IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Degaussing

RSS Feed   
Degaussing White Papers (View All Report Types)
 
Taking Advantage of Multicore/Multiprocessor Technologies to Meet Today's Storage Needs
sponsored by Oracle India Pvt. Ltd
WHITE PAPER: This comprehensive white paper explores how Oracle's Sun ZFS Storage Appliances can perform complex processing for compression, deduplication, real-time storage analytics, and other advanced data services without slowing down I/O throughput and without costing more than competing solutions.
Posted: 17 May 2013 | Published: 24 Jun 2012

Oracle India Pvt. Ltd

Beyond SD-WAN: Zero Trust Security and the Internet as Corporate WAN
sponsored by Akamai Technologies
WHITE PAPER: Read this white paper to learn why Internet is the corporate WAN of the near future, and how enabling safe traffic to go straight to the Internet, blocking bad traffic, and only proxying risky traffic, delivers simplified security, lower latency and better performance, fewer broken web pages and applications.
Posted: 27 Dec 2019 | Published: 30 Jun 2019

Akamai Technologies

A Buyer’s Guide to Automating Personal Data Rights for CCPA and GDPR
sponsored by BigID
WHITE PAPER: With the arrival of data rights and privacy regulations, organizations face increasing pressure to maintain strategies that ensure data protection. The risks for failing to do so include financial, legal and reputational damage. Read this buyer’s guide to ensure your organization informed on the key aspects of data discovery.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

BigID

Splunk IT Security Predictions 2020
sponsored by Splunk
WHITE PAPER: Technology continues to redesign every aspect of how we live and work. It also creates new security vulnerabilities that savvy attackers are exposing. Being aware of the potential threats allows individuals and organizations to protect their data. In this white paper, uncover some of the most pertinent security considerations for 2020.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Splunk

Consumer Identity Management for the CMO, CISO, and CIO
sponsored by Okta
WHITE PAPER: As customer demands shifting towards mobile device functionality, consumer IAM (CIAM) becomes a critical security consideration for business leaders.In this article, discover how CIAM can be a strategic asset for businesses and uncover the specific requirements of identity management for CMOs, CISOs and CIOs.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Okta

State of the Internet Security: A Year in Review
sponsored by Akamai Technologies
WHITE PAPER: As the end of 2019 draws near, you can look back and examine the research Akamai has done over the last 12 months. Download the State of the Internet Security report to see the impact various attacks had on organizations in 2019 and how you can prep for 2020.
Posted: 23 Dec 2019 | Published: 23 Dec 2019

Akamai Technologies

User Lifecycle Management Proves Costly to IT
sponsored by Okta
WHITE PAPER: An IDG survey reveals that manual processes drain productivity and increase security risks. Read on to learn more about the differences between manual versus automated lifecycle management.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Okta

Zero Trust Remote Access: An Evaluation Guide for Security and Network Architects
sponsored by Banyan Security
WHITE PAPER: Traditional perimeter security strategies are unable to keep up with the increasing demands of the modern workforce. Organizations should consider zero-trust models as a successor to remote access VPNs. Use this resource from Banyan as an evaluation guide as your organization integrates a zero-trust remote access security strategy.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Banyan Security

CCPA Readiness Checklist
sponsored by BigID
WHITE PAPER: As of January 1, 2020, the CCPA has come into effect. Given the steep penalties for failing to comply, organizations should make certain that they’re positioned to responsibly safeguard customer data. Use this comprehensive checklist to ensure your organization meets the requirements of California’s new data privacy regulation.
Posted: 07 Jan 2020 | Published: 07 Jan 2020

BigID

Ironclad APIs: An Approach for Application Security Testing
sponsored by WhiteHat Security
WHITE PAPER: API security is often overlooked. As it turns out, APIs face many of the same insecurities as web applications. So why are the security strategies for APIs vs. web apps so lopsided? This guide includes the 6 best testing practices your organization can adopt to ensure API security. Read the guide now.
Posted: 08 Jan 2020 | Published: 08 Jan 2020

WhiteHat Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info