IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed    Add to Google    Add to My Yahoo!
Secure Data Reports
Security and Performance in One Cloud Infrastructure
sponsored by Oracle Corporation
VIDEO: This brief video explains how you can build a highly secure cloud infrastructure that offers equally effective performance.
Posted: 11 Nov 2015 | Premiered: 26 Oct 2015

Oracle Corporation

Data Theft Prevention for Healthcare
sponsored by Raytheon|Websense
WHITE PAPER: This white paper outlines a data-centric approach to protecting data and staying in compliance without sacrificing efficient patient care.
Posted: 17 Nov 2015 | Published: 17 Nov 2015


Cloud Data Encryption Made Easy
sponsored by Oracle Corporation
WEBCAST: This webcast takes an in-depth look at one cloud system that accelerates data encryption in motion and at rest while protecting against malware attacks. View now to review this system and determine if it provides the security your organization needs to mitigate breaches.
Posted: 09 Nov 2015 | Premiered: Oct 26, 2015

Oracle Corporation

Introduction to the Top Database Security Tools
sponsored by Oracle Corporation
EGUIDE: This expert guide provides detailed information on the most important database security tools and top vendors that you should know about.
Posted: 05 Nov 2015 | Published: 05 Nov 2015

Oracle Corporation

Special Report: Healthcare Security in 2015
sponsored by Raytheon|Websense
WHITE PAPER: This report examines the issues and challenges surrounding IT security in the healthcare industry and gives advice on overcoming them.
Posted: 17 Nov 2015 | Published: 22 Sep 2015


Saint Francis Hospital and Medical Center Streamlines Remote Access
sponsored by Citrix
CASE STUDY: In this brief case study, learn how the New England healthcare organization closed a major mobile device security gap and consolidated 1.3 million patient records.
Posted: 16 Nov 2015 | Published: 22 Jul 2015


Masood Heydari Discusses the Key to Securing and Accelerating Databases and Applications
sponsored by Oracle Corporation
WEBCAST: In this webinar, Masood Heydari discusses the next phase of hardware and software engineering. Tune in and find out how, by converging elements of database software onto processor silicon, technology has made a giant leap forward in making a fully encrypted data center.
Posted: 11 Nov 2015 | Premiered: Oct 26, 2015

Oracle Corporation

Keep Mobile Apps Safe With These Security Best Practices
sponsored by WhiteCryption
EGUIDE: Access this expert guide for advice on solving your mobile security challenges through better mobile app protection.
Posted: 24 Nov 2015 | Published: 24 Nov 2015


Case Study: Earthquake Prompts Manufacturing Company to Protect Its Business
sponsored by Riverbed Technology, Inc.
CASE STUDY: This case study focuses on how one company improved their disaster recovery capabilities by deploying a converged infrastructure that replaced their physical servers with virtual machines. Access now to learn how this infrastructure can enable your enterprise to protect and backup data in a secure environment and lower your data center costs.
Posted: 23 Nov 2015 | Published: 30 Sep 2014

Riverbed Technology, Inc.

Orchestrating Security in the Cloud
sponsored by
ANALYST REPORT: Access this report to uncover survey results about organizations use of cloud computing for their workloads and how they are keeping them secure. You'll learn the current state of cloud computing, top cloud security concerns, how to build better cloud defenses, and more.
Posted: 23 Nov 2015 | Published: 30 Sep 2015
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement