IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed    Add to Google    Add to My Yahoo!
Secure Data Reports
 
Factoring the Human Element into Your Data Breach Response
sponsored by AllClear ID
WHITE PAPER: Access this white paper to see how emotional reactions to a security breach can affect your crisis management.
Posted: 25 Jan 2016 | Published: 09 Dec 2015

AllClear ID

4 Business Continuity Best Practices Every MSP Should Follow
sponsored by LogicNow
WHITE PAPER: This whitepaper highlights four business continuity and data backup best practices to help ensure reliable disaster recovery and minimal downtime. In addition, explore how employing a holistic business continuity strategy with virtual disaster recovery services can enable your enterprise to keep your data secure and improve your RTO.
Posted: 10 Feb 2016 | Published: 31 Dec 2014

LogicNow

DataGravity and Continuous Sensitive Data Monitoring
sponsored by DataGravity
WHITE PAPER: This white paper discusses tools and technologies that will help in the mitigation, detections and response to risks within your network.
Posted: 11 Feb 2016 | Published: 31 Jul 2015

DataGravity

Integrating Big Data Systems with Enterprise Data Warehouses
sponsored by Oracle Corporation
WHITE PAPER: In this white paper, you will learn how to both maximize the business benefits of big data and minimize the risk of adopting new technologies with a unified query system. Read on to allow a single query to access data in multiple stores—be they Hadoop, NoSQL or relational databases.
Posted: 03 Feb 2016 | Published: 31 Jan 2015

Oracle Corporation

Under Attack? 2016 Defenses Escape Compromise
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at security attack techniques and talk to top security researchers about enterprise threats in 2016.
Posted: 01 Feb 2016 | Published: 01 Feb 2016

SearchSecurity.com

Using Information Governance to Mitigate Risk
sponsored by Veritas
RESOURCE CENTER: In this article, discover how you can enact policies and take initiatives centered on identifying, avoiding, eliminating and ameliorating the impact of risk on your organization.
Posted: 29 Jan 2016 | Published: 23 Dec 2015

Veritas

Gartner Competitive Landscape: Endpoint Detection & Response (EDR)
sponsored by Digital Guardian
WHITE PAPER: In this white paper, you will examine critical EDR customer buying behaviors, solution use cases and technologies that product managers and marketing professionals must consider.
Posted: 29 Jan 2016 | Published: 26 Nov 2014

Digital Guardian

Forrester: Tips to Build Your Data Protection Business Case
sponsored by Digital Guardian
WEBCAST: This video will teach you how to establish success factors for data protection programs.
Posted: 04 Feb 2016 | Premiered: Nov 30, 2015

Digital Guardian

40 Questions You Should Have in Your Vendor Security Assessment
sponsored by BitSight
WHITE PAPER: In this white paper, you will learn how to get started with your VRM security program and by accessing the most important questions to ask third-party businesses.
Posted: 02 Feb 2016 | Published: 30 Apr 2014

BitSight

Trends in Data Management: Unlock the True Value Proposition of Big Data
sponsored by Oracle Corporation
RESOURCE: In this resource, you will key into the most current data management trends, and learn how to leverage these trends to unlock the true value of big data and analytics in your enterprise. Read on now to examine the growth of predictive analytics in today's data environs, and more.
Posted: 03 Feb 2016 | Published: 03 Feb 2016

Oracle Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement