IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed    Add to Google    Add to My Yahoo!
Secure Data Reports
Bringing E-Discovery In-House: Risks and Rewards
sponsored by Zylab International, Inc.
WHITE PAPER: This white paper provides a straightforward, pragmatic overview about how legal professionals and organizations confronted with eDiscovery must be able to interpret it within the context of processes, risks, and viable strategies.
Posted: 29 Sep 2015 | Published: 30 Dec 2011

Zylab International, Inc.

Case Study: Skin Care Doctors Move to Electronic Medical Records with Better Results for Everyone
sponsored by Kodak
CASE STUDY: In this brief case study, learn how a practice of 10-board certified dermatologists formed an EMR strategy that enabled access for multiple users simultaneously, freed up miles of shelving, and improved workflow.
Posted: 21 Sep 2015 | Published: 21 Sep 2015


Why InfoSec Needs Guarantees
sponsored by WhiteHat Security
WEBCAST: This webcast presents the argument that security platform vendors need to change the industry and begin to offer guarantees on security platforms. View now to learn why security guarantees will benefit the vendors as well as the organizations using them.
Posted: 01 Oct 2015 | Premiered: May 12, 2015

WhiteHat Security

Four Essential Fundamentals to Increasing Agility in the Cloud
sponsored by Commvault
WHITE PAPER: Access this white paper to learn about the 4 key elements that should be implemented to help your enterprise efficiently manage data protection and recovery operations. Read on to see how you can achieve a single point of control for both your on-premise and cloud-based data and improve your overall data protection.
Posted: 30 Sep 2015 | Published: 30 Sep 2015


Case Study: Centralizing Endpoint Management for Peak Performance
sponsored by Earthlink.
WHITE PAPER: This case study tells how a global consulting firm consolidated endpoint security for 85 different offices and achieved one-stop visibility and management for mobile endpoints.
Posted: 18 Sep 2015 | Published: 18 Sep 2015


Case Study: TSG Redefines Cloud Backup
sponsored by Commvault
CASE STUDY: This case study exhibits one managed service provider's quest to implementing a backup and recovery system that would seamlessly fit into their technology and pricing model. Read on to see how an efficient platform can accommodate your data protection needs.
Posted: 30 Sep 2015 | Published: 30 Sep 2015


Sizing The Cloud Security Market
sponsored by HyTrust
WHITE PAPER: This report by Forrester Research organizes today's fragmented set of cloud security solutions into four discrete categories for S&R pros and projects spending patterns for the cloud security category as a whole.
Posted: 05 Oct 2015 | Published: 25 Aug 2015


Secure, Efficient File-Sharing
sponsored by FinalCode
VIDEO: This brief video looks at a security system that keeps files safe without changing the way employees share them.
Posted: 05 Oct 2015 | Premiered: 29 May 2015


Security Insights: Building Secure Social Media Monitoring
sponsored by Unisys
WHITE PAPER: This white paper discusses how you can alleviate customer fears about social media monitoring with better data management and security practices.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


How to Keep Your Public Cloud Private
sponsored by HyTrust
PODCAST: This podcast discusses how you can ensure data protection, security, and compliance in the public cloud. Listen in to learn how you can begin enjoying the benefits of the public cloud without fear.
Posted: 29 Sep 2015 | Premiered: Sep 22, 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement