IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Database Encryption

RSS Feed    Add to Google    Add to My Yahoo!
Database Encryption Reports
 
Using Backup Software For Secure, Offsite Data Protection
sponsored by Asigra
WEBCAST: Access this Q&A video to hear from Craig Cook, Director of OnDemand Services at Long View Systems, about why he chose Asigra for a secure backup solution that allowed the consulting and managed services provider to go to market with a cloud backup offering.
Posted: 07 Apr 2015 | Premiered: Aug 31, 2014

Asigra

Provide Secure, Ubiquitous Data For Your Users, Or Face The Consequences!
sponsored by SearchSecurity.com
EBRIEF: This E-Brief from SearchConsumerization.com explores the issues of data management and how enterprise-level file sharing and syncing solutions can allow corporate data to be safely managed on employee-owned devices.
Posted: 13 Mar 2012 | Published: 13 Mar 2012

SearchSecurity.com

CW buyer's guide: context-aware security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11-page  Computer Weekly buyer's guide  looks at how organisations should approach context-aware security technologies and what business benefits they can deliver.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Secure internet routing
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

Security First Insurance Handles Disaster Recovery with State-of-the-Art Technology for Business Insights
sponsored by IBM
CASE STUDY: To ensure your organization is effectively accessing your unstructured data check out this exclusive case study. Learn more about the challenges faced by organizations looking to leverage technology to access their content and receive recommendations for overcoming them.
Posted: 20 Mar 2015 | Published: 31 Dec 2014

IBM

Email Security- The IBE Architectural Advantage
sponsored by Voltage Security, Inc.
WHITE PAPER: This resource examines the challenges of securing business communication and how to overcome it. View now to explore the shortcomings of existing encryption solutions, key requirements for ubiquitous secure business communication, how Identity-based encryption (IBE) meets these requirements, and more.
Posted: 05 Apr 2012 | Published: 05 Apr 2012

Voltage Security, Inc.

Global Deduplication: How it Works and Who Can Benefit
sponsored by Essextec
EGUIDE: This expert e-guide explains how the limited scalability of source and target-based deduplication can lead to bottlenecks when large volumes of data are backed up. Learn how global deduplication can eliminate these bottlenecks through load balancing and get examples of these types of offerings in the marketplace.
Posted: 17 Jun 2013 | Published: 17 Jun 2013

Essextec

The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
sponsored by Vormetric
WHITE PAPER: This white paper defines the global legal obligations and financial services laws that require data encryption.
Posted: 10 Jun 2014 | Published: 31 May 2014

Vormetric

E-Guide: Align Data Protection with Business Importance
sponsored by IBM
EGUIDE: This SearchStorage.com E-Guide discusses the importance of protecting not just data but "use" of the associated information system, and outlines 4 capabilities needed for a better approach to data protection. Read on to learn more.
Posted: 25 Aug 2011 | Published: 25 Aug 2011

IBM

10 Tips for Managing Security in the Cloud
sponsored by Dell, Inc. and Intel®
WHITE PAPER: With the cloud’s dynamic nature, IT professionals are often wary about how effective data security is in this type of environment. This white paper outlines the top 10 considerations to keep in mind when managing security in the cloud to ensure your business is protected.
Posted: 23 Nov 2011 | Published: 23 Nov 2011

Dell, Inc. and Intel®
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement