IT Management  >   Systems Operations  >   Security  >  

SAP Security

RSS Feed   
SAP Security White Papers (View All Report Types)
 
IDC Disaster Recovery: Improving Time-to-Readiness
sponsored by EMC Backup and Recovery Solutions
WHITE PAPER: Read this IDC Analyst Connection to learn how using deduplication storage for data protection can help organizations achieve two goals: efficiently manage the growing data volumes and be prepared to handle the most pressing disaster recovery scenarios.
Posted: 27 May 2011 | Published: 27 May 2011

EMC Backup and Recovery Solutions

Database on Cloud: Fast, Simple, Economical, and Secure
sponsored by IBM
WHITE PAPER: This data sheet explores databases available on demand as a cloud service. Designed with security in mind, you'll uncover the variety of advantages from leveraging this nontraditional approach to database management.
Posted: 21 Jun 2016 | Published: 30 Sep 2015

IBM

Webroot Secure Anywhere Business - Mobile Protection
sponsored by Webroot
WHITE PAPER: Learn more about the key benefits of Webroot SecureAnywhere Business by reading this informative white paper. Not only does it help secure devices from malware and malicious web sites, it also can protect data in case of accidental loss or theft.
Posted: 25 Jul 2012 | Published: 25 Jul 2012

Webroot

Achieving High Oracle Performance
sponsored by Dell Software
WHITE PAPER: DBAs cannot afford to rely on reactive measures anymore. They need advanced performance management tools that will enable them to catch emerging issues before they can affect end users. Discover how advanced database management can help DBAs protect the system by preventing problems from developing at all. Download the white paper to learn more.
Posted: 07 May 2014 | Published: 19 Aug 2013

Dell Software

Ponemon Study: 2011 Cost of a Data Breach
sponsored by Symantec Corporation
WHITE PAPER: This annual data breach cost study examines the wide range of business costs associated with a breach, including expense outlays for detection, escalation notification, and after-the-fact response.
Posted: 25 May 2012 | Published: 31 Mar 2012

Symantec Corporation

Using Windows File Classification Infrastructure to Classify and Protect Documents
sponsored by TITUS
WHITE PAPER: This white paper describes how organizations can leverage the File Classification Infrastructure and partner solutions to identify the business value of data, raise security awareness, and protect information assets.
Posted: 11 Nov 2010 | Published: 11 Nov 2010

TITUS

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
sponsored by Information Security Magazine
WHITE PAPER: This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
Posted: 07 Oct 2010 | Published: 07 Oct 2010

Information Security Magazine

Hardening Database Security
sponsored by McAfee.
WHITE PAPER: View this paper to learn how McAfee® Database Security Solution, a multitiered software solution that provides protection to all databases and data assets, warding off threats and eliminating vulnerabilities while providing compliance and maximising the efficiency of your operations.
Posted: 15 Aug 2011 | Published: 09 Aug 2011

McAfee.

Thinking strategically about mobility and enterprise data
sponsored by AppSense
WHITE PAPER: IT professionals face new governance challenges as a result of the transformation of enterprise computing. The demand for mobile productivity is constantly growing, and IT leaders need to find solutions for mobility without sacrificing efficiency or governance.
Posted: 09 Jul 2012 | Published: 09 Jul 2012

AppSense

Technology Audit: Imperva SecureSphere Data Security Suite
sponsored by Imperva
WHITE PAPER: Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more.
Posted: 02 Jun 2010 | Published: 02 Jun 2010

Imperva
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement