IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed    Add to Google    Add to My Yahoo!
Secure Data Reports
How Do You Secure Financial Transaction Data Across Multiple Retail Locations?
sponsored by Unisys
CASE STUDY: In this white paper, learn how one major Brazilian supermarket chain closed network and access security vulnerabilities to become PCI DSS compliant. Read on and discover the benefits of micro-segmentation.
Posted: 18 Nov 2015 | Published: 30 Sep 2015


Protect Against Threat Propagation and Damage in the Internal Network
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper examines how to add an additional security layer to your network with an internal segmentation firewall. Learn how to segment the access of potential threats vectors to critical resources, and limit potential breach damage in your internal network.
Posted: 28 Oct 2015 | Published: 28 Oct 2015

Fortinet, Inc.

HGST Active Archive System
sponsored by HGST
WHITE PAPER: This white paper how an active archival system can make storage more efficient and simplify storage management. Read on to learn how you can lower your storage total cost of ownership, easily scale capacity and performance, increase resiliency, and more.
Posted: 09 Nov 2015 | Published: 09 Nov 2015


2015 Cost of Data Breach Study: India
sponsored by IBM
WHITE PAPER: Uncover the findings of this extensive study of 36 India-based companies in 12 industry sectors to learn about the impact of a data breach in 2015. Inside, discover the effect data breaches had on their businesses and various strategies and tools you can use to help avoid the same fate.
Posted: 06 Nov 2015 | Published: 06 Nov 2015


Safeguard Your Data, Productivity, and Reputation with Business Continuity and Resiliency
sponsored by IBM
VIDEO: This video focuses on a cloud managed backup resilience service that can help you attack threats head-on with customized consulting and cloud-based technologies to keep your data and your business always on. Watch this video to see how you can proactively defend your business against the unexpected.
Posted: 13 Nov 2015 | Premiered: 21 Nov 2014


Top 10 Reasons to Strengthen Information Security with App and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: Access this white to learn how desktop and app virtualization strategies are used to strengthen information security. You'll examine the challenges of maintaining information security in today's evolving enterprise environment and 10 benefits of using app and desktop virtualization for information security.
Posted: 13 Nov 2015 | Published: 30 Jan 2015


Apple Native Security
sponsored by JAMF Software
WHITE PAPER: Learn how the native Apple security frameworks can keep your mobile information safe and your employees happy.
Posted: 09 Nov 2015 | Published: 31 Dec 2014

JAMF Software

Information Security ANZ Nov 2015
sponsored by TechTarget ANZ
EZINE: In this issue we look at the true cost of a data breach to an Australian organisation.
Posted: 09 Nov 2015 | Published: 09 Nov 2015

The Dissolution of Safe Harbour and What it Means for your Business
sponsored by Acronis
WHITE PAPER: This white paper discusses the changes that European enterprises must make for their data security systems overseas in the wake of the dissolution of the Safe Harbour agreement. Read on to access 5 steps to help mitigate risk and put safe, compliant procedures in place to protect your data.
Posted: 16 Nov 2015 | Published: 16 Nov 2015


CW Europe – November 2015
sponsored by
EZINE: Cloud computing has huge benefits to businesses in Europe, but data protection rules have been different for organisations in different parts of Europe.This is about to change with The final version of the General Data Protection Regulation (GDPR) expected soon. All 28 EU member states will have one set of rules to follow.
Posted: 03 Nov 2015 | Published: 03 Nov 2015
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement