IT Management  >   Systems Operations  >   Security  >   Data Security  >  

File Encryption

RSS Feed    Add to Google    Add to My Yahoo!
File Encryption Reports
 
Tips to Accelerating EHR Systems and Improve Productivity
sponsored by Pure Storage
WHITE PAPER: This white paper highlights the ultimate storage solution that provides the best virtual desktop experience in the healthcare industry.
Posted: 24 Jun 2015 | Published: 24 Jun 2015

Pure Storage

Enterprise Email Security: Introduction and Tips
sponsored by Mimecast
EGUIDE: This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure.
Posted: 31 Jul 2015 | Published: 01 Jul 2015

Mimecast

Infographic: Data Traffic Security is a Mess
sponsored by Certes Networks
WHITE PAPER: This infographic visually displays the sobering results of a recent survey on what are IT decision makers doing to secure and segment their sensitive data traffic.
Posted: 09 Jan 2015 | Published: 09 Jan 2015

Certes Networks

The Future of Data Security: A Zero Trust Approach
sponsored by IBM
WHITE PAPER: This report reveals where data security strategies are heading in the future, and how traditional approaches are no longer making the cut.
Posted: 24 Sep 2014 | Published: 05 Jun 2014

IBM

CW buyer's guide: context-aware security
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This 11-page  Computer Weekly buyer's guide  looks at how organisations should approach context-aware security technologies and what business benefits they can deliver.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

ComputerWeekly.com

Self-Encrypting Drives
sponsored by Micron Technology
WHITE PAPER: This white paper expalins encryption and different encryption processes.
Posted: 11 Dec 2014 | Published: 31 Dec 2013

Micron Technology

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute

E-Guide: Minimize enterprise data exposure inside and outside the organization
sponsored by IBM
EGUIDE: This expert e-guide provides data masking best practices and explains how to implement an effective strategy for reducing the risk of data exposure from inside and outside the organization.
Posted: 27 Sep 2011 | Published: 27 Sep 2011

IBM

Global Deduplication: How it Works and Who Can Benefit
sponsored by Essextec
EGUIDE: This expert e-guide explains how the limited scalability of source and target-based deduplication can lead to bottlenecks when large volumes of data are backed up. Learn how global deduplication can eliminate these bottlenecks through load balancing and get examples of these types of offerings in the marketplace.
Posted: 17 Jun 2013 | Published: 17 Jun 2013

Essextec

May Technical Guide on PCI DSS Guidance
sponsored by SearchSecurity.com
EGUIDE: This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.
Posted: 08 May 2012 | Published: 07 May 2012

SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement