ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • Dell Equallogic PS Series and VMware View Enhance Virtual Desktop Project Success

    Sponsored by: Dell and VMware

    Read this white paper to to learn how VMware View can help IT administrators decrease operating costs by centralizing management, data protection and security.

  • Practical Steps to Achieve and Maintain NERC Compliance

    Sponsored by: Tripwire, Inc.

    This paper describes seven practical steps information security professionals can take to integrate controls into IT production operations, to simultaneously achieve NERC compliance goals, and also IT operational and security goals.

  • Managing Your Data Assets

    Sponsored by: Pitney Bowes Business Insight

    Information management is integral to successfully maintaining a competitive advantage. The value of all your data can increase or decrease over time depending on how you manage it. Read on to learn how to gain the insights into information management you need to succeed and gain that competitive edge that is now more important than ever.

  • Entitlement Reviews: A Practitioner's Guide

    Sponsored by: Varonis

    This document delivers a step-by-step process that your organization can follow to ensure that you know who owns each data set and who should have access to that data.

  • Fixing the "Everyone" Problem

    Sponsored by: Varonis

    Read this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer.

  • Protecting SharePoint Data Long Term

    Sponsored by: Varonis

    This paper focuses on SharePoint access control management challenges, identifies best practices that need to be considered, and demonstrates how Varonis can help.

  • Symantec Protection Suite Challenge

    Sponsored by: Symantec Corporation

    Check out this demo to take Symantec's Protection Suite Challenge and see how your network security stacks up so you can focus on your business.

  • Technology & Business from Sun and AMD

    Sponsored by: Sun Microsystems, Inc.

    Inside this magazine, you'll find stories explaining why AMD processor-powered Sun solutions for storage and archiving, Microsoft Exchange 2007 and other applications are receiving rave reviews from customers and analysts alike. There are also several exclusive offers...

  • Shavlik Integrates Sunbelt Software Technology: Keeping Endpoints Secure, Compliant and Well-Managed

    Sponsored by: Shavlik Technologies

    This Market Alert from Aberdeen group draws on current research findings to analyze endpoint security solutions and identify Best-in-Class companies as far as protecting and managing endpoints. Read this analyst written article to learn more.

  • eBook-- Defining an Email-Archiving Policy

    Sponsored by: Symantec Corporation

    Read this chapter of the e-book Email Archiving Planning: Policies and Product Selection to learn how to create and implement a comprehensive policy on email archiving that will enforce how users manage and retain email messages.

  • Desktop Virtualization Offers Economic Stimulus Package: Where is the ROI of VDI?

    Sponsored by: Dell Software

    This webcast presented by the Burton Group & Quest Software will discuss the numerous benefits and cost savings of deploying desktop virtualization in your enterprise such as reduced desktop hardware maintenance costs, streamlined software maintenance, self-service fault resolution, improved desktop and data security and more!

  • Presentation Transcript: Endpoint security fundamentals

    Sponsored by: Sophos

    This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight.

  • The Massachusetts Data Protection Law

    Sponsored by: TechTarget Security

    Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned.

  • Symantec Protection Suite Enterprise Edition

    Sponsored by: Symantec Corporation

    Symantec Protection Suite creates a protected endpoint and messaging environment that is secure against today's complex malware, data loss and spam threats, and is quickly recoverable in the event of failure.

  • 5 Keys to Protecting Your Sensitive Information: What Every Enterprise Executive Should Know

    Sponsored by: Symantec Corporation

    Preventing sensitive information from being sent outside your enterprise has become a top priority for organizations today. If you are evaluating a data loss prevention (DLP) solution, make sure you have a clear understanding of the requirements for successful data protection. Read this paper to learn more.

  • Information Security Magazine, June 2009 - SIMs: More than just a pile of logs

    Sponsored by: Information Security Magazine

    This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.

  • Top Benefits of Symantec Protection Suite

    Sponsored by: Symantec Corporation

    Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.

  • VMware Solutions for Small and Midsize Businesses: The Most Cost-Effective Way to Enable Always On IT

    Sponsored by: Dell and VMware

    Check out this solution brief to discover how VMware equips SMBs with technology solutions that allow them to cost effectively optimize the use of their existing IT assets and resources as well as protect the systems, data, and applications that run the business, ensuring Always On IT.

  • eGuide: Essential Guide to Identity & Access Management

    Sponsored by: Information Security Magazine

    This essential guide from Information Security Magazine covers important topics around Identity and Access Management because managing proper access to applications and sensitive data becomes even more important in a recession. Download this E-Guide to learn more.

  • Presentation Transcript: Changing the Economics of Storage Infrastructure with Virtualization

    Sponsored by: LSI and presented by HP

    In these hard economic times, so much information is already out there about how to bring down the costs of storage infrastructures, but none of them describe how the design of a flexible and agile (adaptive) infrastructure actually facilitates these potential savings.

  • The Insider Threat and Mobile Devices: Employees Often Evade and Ignore Security Policies

    Sponsored by: IronKey

    Check out this presentation transcript to learn about the results of a study concerned with the extent to which employees in U.S. companies are complying or not complying with reasonable data protection and security practices.

  • Integrating Virtualized Servers with VMware vStorage-Enabled Dell EqualLogic iSCSI SANs

    Sponsored by: Dell and VMware

    Dell EqualLogic Auto- Snapshot Manager / VMware Edition enables administrators to quickly and easily create hypervisor-aware snapshots of VMs-helping simplify data management, enhance scalability of data protection and recovery, and increase application performance.

  • Magic Quadrant for Endpoint Protection Platforms

    Sponsored by: Sophos

    Gartner's Magic Quadrant for Endpoint Protection Platforms assesses a company's ability to execute and its completeness of vision. According to Gartner, Sophos continues to have a strong reputation for support and service from customers and the management interface achieves a good balance of simplicity without sacrificing depth of control.

  • eBook: A Holistic Approach to Data Protection

    Sponsored by: TechTarget CIO

    In this eBook the SearchCIO.com team discusses how Data Protection encompasses a host of technologies, business processes and best practices. Government regulations threaten dire consequences for noncompliance, and compromised data quickly becomes a public relations and customer retention issue.

  • Information Security Magazine: April 2009 - Is Data Loss Prevention keeping your data where it should be?

    Sponsored by: Information Security Magazine

    This month's issue of Information Security Magazine is centered on Data Protection. We've got articles covering Data Loss Prevention solutions and how they work in the real world, Log Management as it pertains to security forensics in the case of an unfortunate security event, and some compliance lessons from Delaware's Dept. of Technology.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.