IT Management  >   Systems Operations  >   Security  >   Data Security  >  

File Encryption

RSS Feed    Add to Google    Add to My Yahoo!
File EncryptionReports
 
Privacy and Big Data
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This report from ISACA, a non-profit security association, lists 16 key questions companies need to answer when considering the privacy and governance aspects of big data.
Posted: 19 Aug 2013 | Published: 19 Aug 2013

ComputerWeekly.com

Needle in a Datastack: The rise of big security data
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This research from McAfee investigates how well organisations are positioned to address the challenges of managing security in a world of ever increasing amounts and types of data.
Posted: 08 Jul 2013 | Published: 08 Jul 2013

ComputerWeekly.com

Leveraging a Unified Multi-Tiered Backup Design To Deliver a Stable Scalable Backup Infrastructure
sponsored by Quantum Corporation
WHITE PAPER: This DCIG report takes an in-depth look at Quantum’s DXi-Series and its ability solve today’s backup problems while putting in place a foundation for stable and sustainable growth. Access this report now to learn more.
Posted: 14 May 2010 | Published: 23 Jul 2009

Quantum Corporation

Secure internet routing
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Information Security series assesses whether Resource Public Key Infrastructure can provide a framework for effective security.
Posted: 10 Apr 2014 | Published: 10 Apr 2014

ComputerWeekly.com

Secure your data – protect your business
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This guide for C-level executives explains the risks faced by businesses and the practical solutions they can take to secure their data.
Posted: 12 Nov 2012 | Published: 12 Nov 2012

ComputerWeekly.com

Killing Data
sponsored by Voltage Security, Inc.
WHITE PAPER: Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

Voltage Security, Inc.

Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
sponsored by GeoTrust, Inc.
EGUIDE: This expert e-guide describes the dangerous vulnerabilities that can arise from insecure Secure Socket Layer (SSL) usage, and details essential tips and strategies for properly implementing and configuring SSL in order to ensure Web security.
Posted: 27 Dec 2012 | Published: 19 Dec 2012

GeoTrust, Inc.

7 Reasons Businesses are Shifting to Cloud Backup
sponsored by CoreVault
WHITE PAPER: Managing data has become one of the most important and complex IT challenges for businesses of all sizes. For many businesses, the best solution to these complex challenges is a simple one: Manage backup in the cloud. Check out this paper for the top seven reasons businesses are switching to cloud backup.
Posted: 04 Apr 2011 | Published: 04 Apr 2011

CoreVault

How Deduplication Fits into Your Data Backup Plan
sponsored by SearchDataBackup.com
EBOOK: This exclusive E-Book provides insight into the things you must consider about the way dedupe is performed as well as the ways in which it integrates with other data protection processes such as replication, encryption/compression and archiving.
Posted: 03 May 2013 | Published: 03 May 2013

SearchDataBackup.com

E-Book: DLP for Health Care - Strategies for Securing Electronic Health Information in the Age of HITECH
sponsored by SearchHealthIT.com
EBOOK: Data loss prevention (DLP) in health care—which mostly entails preventing patients’ protected health information (PHI) from falling into the wrong hands—requires well-conceived, well-enforced policies and the technology to back them up.
Posted: 16 Apr 2010 | Published: 15 Apr 2010

SearchHealthIT.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement