Data Security Reports

Information Security Asean November 2015
sponsored by TechTarget
EZINE: The cover story looks at the cyber crime landscape in Singapore and what organisations in the city state are doing to combat it
Posted: 09 Nov 2015 | Published: 09 Nov 2015

TechTarget

CW Europe – November 2015
sponsored by TechTarget ComputerWeekly.com
EZINE: Cloud computing has huge benefits to businesses in Europe, but data protection rules have been different for organisations in different parts of Europe.This is about to change with The final version of the General Data Protection Regulation (GDPR) expected soon. All 28 EU member states will have one set of rules to follow.
Posted: 03 Nov 2015 | Published: 03 Nov 2015

TechTarget ComputerWeekly.com

Effective Data Discovery Points Way to Bigger BI Benefits
sponsored by TechTarget Business Analytics
EBOOK: How can you reach a middle ground between control for business users and centralized management from IT and BI managers? Discover why self-service software doesn't have to sideline IT or BI teams.
Posted: 02 Oct 2015 | Published: 02 Oct 2015

TechTarget Business Analytics

CW Europe – October 2015
sponsored by TechTarget ComputerWeekly.com
EZINE: Cloud computing has huge benefits to businesses and individual. The ability to deliver services to any location that has an internet connection and a suitable device empowers people.
Posted: 01 Oct 2015 | Published: 01 Oct 2015

TechTarget ComputerWeekly.com

Best Practices: Laptop and Mobile Backups Today
sponsored by TechTarget Data Backup
EBOOK: This handbook offers insight into what's available today for laptop and mobile backup, how vendors are addressing the challenges associated with backing up these devices and how to choose a solution that's right for you and your needs.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

TechTarget Data Backup

Your Role in AWS Security
sponsored by TechTarget Search AWS
EBOOK: This handbook features how AWS's IAM capabilities, particularly the ability to create groups, form the basis for a secure AWS access policy. Plus, uncover FAQs about AWS security as cloud expert Dan Sullivan examines the role OS's can play in bolstering the security of an AWS environment.
Posted: 25 Aug 2015 | Published: 25 Aug 2015

TechTarget Search AWS

Storage Magazine, August 2015
sponsored by TechTarget Storage
EZINE: Storage magazine's August 2015 issue explores building an on-prem cloud, looks at today's backup applications, and shares ways to improve the disaster recovery planning process.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

TechTarget Storage

Information Security Asean July 2015
sponsored by TechTarget
EZINE: Cyber-crime is a global phenomenon. No business is safe if they fail to implement the right security products and policies.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

TechTarget

Information Security ANZ July 2015
sponsored by TechTarget
EZINE: Analysts and security experts discuss the current risk factors in the ANZ region.
Posted: 07 Jul 2015 | Published: 07 Jul 2015

TechTarget

Is it time for a DLP system in your enterprise?
sponsored by TechTarget Security
EBOOK: Data loss prevention technology is a mature security control whose role is growing as DLP systems are made to respond to mobile and cloud technology in the enterprise.
Posted: 26 Jun 2015 | Published: 26 Jun 2015

TechTarget Security

Shore Up Your Office 365 Attack Surface
sponsored by Proofpoint
EBOOK: This exclusive e-guide reviews the Office 365 suite's security features, including how to take advantage of its benefits and what challenges you may encounter.
Posted: 18 Jun 2015 | Published: 15 Jun 2015

Proofpoint

A New Approach to Remote Replications
sponsored by IBM
WHITE PAPER: This resource examines the steps organizations can take in order to improve network utilization and speed up data transfer for more effective remote replication.
Posted: 01 Apr 2015 | Published: 01 Apr 2015

IBM

An Innovative Storage System for Your Business Needs
sponsored by IBM
WHITE PAPER: In this white paper, discover a storage management system designed to deliver higher performance, scalability and agility.
Posted: 01 Apr 2015 | Published: 28 Feb 2015

IBM

Information Security ANZ March 2015
sponsored by TechTarget Security
EZINE: Experts at Dell and Dimension data in Australia discuss the challenge of securing the end point.
Posted: 05 Mar 2015 | Published: 05 Mar 2015

TechTarget Security

Who's in Your Wallet? Stemming Credit Card Fraud
sponsored by TechTarget Security
EBOOK: Access this technical guide and learn about the standards the payment card industry uses to mitigate the problem including the costs of such standards to your business. Find out the latest info on credit card fraud, industry guidance and how to optimize your system for legitimate customers.
Posted: 13 Feb 2015 | Published: 13 Feb 2015

TechTarget Security

Why Every CIO Should Consider Vulnerability Assessment a Necessity
sponsored by IBM
WHITE PAPER: In this resource, CIOs will learn why vulnerability assessment is so essential to enterprise security, and can discover a leading vulnerability assessment platform that scans targeted systems on a scheduled basis in order to increase your understanding of your organization's overall security posture.
Posted: 03 Feb 2015 | Published: 30 Apr 2014

IBM

Avoiding Pitfalls on the Path to Endpoint Security
sponsored by Dell
EBOOK: Learn how to craft a sound enterprise desktop security strategy with the tips in this expert ezine from TechTarget.
Posted: 11 Dec 2014 | Published: 11 Dec 2014

Dell

What to Look for in Web Application Firewall Products
sponsored by TechTarget Security
EBOOK: In this buyer's guide, experts explain how a WAF works, describe the features that different WAFs possess, and reveal how to weight these factors in selecting the right WAF to protect your enterprise's sensitive data.
Posted: 07 Nov 2014 | Published: 07 Nov 2014

TechTarget Security

Fortify Your Mobile Device Data Protection Efforts
sponsored by TechTarget Data Backup
EBOOK: Assuming that end users aren't keeping much data on their endpoint devices is a losing proposition. Perhaps more importantly, it's a risk that IT administrators cannot afford to take.
Posted: 05 Nov 2014 | Published: 05 Nov 2014

TechTarget Data Backup

Information Security ANZ November
sponsored by TechTarget Security
EZINE: In this expert e-zine, learn how industry leaders like Symantec, CSC and BAE Systems are expanding Australian facilities and working to stake their claim in the face of rising threats and a diminishing skills-base. Additionally, learn about operational challenges as cyber security gets "censored" and how open source security needs serious help.
Posted: 03 Nov 2014 | Published: 03 Nov 2014

TechTarget Security

6 Ways Hackers Try to Break Secure Sockets Layer-Encrypted Data
sponsored by Symantec & Blue Coat Systems
EGUIDE: How do hackers break through secure sockets layer-encrypted data exactly? This expert e-guide has the answer, exploring six common methods these cyber-criminals use.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Symantec & Blue Coat Systems

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

Beyond Passwords: Protect the mobile enterprise with smarter security solutions
sponsored by IBM
WHITE PAPER: Find out how flexible authentication schemes, context-based access and behavioral analysis can help ensure that only authorized mobile users can access your valuable resources—on-site, in the cloud and beyond.
Posted: 09 Oct 2014 | Published: 30 Sep 2013

IBM

Protecting Your Critical Data with Integrated Security Intelligence
sponsored by IBM
WHITE PAPER: Access this white paper to gain actionable insights that can help you reduce security risks and boost compliance.
Posted: 08 Oct 2014 | Published: 30 Apr 2013

IBM

Managing User Identities and Access in the Cloud
sponsored by IBM
WHITE PAPER: Learn how IBM can help design, deploy and manage critical identity and access management controls in cloud environments.
Posted: 08 Oct 2014 | Published: 30 Dec 2011

IBM