Data Encryption Research
-
Challenges With Data Protection in the Cloud
Sponsored by: TechTarget SecurityThis expert e-guide from SearchSecurity.com will help you discover the ways you can ensure better protection for your cloud-hosted data. Inside, you'll find out the major challenges involved with cloud security, as well as tips for protecting your intellectual property.
-
Essential Enterprise Mobile Security Controls
Sponsored by: TechTarget SecurityHow will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.
-
IT in Europe - May 2012
Sponsored by: TechTarget SecurityWhile network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.
-
Exploring cloud Security as a Service options
Sponsored by: TechTarget SecurityThere are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.
-
Mobile Device Security Best Practices for BYOD
Sponsored by: TechTarget SecurityThis expert E-Guide from SearchMobileComputing.com explores the issue of mobile device security and offers best practices for making a BYOD program work in your organization.
-
Provide Secure, Ubiquitous Data For Your Users, Or Face The Consequences!
Sponsored by: TechTarget SecurityThis E-Brief from SearchConsumerization.com explores the issues of data management and how enterprise-level file sharing and syncing solutions can allow corporate data to be safely managed on employee-owned devices.
-
Best Practices for Mobile Device Management
Sponsored by: TechTarget SecurityThis e-guide from SearchConsumerization.com explores best practices for mobile device management in the enterprise and why your strategy must evolve as the phone technology does.
-
Mobile data protection best practices
Sponsored by: TechTarget SecurityCheck out this E-Guide for the top 5 mobile data protection best practices to ensure your corporation's protection.
-
Data Security vs. Performance: Balancing Competing Requirements with New Encryption Capabilities
Sponsored by: SEPATONThis e-guide elaborates on new features and benefits of backup and recovery and explains why they are especially critical in IT environments with large volumes of data.
-
Data Security and Privacy Concerns Pushed into the Spotlight
Sponsored by: GeoTrust, Inc.In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD.
-
Global Deduplication: How it Works and Who Can Benefit
Sponsored by: EssextecThis expert e-guide explains how the limited scalability of source and target-based deduplication can lead to bottlenecks when large volumes of data are backed up. Learn how global deduplication can eliminate these bottlenecks through load balancing and get examples of these types of offerings in the marketplace.
-
Healthcare Network Security with Fewer House Calls: Solution Brief
Sponsored by: IntelBy evaluating offerings and finding the right investment, a struggling IT campus-based IT department they were able to install a remote management solution that allowed them to simplify IT and better secure the sensitive patient data residing in their on-campus health center.
-
How Deduplication Fits into Your Data Backup Plan
Sponsored by: TechTarget Data BackupThis exclusive E-Book provides insight into the things you must consider about the way dedupe is performed as well as the ways in which it integrates with other data protection processes such as replication, encryption/compression and archiving.
-
TechTalk Presentation Transcript: Analyst Jon Toigo discusses tape media today
Sponsored by: Iron MountainIn this transcript of a Jon Toigo video, learn about tape's usefulness in areas like disaster recovery and archiving, and learn about options for tape encryption and best practices for optimizing your tape performance.
-
Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
Sponsored by: GeoTrust, Inc.This expert e-guide describes the dangerous vulnerabilities that can arise from insecure Secure Socket Layer (SSL) usage, and details essential tips and strategies for properly implementing and configuring SSL in order to ensure Web security.
-
Secure your data – protect your business
Sponsored by: TechTarget ComputerWeekly.comThis guide for C-level executives explains the risks faced by businesses and the practical solutions they can take to secure their data.
-
CipherCloud for Office 365 - Encryption Solution Demo
Sponsored by: CipherCloudIn just five minutes, we'll show you how you can transparently encrypt and protect all of your sensitive email, calendar, and contact information in Exchange Online and Hosted Exchange to eliminate concerns about about data privacy, residency, security, and compliance.
-
Next Generation Enterprise WAN DMVPN
Sponsored by: Cisco Systems, Inc.Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so.
-
Customers Discuss Oracle Database Security
Sponsored by: Oracle CorporationOracle customers, TransUnion, CMC Markets, Diamond Resorts International and National Marrow Donor Program, discuss defense-in-depth database security with data encryption, privileged user access control, data masking, and consolidated auditing and reporting.
-
May Technical Guide on PCI DSS Guidance
Sponsored by: TechTarget SecurityThis technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.
-
Simplify SSL Certificate Management Across the Enterprise
Sponsored by: Symantec CorporationManaging SSL Certificates has become a complex task especially for organizations with multiple locations, divisions and increasing Web-based services. In this resource, uncover a five (5) step guide to help you take control on SSL Certificates across the enterprise and key recommendations.
-
Oracle Database 11g Release 2 High Availability
Sponsored by: Oracle CorporationThis white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.
-
Tape Vaulting: What You Need to Know About Tape Backup and Archiving
Sponsored by: Iron MountainCheck out this expert presentation transcript with storage industry analyst Lauren Whitehouse to learn about recent developments in tape that are keeping it relevant.
-
Security in the Cloud Planning Guide
Sponsored by: IntelSecurity is a top concern for businesses looking to implement a cloud computing environment throughout their systems. This white paper provides a comprehensive guide on building security in the cloud from the ground up so you can ensure your data and platforms are protected.
-
Killing Data
Sponsored by: Voltage Security, Inc.Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.