IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed   
Secure Data Reports
 
Cazena Secures Massive Cloud Data Lakes with Lacework
sponsored by Lacework
CASE STUDY: Learn how Lacework helped Cazena, a SaaS company that provides cloud-based data lakes as a software service, reduce noise generated by their security stack, identify anomalies in customer environments, increase operational efficiency and more.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Lacework

The Business of Data Security: 4 Often Overlooked Security Considerations for SMBs
sponsored by Citrix
EBOOK: As SMBs continue to rely on digital channels for the management and storage of critical information, it’s imperative that a data security strategy is implemented to meet increasingly strict security and compliance requirements. With than in mind, download this e-book to uncover 4 often-overlooked data security considerations for SMBs.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Citrix

5 Steps to Application-aware Data Protection
sponsored by Commvault
RESOURCE: Read the following blog post to examine 5 steps that will help you achieve application-aware data protection in your organization.
Posted: 21 May 2020 | Published: 21 May 2020

Commvault

Ransomware Realities for Small and Medium-Sized Businesses
sponsored by Crowdstrike
WHITE PAPER: Contrary to the belief that ransomware only targets large organizations, small and medium-sized businesses (SMBs) are on the receiving end of a breach nearly 43% of the time. But without the resources of a large business, what can SMBs do to protect themselves? Read on to find out.
Posted: 20 May 2020 | Published: 20 May 2020


CW APAC, July 2020: Trend Watch: Security
sponsored by ComputerWeekly.com
EZINE: In this handbook, Computer Weekly looks at what organisations in the Asia-Pacific region are doing to secure their systems, from adopting a DevSecOps approach, to preparing for cyber attacks and ensuring the privacy of Covid-19 contact-tracing app users.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

ComputerWeekly.com

10 Best Practices for Internet Security
sponsored by Verizon
RESOURCE: Beyond firewalls, antivirus software and other security capabilities, organizations need to understand and address other vulnerability areas that’s don’t require spending to solve. This article from Verizon highlights 10 best internet security practices to help your organization maintain good security hygiene, read on to get started.
Posted: 10 Jul 2020 | Published: 10 Jul 2020

Verizon

Royal Holloway: An enhanced approach for USB security management
sponsored by ComputerWeekly.com
RESOURCE: USB flash drives and other USB-connected data storage devices offer a simple way of making data more portable and more easily transferrable. However, their use presents security risks that must be addressed. Apart from increasing the risk of data theft, they have often been used to transfer malware, sometimes with disastrous results.
Posted: 02 Jul 2020 | Published: 03 Jul 2020

ComputerWeekly.com

The Australian Museum Takes on Cybersecurity
sponsored by BlackBerry
CASE STUDY: In this case study, follow the Australian Museum, keepers of a vast collection of sensitive historic and cultural information, as they partner with CylancePROTECT to implement a multi-layer approach to security that enables them to prevent malware attacks and secure their invaluable research data.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

BlackBerry

Case Study: Astra Daihatsu Motor
sponsored by Commvault
CASE STUDY: Download this case study to find out how Astra Daihatsu overcame their previous issues with assembly line downtime and met regional compliance regulations using Commvault’s Complete Backup & Recovery and the 4 benefits they realized as a result.
Posted: 21 May 2020 | Published: 31 Dec 2019

Commvault

Capsule8 Enterprise Linux Protection
sponsored by Capsule8
PRODUCT OVERVIEW: To keep up as enterprises modernize around them, security teams need to adapt their approach to focus on achieving protection across their entire enterprise infrastructure across all environments. Download this product brief to discover the key features of Capsule8 Protect, designed to uphold security on any system and at scale.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info