IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed    Add to Google    Add to My Yahoo!
Secure Data Reports
Quantifying the Business Value of Dell XC Powered by Nutanix Software
sponsored by Dell, Inc.
WHITE PAPER: This white paper details the business value of pairing hyper-converged infrastructure with next-gen backup software can dramatically increase efficiency and bolster data protection. Read on to learn about how you can deploy storage systems faster, reduce unplanned downtime, and more.
Posted: 05 Oct 2015 | Published: 28 Sep 2015

Dell, Inc.

PCI Compliance Protect your business from data breach
sponsored by Earthlink.
WHITE PAPER: Get stronger control over PCI compliance in this white paper by learning the 12 requirements to simplify and accelerate the process. Access this resource now to learn how to proactively protect your organization from a data breach.
Posted: 17 Sep 2015 | Published: 15 Jul 2015


Top 10 Purchasing Considerations for a Hyper-Converged Infrastructure
sponsored by Hewlett-Packard Company
WHITE PAPER: This infographic highlights 10 considerations your enterprise should consider when purchasing a hyper-converged infrastructure. Read on to see the critical questions you should ask your vendors to ensure you choose the best infrastructure for your enterprise.
Posted: 21 Sep 2015 | Published: 21 Sep 2015

Hewlett-Packard Company

Urayasu Hospital Case Study: Medical Records Management Made Healthier
sponsored by Kodak
CASE STUDY: Explore how one Japanese hospital was able to achieve their goals of saving space, providing electronic access, and securely storing data. In this case study, discover ways you and your staff can achieve similar results.
Posted: 22 Sep 2015 | Published: 22 Sep 2015


DLP Benefits for Enterprises and Intellectual Property Protection
sponsored by Digital Guardian
EGUIDE: This e-guide addresses some of the challenges posed by data security, with a special focus on data classification and data loss prevention.
Posted: 05 Oct 2015 | Published: 05 Oct 2015

Digital Guardian

Enforce Security Policies in the Cloud with CASBS
sponsored by Elastica
EGUIDE: In this white paper, you will learn how cloud access security brokers (CASBs) provide policy-based enforcement points and controls to ensure public cloud apps are being accessed and used properly through authentication, encryption, and device profiling. View now to learn more about how to improve your cloud security strategy.
Posted: 15 Sep 2015 | Published: 08 Sep 2015


Comprehensive Security for Your Valuable Data
sponsored by Trustwave
WHITE PAPER: This white paper explains how you can implement strong database security that will keep the hackers out.
Posted: 01 Oct 2015 | Published: 31 Dec 2014


Case Study: Securing Files Anywhere in the World
sponsored by FinalCode
WHITE PAPER: By using a case study of one successful corporation, this white paper examines what you can do to maintain the confidentiality of all your files, no matter who has access to them.
Posted: 05 Oct 2015 | Published: 30 Apr 2015


Apply Integrated Data Protection That Maximizes Efficiency, Reduces Risk
sponsored by Nimble Storage
WHITE PAPER: This document discusses the implementation of a complete storage foundation that enables comprehensive and efficient data protection. Read now to see how integrated data protection can help your enterprise reduce risk as well as operational overhead and complexity.
Posted: 22 Sep 2015 | Published: 22 Sep 2015

Nimble Storage

The State Of Endpoint Security Adoption 2014 To 2015
sponsored by Dell, Inc. and IntelĀ®
WHITE PAPER: In this special report, Forrester presents data from its most recent surveys to discuss the current state of endpoint security, along with analysis that explains the data in the context of the overall security landscape.
Posted: 06 Oct 2015 | Published: 15 Oct 2014

Dell, Inc. and IntelĀ®
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement