IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Electronic Security

RSS Feed    Add to Google    Add to My Yahoo!
Electronic SecurityReports
 
Case Study: Protection and Replication for Remote Data Sources
sponsored by Iron Mountain
CASE STUDY: Employees sometimes lose track of their laptops, either through misplacing them or through theft. One of the main concerns of IT was to protect vital business data on laptops, to prevent that data from falling into the wrong hands, and also to get the employee's system working again. Read this case study to learn one company's solution.
Posted: 16 May 2011 | Published: 16 May 2011

Iron Mountain

Tape Vaulting: What You Need to Know About Tape Backup and Archiving
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Check out this expert presentation transcript with storage industry analyst Lauren Whitehouse to learn about recent developments in tape that are keeping it relevant.
Posted: 05 Mar 2012 | Published: 05 Mar 2012

Iron Mountain

Your Guide to the Biggest Security Trends of 2014
sponsored by CDW Corporation
EGUIDE: This guide discusses the security-related trends that you need to know about in 2014.
Posted: 17 Jul 2014 | Published: 28 Feb 2014

CDW Corporation

Needle in a Datastack: The rise of big security data
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data.
Posted: 08 Jul 2013 | Published: 08 Jul 2013

ComputerWeekly.com

Challenges With Data Protection in the Cloud
sponsored by SearchSecurity.com
ANALYST BRIEF: This expert e-guide from SearchSecurity.com will help you discover the ways you can ensure better protection for your cloud-hosted data. Inside, you'll find out the major challenges involved with cloud security, as well as tips for protecting your intellectual property.
Posted: 12 Jun 2013 | Published: 12 Jun 2013

SearchSecurity.com

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

Security in the Cloud Planning Guide
sponsored by Intel
WHITE PAPER: Security is a top concern for businesses looking to implement a cloud computing environment throughout their systems.  This white paper provides a comprehensive guide on building security in the cloud from the ground up so you can ensure your data and platforms are protected.
Posted: 23 Feb 2012 | Published: 01 Sep 2011

Intel

After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
sponsored by Lumension
WHITE PAPER: This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Lumension

In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

Next Generation Enterprise WAN DMVPN
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so.
Posted: 11 Jul 2012 | Published: 11 Jul 2012

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement