IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Electronic Security

RSS Feed    Add to Google    Add to My Yahoo!
Electronic Security Reports
 
SSL Offloading and Acceleration in Virtualized Environments
sponsored by Array Networks
WHITE PAPER: Access this white paper to find out how you can ensure high performance in both virtualized cloud and data center environments.
Posted: 26 Jan 2015 | Published: 26 Jan 2015

Array Networks

A Smarter Approach to Network Encryption
sponsored by Certes Networks
WHITE PAPER: This white paper explores how enterprises can make network encryption easier to set up and manage, as well as transparent to network and application performance and behavior.
Posted: 09 Jan 2015 | Published: 16 Dec 2014

Certes Networks

Using Backup Software For Secure, Offsite Data Protection
sponsored by Asigra
WEBCAST: Access this Q&A video to hear from Craig Cook, Director of OnDemand Services at Long View Systems, about why he chose Asigra for a secure backup solution that allowed the consulting and managed services provider to go to market with a cloud backup offering.
Posted: 07 Apr 2015 | Premiered: Aug 31, 2014

Asigra

After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
sponsored by Lumension
WHITE PAPER: This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Lumension

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
sponsored by Vormetric
WHITE PAPER: This white paper defines the global legal obligations and financial services laws that require data encryption.
Posted: 10 Jun 2014 | Published: 31 May 2014

Vormetric

Better cloud security with certificate and key management
sponsored by Venafi
WEBCAST: This webcast explores how key management can help you overcome the data security challenges of cloud computing. Inside, discover the best practices for automating certificate management – click through to view now.
Posted: 09 Nov 2012 | Premiered: Nov 9, 2012

Venafi

FAQ Guide: Data Backup & Security Pain Points
sponsored by Quantum Corporation
EGUIDE: This FAQ Guide can help you get started on the right path to securing your stored and backed up data. Access it now to find questions and answers about data encryption challenges and appliances, cloud storage security, and tape, host-based or disk encryption approaches.
Posted: 31 Oct 2012 | Published: 31 Oct 2012

Quantum Corporation

Data Loss Prevention: Decision Time
sponsored by SearchSecurity.com
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

SearchSecurity.com

Healthcare Network Security with Fewer House Calls: Solution Brief
sponsored by Intel
WHITE PAPER: By evaluating offerings and finding the right investment, a struggling IT campus-based IT department they were able to install a remote management solution that allowed them to simplify IT and better secure the sensitive patient data residing in their on-campus health center.
Posted: 30 May 2013 | Published: 30 May 2013

Intel
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement