Research Library

Powered by

Data Encryption Research

  • Cloud-Based Data Protection

    Sponsored by: Iron Mountain

    To cope with growing data protection challenges, organizations are turning to cloud-based data protection for relief. Organizations are discovering that the sooner cloud-based data protection appears in their processes, the greater the benefits.

  • 2010 Annual Study: U.S. Enterprise Encryption Trends

    Sponsored by: Symantec Corporation

    This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.

  • Delivering applications anywhere, anytime with maximum security and control over data

    Sponsored by: Citrix

    Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp

  • The Mezeo Cloud Storage Platform for the Enterprise

    Sponsored by: Mezeo Software

    Cloud storage reduces the cost of storing less critical files, automating business processes and providing ubiquitous access to employees globally. The deployable Mezeo Cloud Storage Platform is an enterprise-class solution ideal for organizations looking to implement private clouds.

  • E-Guide: Best Practices for Data Protection and Recovery in Virtual Environments

    Sponsored by: EMC Backup and Recovery Solutions

    Data backup is a top priority at most organizations, but data protection in virtual environments can be especially complicated. In this expert eguide from, get tips for doing just that. Find out how you can enhance your data protection strategy without compromising your virtual infrastructure.

  • Five Best Practices for Protecting Backup Data

    Sponsored by: Iron Mountain.

    Backup encryption should be a key element in any security strategy. To achieve that goal, corporations should follow five best practices. This paper details them.

  • Information Security Magazine – June 2010: Laptop Lockdown

    Sponsored by: Information Security Magazine

    This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue.

  • CA ARCserve Backup r12.5 Security Features

    Sponsored by: arcserve

    Check out this demonstration for an explanation of CA ARCserve Backup r12.5 security features. This video offers detailed instructions on how to use the security features, including encryption and administration console.

  • E-Book: DLP for Health Care - Strategies for Securing Electronic Health Information in the Age of HITECH

    Sponsored by:

    Data loss prevention (DLP) in health care—which mostly entails preventing patients’ protected health information (PHI) from falling into the wrong hands—requires well-conceived, well-enforced policies and the technology to back them up.

  • Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment

    Sponsored by: Lumension

    Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment.

  • Lumension® Device Control for Microsoft® System Center

    Sponsored by: Lumension

    Read how through centrally managing, deploying, enforcing and monitoring device/port access, and more, Microsoft SCCM customers can significantly reduce implementation costs and quickly enhance their security policy enforcement.

  • Accelerating IBM z/OS Global Mirror with the Cisco MDS 9000 Family

    Sponsored by: Cisco Systems, Inc.

    This document describes how users of IBM z/OS Global Mirror can reduce costs and improve performance with a tightly integrated Cisco® MDS 9000 Family solution.

  • Remote Encryption Management SDK

    Sponsored by: Intel

    Remote Encryption Management Software Development Kit (SDK) provides the tools to allow FDE or software based encrypted hard drives to be unlocked remotely out of band using vPro. This allows computers with vPro and encrypted hard drives to be managed out-of-band. Learn more about this SDK and download your free copy today.

  • Data Deduplication – Different Approaches for Different Environments

    Sponsored by: Hewlett Packard Enterprise

    There are so many different types of deduplication: source, target, hash-based, delta differential-based, and global dedupe, for example. Read this presentation transcript for a discussion of data backup methods, data security, and data storage strategies for various environments.

  • Protecting Healthcare Organizations from Patient Data Loss

    Sponsored by: Code Green Networks, Inc.

    Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.

  • Data Storage Backup Security tutorial: Tape Encryption and Cloud Backup

    Sponsored by: Quantum Corporation

    Data storage backups are a necessary element of data protection plan, but they're often the biggest source of security woes. Learn everything you need to know about keeping your backups secure in this tutorial.

  • Presentation Transcript: Endpoint security fundamentals

    Sponsored by: Sophos

    This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.

  • The Massachusetts Data Protection Law

    Sponsored by: &

    Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.

  • Presentation Transcript: Changing the Economics of Storage Infrastructure with Virtualization

    Sponsored by: LSI and presented by HP

    In these hard economic times, so much information is already out there about how to bring down the costs of storage infrastructures, but none of them describe how the design of a flexible and agile (adaptive) infrastructure actually facilitates these potential savings.

  • Exchange Insider E-Zine Volume 1: The Importance of Lifecycle Planning for Email Archives

    Sponsored by:

    In this premier issue of Exchange Insider, you'll learn the importance of properly archiving email messages in your Exchange environment, learn how implementing SSL concepts is required for proper Exchange infrastructure management, and what the requirements are to securely migrate to Exchange Server 2007 from previous, legacy versions.

  • Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession

    Sponsored by: Information Security Magazine

    Check out this eBook and get expert advice that can help your company successfully improve its threat management posture.

  • Strengthening Enterprise Security through Notebook Encryption

    Sponsored by: Intel Corporation

    Implementing notebook computer encryption is significantly less costly than the potential expense of one data breach. Read this paper to learn why Intel recommends adopting notebook encryption and how to implement it in a cost-effective manner.

  • Faster Application Development via Improved Database Change Management

    Sponsored by: Embarcadero Technologies, Inc.

    Embarcadero® Change Manager™ puts the power of change tracking, schema comparison, software-generated synchronization scripts, and flexible reporting into the hands of the development team.

  • 7 Requirements of Data Loss Prevention

    Sponsored by: Symantec Corporation

    This report provides a clear understanding of the capabilities a successful data loss prevention solution must deliver. It also incorporates insight into the capabilities that companies require from their solution.

  • MegaCryption v6.2

    Sponsored by: Advanced Software Products Group, Inc. (ASPG, Inc.)

    ASPG's latest enterprise encryption is designed for the prevention of data security breaches and securing data exchanged between business partners for z/OS, Windows, UNIX & Linux.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.