IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed    Add to Google    Add to My Yahoo!
Secure DataReports
 
CrashPlan Free Trial Offer
sponsored by Code42
SOFTWARE DEMO: It's time to try a better approach to backing up and protecting your valuable data. Download this trial of CrashPlan to experience an easy and secure way to backup, manage, restore, and share your files. Read on now to learn how this allows you to deliver free local backup, free offsite backup, unlimited online backup, and more
Posted: 18 Nov 2014 | Premiered: 18 Nov 2014

Code42

Strong Authentication: Best Practices and Use Cases
sponsored by Gemalto
WHITE PAPER: This helpful white paper explains how an identity-centric approach to IT security can lock down critical processes and systems and ensure that you have complete control over who has access.
Posted: 06 Nov 2014 | Published: 06 Nov 2014

Gemalto

Update Your Application Security Policy After Heartbleed
sponsored by Hewlett-Packard Company
EGUIDE: In this expert guide, Michael Cobb explains why relying solely on other parties to correctly implement and deliver software security can put enterprise and customer data at risk.
Posted: 25 Nov 2014 | Published: 25 Nov 2014

Hewlett-Packard Company

Securing your company's digital assets so they don't fall into the wrong hands
sponsored by K2
WHITE PAPER: Access this brief paper to learn how Square Enix Europe, a video game creator, improved the security of its mastering request process, which ultimately helped the company ensure top quality of its products.
Posted: 25 Nov 2014 | Published: 31 Dec 2013

K2

How to Manage Data Security and Compliance Within an Enterprise
sponsored by IBM
WHITE PAPER: This white paper introduces a data security solution that puts an end to potential hackers and privileged insiders by eliminating unauthorized activity.
Posted: 07 Oct 2014 | Published: 31 Oct 2013

IBM

Take Authentication Beyond Passwords with Secure Remote Access
sponsored by HID
VIDEO: This short video describes how you can take authentication beyond passwords with HID Global's ActivID® authentication solutions, which provide secure remote access supporting the latest tablet and mobile devices.
Posted: 20 Oct 2014 | Premiered: 20 Oct 2014

HID

Analyst Report: Rethinking Data Discovery And Data Classification
sponsored by IBM
WHITE PAPER: Security pros can't adequately protect data if they don't have knowledge about what data exists, where it resides, its value to the organization, and who can use it. In this Forrester Research, Inc. report, discover a data security and control framework that will help you adapt to the new data economy.
Posted: 29 Oct 2014 | Published: 01 Oct 2014

IBM

Cloud Security Solutions You Can Trust
sponsored by Intel Corporation
WHITE PAPER: This white paper explains how cloud security solutions from Intel and VMware can enable your organization to confidently deploy a cloud infrastructure by safeguarding your sensitive data and strengthening regulatory compliance.
Posted: 20 Nov 2014 | Published: 30 Apr 2013

Intel Corporation

Rethinking Data Discovery and Data Classification
sponsored by Digital Guardian
WHITE PAPER: This white paper discusses data discovery and classification, two essential but often overlooked initiatives that lay the foundation for protecting data. Read on to access a three-part framework for data security and control, created by Forrester to help S&R professionals adapt to the new data economy.
Posted: 26 Nov 2014 | Published: 01 Oct 2014

Digital Guardian

Desktop as a Service is Gaining Ground
sponsored by NaviSite
WHITE PAPER: This white paper explores the top reasons to migrate to a DaaS or VDI environment center around data security and BYOD, and reveals the lasting impact on security.
Posted: 15 Oct 2014 | Published: 01 Jul 2014

NaviSite
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement