IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Database Encryption

RSS Feed   
Database Encryption Reports
 
Jargon buster guide to GDPR
sponsored by ComputerWeekly.com
EGUIDE: In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
Posted: 31 Mar 2017 | Published: 31 Mar 2017

ComputerWeekly.com

Comforte AG SecurPDS: PCI DSS Technical Assessment
sponsored by Comforte AG
WHITE PAPER: PCI compliance has become especially important in today’s threat ecosystem. Because traditional security methodologies no longer do the trick, businesses are actively seeking out more modern solutions to compliantly keep cardholder datasecure. In this white paper, immerse yourself in SecurDPS, a tokenization and encryption system.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

Comforte AG

Expert Guide to Securing Emerging Endpoints
sponsored by SearchSecurity.com
EGUIDE: Encrypting enterprise laptops and other increasingly popular mobile devices is now common practice for users who store or interact with sensitive data. This expert e-guide takes an in-depth look at various data encryption methods and best practices for securing today’s emerging endpoints.
Posted: 14 Feb 2011 | Published: 14 Feb 2011

SearchSecurity.com

FAQ Guide: Tape Vaulting: Best practices to consider for offsite tape storage
sponsored by Iron Mountain
EGUIDE: In this FAQ Guide, David Chapa, senior analyst at the Enterprise Strategy Group, discusses some best practices for tape vaulting. Find out the costs of tape vaulting services, how offsite tape storage costs are determined, how to negotiate your SLAs, and whether or not you should encrypt your tapes before you ship them offsite.
Posted: 24 May 2011 | Published: 24 May 2011

Iron Mountain

Addressing HIPAA privacy compliance on hospital wireless networks
sponsored by Absolute
EGUIDE: In this expert e-guide, discover how CIOs can cope with strict HIPAA compliance regulations, and access the 7 trends in mobile device security that helps keep health care data safe and secure.
Posted: 07 Oct 2014 | Published: 07 Oct 2014

Absolute

Kicking off an e-health revolution
sponsored by ComputerWeekly.com
EGUIDE: It has been hailed as the next big thing for many years but, it is fair to say, e-health has failed to fulfill its potential. Issues around cost, ease of use and privacy have held back its adoption. Now, find out how Telefonica hopes to kick start the e-health revolution.
Posted: 21 Jul 2014 | Published: 21 Jul 2014

ComputerWeekly.com

After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
sponsored by Lumension
WHITE PAPER: This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Lumension

In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

Tape Vaulting: What You Need to Know About Tape Backup and Archiving
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Check out this expert presentation transcript with storage industry analyst Lauren Whitehouse to learn about recent developments in tape that are keeping it relevant.
Posted: 05 Mar 2012 | Published: 05 Mar 2012

Iron Mountain

Healthcare Network Security with Fewer House Calls: Solution Brief
sponsored by Intel
WHITE PAPER: By evaluating offerings and finding the right investment, a struggling IT campus-based IT department they were able to install a remote management solution that allowed them to simplify IT and better secure the sensitive patient data residing in their on-campus health center.
Posted: 30 May 2013 | Published: 30 May 2013

Intel
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences