IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Database Encryption

RSS Feed    Add to Google    Add to My Yahoo!
Database Encryption Reports
 
Privacy and Big Data
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from ISACA, a non-profit security association, lists 16 key questions companies need to answer when considering the privacy and governance aspects of big data.
Posted: 19 Aug 2013 | Published: 19 Aug 2013

ComputerWeekly.com

Information Governance
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This research from AIIM looks at the risk profile around electronic records, the keep-all versus delete-all options, e-discovery, and the implications of social, mobile and cloud on risk management policies.
Posted: 03 Jun 2013 | Published: 03 Jun 2013

ComputerWeekly.com

Take Control of Your Business Environment With Several Integrated Solutions
sponsored by Novell Ltd.
WHITE PAPER: Access this white paper to discover a new strategy designed to facilitate and accelerate endpoint management.
Posted: 25 Mar 2015 | Published: 01 Oct 2014

Novell Ltd.

Top Mobile Data Protection Best Practices
sponsored by SearchSecurity.com
EGUIDE: Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

SearchSecurity.com

CipherCloud for Office 365 - Encryption Solution Demo
sponsored by CipherCloud
WEBCAST: In just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.
Posted: 13 Aug 2012 | Premiered: Aug 13, 2012

CipherCloud

Tape Vaulting: What You Need to Know About Tape Backup and Archiving
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Check out this expert presentation transcript with storage industry analyst Lauren Whitehouse to learn about recent developments in tape that are keeping it relevant.
Posted: 05 Mar 2012 | Published: 05 Mar 2012

Iron Mountain

Security University: Database Security Issues
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: The start of many data security issues is, of course, the database. Here's a look at currently predominant types of database security vulnerabilities and how best to monitor database access to detect potential security incidents.
Posted: 10 Jun 2013 | Premiered: 10 Jun 2013

SearchSecurity.com

A Full-Service Network With Secure, Encrypted Communications
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this guide, discover how to design a full-service network with secure, encrypted communications with VPN technology.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Cisco Systems, Inc.

A Comprehensive Guide to Encryption Technology Approaches
sponsored by Vormetric
WHITE PAPER: This resource highlights 11 encryption technologies and offers key questions to help you choose the right solution for your business needs.
Posted: 11 Jun 2014 | Published: 31 Dec 2012

Vormetric

Rochester General Relies on MOVEit to Transfer Medical Records and Meet HIPAA/HITECH Compliance
sponsored by Ipswitch File Transfer
CASE STUDY: This two-page case study unveils the security solution Rochester General Hospital put in place to help them quickly, easily, and securely track file transfers while simultaneously complying all regulatory requirements.
Posted: 09 Jul 2013 | Published: 31 May 2013

Ipswitch File Transfer
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement