IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Electronic Security

RSS Feed    Add to Google    Add to My Yahoo!
Electronic SecurityReports
 
Mobile data protection best practices
sponsored by SearchSecurity.com
EGUIDE: Check out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.
Posted: 28 Nov 2011 | Published: 28 Nov 2011

SearchSecurity.com

3 Threats to Cloud Data, and How to Address Them
sponsored by CipherCloud
RESOURCE: In this resource, uncover the three major threats to cloud computing according to the Cloud Security Alliance, and learn about the best ways to protect your organization against malicious threats.
Posted: 24 Sep 2014 | Published: 03 Jul 2014

CipherCloud

Challenges With Data Protection in the Cloud
sponsored by SearchSecurity.com
ANALYST BRIEF: This expert e-guide from SearchSecurity.com will help you discover the ways you can ensure better protection for your cloud-hosted data. Inside, you'll find out the major challenges involved with cloud security, as well as tips for protecting your intellectual property.
Posted: 12 Jun 2013 | Published: 12 Jun 2013

SearchSecurity.com

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute Software
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute Software

Security in the Cloud Planning Guide
sponsored by Intel
WHITE PAPER: Security is a top concern for businesses looking to implement a cloud computing environment throughout their systems.  This white paper provides a comprehensive guide on building security in the cloud from the ground up so you can ensure your data and platforms are protected.
Posted: 23 Feb 2012 | Published: 01 Sep 2011

Intel

How Controlling Access to Privileged Accounts Can Keep Insider Threat from Hurting Your Bottom Line
sponsored by BeyondTrust Corporation
WHITE PAPER: Access control is a necessity. Read this paper to identify a line of identity and access solutions that address these problems inside the perimeter and, ultimately, your enterprise's bottom line and reputation.
Posted: 24 Jul 2014 | Published: 16 Feb 2009

BeyondTrust Corporation

Next Generation Enterprise WAN DMVPN
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so.
Posted: 11 Jul 2012 | Published: 11 Jul 2012

Cisco Systems, Inc.

Customers Discuss Oracle Database Security
sponsored by Oracle Corporation
WEBCAST: Oracle customers, TransUnion, CMC Markets, Diamond Resorts International and National Marrow Donor Program, discuss defense-in-depth database security with data encryption, privileged user access control, data masking, and consolidated auditing and reporting.
Posted: 24 May 2012 | Premiered: May 24, 2012

Oracle Corporation

E-Guide: Align Data Protection with Business Importance
sponsored by IBM
EGUIDE: This SearchStorage.com E-Guide discusses the importance of protecting not just data but "use" of the associated information system, and outlines 4 capabilities needed for a better approach to data protection. Read on to learn more.
Posted: 25 Aug 2011 | Published: 25 Aug 2011

IBM

Oracle Advanced Security with Oracle Database 11g Release 2
sponsored by Oracle Corporation
WHITE PAPER: This white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.
Posted: 08 Jun 2011 | Published: 31 Oct 2010

Oracle Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement