IT Management  >   Systems Operations  >   Security  >  

Secure Data

RSS Feed   
Secure Data Reports
 
Data Privacy Is the New Strategic Priority
sponsored by IBM
WHITE PAPER: Recently, Forrester conducted research, in partnership with IBM to evaluate enterprises’ data privacy compliance with increasing regulatory requirements. Read on to uncover the key insights from the research.
Posted: 22 Nov 2019 | Published: 31 Jul 2019

IBM

Structuring an IAM program
sponsored by Hitachi ID
WEBCAST: With the increasing complexity of cyberattacks, managing access has become critical to the protection of data. IAM & PAM programs allow IT teams to monitor privileged accounts and defend against attacks.Watch this webinar to understand what goes into these programs, where it fits within your organization & how to justify the investment.
Posted: 13 Nov 2019 | Premiered: Oct 17, 2019

Hitachi ID

The State of Enterprise Data Resiliency and Disaster Recovery
sponsored by Datrium
ANALYST REPORT: This research report digs into the prevailing threats against DR, as well as shares several strategies for responding to this rapidly evolving threat landscape and factors that prevent companies from effectively responding to DR events. Download it now to ensure your DR processes are up to scale.
Posted: 18 Nov 2019 | Published: 18 Nov 2019

Datrium

Foundation for Digital Transformation
sponsored by Infovista
ANALYST REPORT: In this EIQ report, gain an understanding of the impact of new consumer expectations on applications, digital transformation and networking systems initiatives within retail, manufacturing and banking/finance industries.
Posted: 19 Nov 2019 | Published: 19 Nov 2019

Infovista

Third-Party Risk Best Practices Extracting Value from Your Data Map
sponsored by OneTrust
WEBCAST: In aiding companies mature their privacy and security compliance programs, OneTrust heard one question more than any other: “How do I keep my data map up to date?” In this webcast, Jason Sabourin from OneTrust discusses howto overcome this challenge with the OneTrust Vendor Risk Platform to automate recordkeeping.
Posted: 21 Nov 2019 | Premiered: Nov 21, 2019

OneTrust

Ionic Machina Cloud Copy Tool
sponsored by Ionic Security
RESOURCE: Download this article for a demo of Ionic Machina and how it can secure data across different cloud providers.
Posted: 20 Nov 2019 | Published: 20 Nov 2019

Ionic Security

The Business Value of High Availability Storage Environments from HPE and Veeam
sponsored by Veeam Software
WEBCAST: Not every backup system on the market—though they may tout as such—cannot deliver the desired data availability, streamline operations in heterogenous environments, and reduce costs and the risk of data loss. Tune into this video to discover a solution from HPE and Veeam that can deliver on these promises.
Posted: 01 Nov 2019 | Premiered: Feb 1, 2018

Veeam Software

The CISO’s Handbook for Certificate Management
sponsored by AppViewX
WHITE PAPER: Certificate-related outages usually stem from persistent cases of mismanagement. Even the simplest of errors have large impacts. However, most events can be circumvented by simply using a certificate management system. In this white paper, uncover 3 steps technology leaders can take to implement certificate management.
Posted: 06 Nov 2019 | Published: 06 Nov 2019

AppViewX

What Every Company Should Know About Cookies
sponsored by Namogoo
EBOOK: Nearly every website relies on cookies to allow them to collect specific data on their visitors to enhance customer experience. But as helpful as they can be, the information stored on them can pose a privacy risk. In this e-book, explore the various types of cookies and how they will be affected by data privacy laws.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

Namogoo

The Secrets of Evaluating Security Products
sponsored by SentinelOne
EBOOK: Prioritizing security and choosing the right tools is critical for business to maintain their IT environments. This e-book goes in-depth into the trends and challenges of cybersecurity, as well as criteria for evaluating security tools. Read on to learn more.
Posted: 15 Nov 2019 | Published: 31 Aug 2019

SentinelOne
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement