IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed   
Secure Data Reports
How to Address the Top Five Human Threats to Your Data
sponsored by ALTR
WHITE PAPER: Data security threats seem to be everywhere and growing. Even the most hardened, off-the-grid security experts acknowledge that it is impossible to be 100% secure. Addressing top threats to your data is the first step in building a layered, data-centric approach to data security and privacy. Read on to learn how you can get started.
Posted: 07 Jun 2019 | Published: 07 Jun 2019


Drive More Business Value with a Modern Backup
sponsored by Cohesity
WHITE PAPER: This paper introduces a cloud-ready, API-rich converged infrastructure that unifies data backup, recovery, and management to ensure your business is extracting more value from its data. Read on to learn how to put backup data to use to meet evolving business requirements.
Posted: 14 Jun 2019 | Published: 14 Jun 2019


Modernize Your Data Protection
sponsored by Forcepoint
WEBCAST: Navigating your data protection journey can be complex. In this webcast, Angelica Torres-Corral, Senior Product Marketing Manager at Forcepoint gives insights to gaining visibility & control of your data, optimizing a Data Loss Prevention (DLP) software and adopting a more proactive security strategy.
Posted: 10 Jun 2019 | Premiered: Jun 10, 2019


Understanding Your Data Protection ROI
sponsored by Veeam Software
WHITE PAPER: Access a snippet of this "Data Protection ROI for Dummies" eBook to learn how to not only quantify the value of an airtight data protection and backup strategy, but also how to convey its importance to business personnel who might not be as technically informed as yourself.
Posted: 31 May 2019 | Published: 31 May 2019

Veeam Software

Achieving Hitrust Certification with Impenetrable Cloud Security
sponsored by Armor
CASE STUDY: As a SaaS provider of population health and care management technology and services, Medecision made the commitment to meet the most rigorous standards and protocols available, including achieving HITRUST CSF certification. In this case study, learn how Medicison was able to achieve the certification by deploying Armor Anywhere.
Posted: 06 May 2019 | Published: 06 May 2019


TITUS Changes Tack, Places Big Bet on Machine-Learning-Based Classification
sponsored by TITUS
WHITE PAPER: One of the primary reasons data security is less adopted than other security areas is that it can be complex, and often places a burden on users in terms of changes to workflows. In this white paper, learn how TITUS Intelligence Protection (TIP) with machine-learning-based classifications can greatly reduce the need for user involvement.
Posted: 15 May 2019 | Published: 09 Nov 2018


Enterprise Data Protection: A Four-Step Plan
sponsored by Veritas
WHITE PAPER: What goes into an enterprise-wide data protection (DP) plan? More than you think. This interactive buyers' guide and checklist provides you with a four-step approach to ensuring all workloads—whether on-premises or in the cloud—are protected efficiently.
Posted: 13 May 2019 | Published: 13 May 2019


Access & Protect Your Data – Anywhere, Anytime
sponsored by TITUS
WHITE PAPER: The explosion of data and complexity of regulatory governance have made data protection a moving target. In this white paper, learn how TITUS and Dataguise bring together the most comprehensive approach to data protection to enable you to intelligently detect and secure your most valuable data wherever it resides.
Posted: 15 May 2019 | Published: 15 May 2019


5 Must-Haves for Your Enterprise Backup
sponsored by Cohesity
RESOURCE: Read this tip sheet to view 5 must-have enterprise backup capabilities for when you're evaluating your current, or next, enterprise backup and recovery investment.
Posted: 19 Jun 2019 | Published: 19 Jun 2019


Gauge your Data Security and Privacy Maturity
sponsored by Akamai Technologies
ANALYST REPORT: Download this Forrester assessment so you can gauge where your firm is on its data security and privacy journey and discover which core competencies you need to strengthen or develop.
Posted: 07 May 2019 | Published: 07 May 2019

Akamai Technologies

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement