc
PRODUCT LITERATURE: Give potential customers the confidence that you can collect their sensitive personal information securely online, and you'll have a customer for life.
Posted: 01 Mar 2005 | Published: 01 Mar 2005

VeriSign, Inc

Data Privacy e-Book
sponsored by SearchSecurity.co.UK
TECHNICAL ARTICLE: SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores.
Posted: 12 Apr 2011 | Published: 12 Apr 2011

SearchSecurity.co.UK
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement