Business of Information Technology  >   Business Environment  >   Legal Environment  >  

Trustmarks

RSS Feed   
Trustmarks White Papers (View All Report Types)
 
The State of Data Protection and Cloud
sponsored by Veritas
WHITE PAPER: As the enterprise data environment becomes more complex, so does the challenge of ensuring cost-effective, efficient data protection. In a recent survey, 250 IT executives discussed how they were providing comprehensive backup and recovery across their virtual, physical and multi-cloud environments. Download this white paper to learn more.
Posted: 16 Sep 2019 | Published: 16 Sep 2019

Veritas

Splunk 2019 Predictions
sponsored by Splunk
WHITE PAPER: We're always at the cusp of the next big thing or moments away from the next technological change that will affect us. In this white paper, learn about the top predictions for AI, Security, IT Ops and IoT for 2019. The list of predictions for 2019 will give you a better understanding of what you'll see coming this year.
Posted: 20 Dec 2018 | Published: 20 Dec 2018

Splunk

How to manage data privacy
sponsored by ComputerWeekly.com
WHITE PAPER: Data privacy refers to the evolving relationship between technology and the legal right to, or public expectation of, privacy in the collection,  storing, management and sharing of data.
Posted: 25 Oct 2011 | Published: 10 Nov 2010

ComputerWeekly.com

Securing Cloud environments: Five Data Encryption best practices to help reduce your risk
sponsored by IBM
WHITE PAPER: It is just as critical to protect sensitive cloud-based data as it is on-premises data. One way to do this is through data encryption. However, encryption is often complicated and difficult to implement and change. This paper looks at 5 best practices for securing data in multi-cloud environments using the latest data encryption technologies.
Posted: 28 Oct 2019 | Published: 28 Oct 2019

IBM

The CISO’s Handbook for Certificate Management
sponsored by AppViewX
WHITE PAPER: Certificate-related outages usually stem from persistent cases of mismanagement. Even the simplest of errors have large impacts. However, most events can be circumvented by simply using a certificate management system. In this white paper, uncover 3 steps technology leaders can take to implement certificate management.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

AppViewX

The Diverse and Exploding Digital Universe
sponsored by EMC Corporation
WHITE PAPER: This white paper, sponsored by EMC, is an update of IDC's inaugural forecast of the digital universe published in March 2007. In this year's update we discuss the implications for business, government, and society.
Posted: 28 Aug 2008 | Published: 27 Aug 2008

EMC Corporation

Achieving PCI DSS Compliance with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER: The PCI DSS standard was created to prevent credit card fraud by requiring the implementation of certain controls and processes by all entities involved in the processing of credit cards. This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific PCI DSS mandates.
Posted: 05 Oct 2009 | Published: 05 Oct 2009

Red Hat and JBoss

Whitepaper: IBM Optim Data Redaction: Reconciling openness with privacy
sponsored by IBM
WHITE PAPER: Redaction is a word that many—if not most—IT organizations have never heard of. If they have, they would probably be hard-pressed to define it or explain its importance. But that situation is changing quickly as organizations realize they must have a solution.
Posted: 06 Apr 2011 | Published: 06 Apr 2011

IBM

Knowledge is Power
sponsored by IBM
WHITE PAPER: Your software has a lot to say about data privacy. Your software is the engine for your data, where it gets processed, transformed, and transmitted. Understanding what your software can tell you puts power in your hands.
Posted: 26 Aug 2010 | Published: 26 Aug 2010

IBM

Information Security Magazine – October 2010: Database Auditing Tools – The Human Factor
sponsored by Information Security Magazine
WHITE PAPER: This issue also discusses database audit tools, applications and the selection process. Learn how your organization can leverage these tools to understand database transaction activity, monitor insiders for malicious activity, and how these logs and audit trails can improve your compliance programs.
Posted: 07 Oct 2010 | Published: 07 Oct 2010

Information Security Magazine
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement