IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed    Add to Google    Add to My Yahoo!
Secure Data Reports
 
Outbound Gateway Protection with UTM on AWS
sponsored by AWS - Sophos
CASE STUDY: AWS is popular for the wealth of benefits it offers users, but a vital component of operating on AWS, however, is ensuring data and workloads hosted on AWS are secure. Access this white paper to learn about protecting your AWS environment with unified threat management.
Posted: 19 Jul 2017 | Published: 19 Jul 2017

AWS - Sophos

Hybrid Cloud & Data Fabric For Dummies
sponsored by NetApp
WHITE PAPER: Hybrid clouds are seeing a growth in adoption rates, but we're also seeing data management challenges arise. This guide explores these challenges to the hybrid cloud model and how a data fabric addresses them.
Posted: 09 May 2017 | Published: 31 Dec 2015

NetApp

Universal Storage for Data Lakes: An ESG Evaluation
sponsored by Dell EMC and IntelĀ®
WHITE PAPER: This ESG paper challenges the de facto standard of direct-attached storage, and in it you will discover how scale-out NAS mitigates the challenges associated with data lake storage. Read on to see outlined the storage selection criteria for data lakes, which includes in-place analytics, accessibility by multiple app types, and more.
Posted: 06 Jun 2017 | Published: 30 Nov 2017

Dell EMC and IntelĀ®

How UTHealth Medical Center Handles Data
sponsored by Virtual Instruments
WEBCAST: As the world's largest medical center, UTHealth needs to operate efficiently and effectively to meet very high standards. Take 5 minutes to find out how UTHealth's IT department ensures that its clients have access to the data they need without compromising sensitive patient data.
Posted: 19 Jul 2017 | Premiered: Jun 15, 2017

Virtual Instruments

Middleware and Operating System Machine Data
sponsored by Splunk
WHITE PAPER: This white paper explores how to enhance your big data strategies so that you can derive actionable intelligence from your organization's machine data. Find out how to optimize the value you get from the machine data created by middleware and OS and support data security, analytics, and more.
Posted: 23 May 2017 | Published: 23 May 2017

Splunk

Your Business Is Only As Fast As Your Data: Data Management Playbook
sponsored by Google Cloud
ANALYST REPORT: This data management overview from Forrester Research explains the need to enable self-service access to real-time data. Use the 12 reports in this data management playbook to discover, plan, act, and optimize your data management practices.
Posted: 02 Jun 2017 | Published: 11 Mar 2016

Google Cloud

Don't Rush into Cloud Databases without a Well-Grounded Plan
sponsored by Data Intensity
EGUIDE: In this expert e-guide, DBA Brian Peasland helps you weigh the benefits of moving to the cloud. Discover how to take a strategic approach to implementing an Oracle cloud database that anticipates a variety of challenges from legal regulations to data security.
Posted: 17 Apr 2017 | Published: 07 Apr 2017

Data Intensity

Offline Access Is the Key to Unlocking Mobility's Promise
sponsored by OnBase by Hyland
WHITE PAPER: Discover the importance of incorporating offline capabilities into the business critical apps, platforms, and systems that mobile workers access to execute the key functions of their day-to-day jobs. Find out how to overcome the offline challenge and answer the demand for mobile access with the OnBase ECM offering.
Posted: 24 May 2017 | Published: 24 May 2017

OnBase by Hyland

Data protection: Not just about personal data and compliance
sponsored by ComputerWeekly.com
EGUIDE: Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
Posted: 18 Apr 2017 | Published: 18 Apr 2017

ComputerWeekly.com

Protecting Sensitive Corporate Data Against the Full Spectrum of Mobile Risk
sponsored by Lookout
WEBCAST: Download this webcast to discover a full EMM platform that will protect sensitive corporate data against the full spectrum of mobile risks, from software vulnerabilities to behavior and configuration threats.
Posted: 26 Jun 2017 | Premiered: Jun 6, 2017

Lookout
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement