ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Encryption Research

  • Top Mobile Data Protection Best Practices

    Sponsored by: TechTarget Security

    Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours.

  • Best Practices for Mobile Data Protection

    Sponsored by: TechTarget Security

    This expert e-guide presents five essential best practices for securing employee-liable mobile devices and tablets that will allow you to safely embrace the trend toward using personal devices for business.

  • Expert Guide to Securing Emerging Endpoints

    Sponsored by: TechTarget Security

    Encrypting enterprise laptops and other increasingly popular mobile devices is now common practice for users who store or interact with sensitive data. This expert e-guide takes an in-depth look at various data encryption methods and best practices for securing today’s emerging endpoints.

  • 10 Tips for Managing Security in the Cloud

    Sponsored by: Dell, Inc. and Intel®

    With the cloud’s dynamic nature, IT professionals are often wary about how effective data security is in this type of environment. This white paper outlines the top 10 considerations to keep in mind when managing security in the cloud to ensure your business is protected.

  • Data Deduplication technology: A Guide to Data Deduping and Backup

    Sponsored by: HP Inc

    This expert e-guide makes the case for data deduplication technology and outlines how it works, its advantages, different dedupe misconceptions and how it factors into disaster recovery strategies. Read on to learn more.

  • E-Guide: Minimize enterprise data exposure inside and outside the organization

    Sponsored by: IBM

    This expert e-guide provides data masking best practices and explains how to implement an effective strategy for reducing the risk of data exposure from inside and outside the organization.

  • Implementing Tokenization Is Simpler Than You Think

    Sponsored by: First Data Corporation

    A surprisingly simple service-based approach makes implementing end-to-end encryption and tokenization in your payment environment simpler than you might think. In this white paper, learn about the 4 potential activities for a merchant to do in order to add the benefit of these technologies in a service-based scenario.

  • E-Guide: Align Data Protection with Business Importance

    Sponsored by: IBM

    This SearchStorage.com E-Guide discusses the importance of protecting not just data but "use" of the associated information system, and outlines 4 capabilities needed for a better approach to data protection. Read on to learn more.

  • SQL Server Migration

    Sponsored by: Dell and Microsoft SQL

    This E-Guide explores some of the basic steps to ensure a successful migration, as well as the features you'll want to take advantage of right away and 3 key tips for making the process smoother. Uncover some of the less popular - but no less important - changes to the latest version of SQL Server.

  • Oracle Advanced Security with Oracle Database 11g Release 2

    Sponsored by: Oracle Corporation

    This white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.

  • Oracle Database - The best choice for Siebel Applications

    Sponsored by: Oracle Corporation

    This white paper covers the business and technology reasons behind customers' continued choice of Oracle Database for their Siebel Applications deployments.

  • Oracle Database - The best choice for PeopleSoft Applications

    Sponsored by: Oracle Corporation

    This white paper discusses the business and technology reasons behind customers' continued choice of Oracle Database for their PeopleSoft application deployments.

  • FAQ Guide: Tape Vaulting: Best practices to consider for offsite tape storage

    Sponsored by: Iron Mountain

    In this FAQ Guide, David Chapa, senior analyst at the Enterprise Strategy Group, discusses some best practices for tape vaulting. Find out the costs of tape vaulting services, how offsite tape storage costs are determined, how to negotiate your SLAs, and whether or not you should encrypt your tapes before you ship them offsite.

  • Boost Cloud Security with Intel® AES-NI

    Sponsored by: Intel

    Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.

  • 7 Reasons Businesses are Shifting to Cloud Backup

    Sponsored by: CoreVault

    Managing data has become one of the most important and complex IT challenges for businesses of all sizes. For many businesses, the best solution to these complex challenges is a simple one: Manage backup in the cloud. Check out this paper for the top seven reasons businesses are switching to cloud backup.

  • Spectra Libraries with BlueScale Encryption

    Sponsored by: Spectra Logic Corporation

    Spectra Logic offers the only truly integrated encryption option for data backed up to tape and other removable media: BlueScale Encryption. Continue reading to learn how encryption and key management is easy to implement with Spectra T-Series libraries.

  • Cloud-Based Data Protection

    Sponsored by: Iron Mountain

    To cope with growing data protection challenges, organizations are turning to cloud-based data protection for relief. Organizations are discovering that the sooner cloud-based data protection appears in their processes, the greater the benefits.

  • 2010 Annual Study: U.S. Enterprise Encryption Trends

    Sponsored by: Symantec Corporation

    This survey addresses the maturity of an organization’s IT security and data protection program, how encryption is used in organizations, encryption features organizations consider most important, and much more.

  • Delivering applications anywhere, anytime with maximum security and control over data

    Sponsored by: Citrix

    Information security continues to be a significant challenge for enterprises. This whitepaper reviews the security challenges associated with traditional application deployment, management and application security and benefits of delivering applications on demand with Citrix XenApp

  • The Mezeo Cloud Storage Platform for the Enterprise

    Sponsored by: Mezeo Software

    Cloud storage reduces the cost of storing less critical files, automating business processes and providing ubiquitous access to employees globally. The deployable Mezeo Cloud Storage Platform is an enterprise-class solution ideal for organizations looking to implement private clouds.

  • E-Guide: Best Practices for Data Protection and Recovery in Virtual Environments

    Sponsored by: EMC Backup and Recovery Solutions

    Data backup is a top priority at most organizations, but data protection in virtual environments can be especially complicated. In this expert eguide from SearchVirtualDataCentre.co.uk, get tips for doing just that. Find out how you can enhance your data protection strategy without compromising your virtual infrastructure.

  • Five Best Practices for Protecting Backup Data

    Sponsored by: Iron Mountain.

    Backup encryption should be a key element in any security strategy. To achieve that goal, corporations should follow five best practices. This paper details them.

  • Information Security Magazine – June 2010: Laptop Lockdown

    Sponsored by: Information Security Magazine

    This month’s cover story is on useful and affordable encryption options for preventing data loss in your organization’s riskiest endpoints. Other articles in this issue cover cloud security, Symantec’s recent acquisitions, compliance management, and a debate over hiring convicted hackers. Read these great articles and more in this month’s issue.

  • CA ARCserve Backup r12.5 Security Features

    Sponsored by: arcserve

    Check out this demonstration for an explanation of CA ARCserve Backup r12.5 security features. This video offers detailed instructions on how to use the security features, including encryption and administration console.

  • E-Book: DLP for Health Care - Strategies for Securing Electronic Health Information in the Age of HITECH

    Sponsored by: TechTarget Health IT

    Data loss prevention (DLP) in health care—which mostly entails preventing patients’ protected health information (PHI) from falling into the wrong hands—requires well-conceived, well-enforced policies and the technology to back them up.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.