Data Security Research
-
New Insider Threat Emerges in the New Economy
Sponsored by: LumensionLearn how employees and partners are engaging with IT assets and intellectual property.
-
Unprotected Laptops: The Million Dollar Gamble: How Much Can Your Company Afford to Lose?
Sponsored by: Dell, Inc. and Intel®Read this white paper to learn more about laptop security and how asset and data protection solutions from Dell can help save your company millions of dollars.
-
Simplified Data Protection with Disk-Based Backup from Dell and Symantec
Sponsored by: DellEMC and Intel®The new Dell PowerVault DL2000 helps organizations of all sizes deploy simplified, cost-effective data protection--helping accelerate backup and recovery, enhance media reliability and reduce total cost of ownership.
-
Fast, Reliable Data Protection from Dell and CommVault
Sponsored by: DellEMC and Intel®The new state-of-the-art Dell PowerVault DL2000 integrates disk-based backup and recovery with de-duplication technology to help deliver fast, reliable data protection.
-
Total Cost Comparison of Backup Technologies: IT Decision-Maker Perspectives on NetApp SnapVault Disk-to-Disk versus Traditional Tape-Based Backup Solutions
Sponsored by: NetAppDownload this exclusive article to gain insight on why a NetApp SnapVault backup system is 54% less expensive than a similar tape-based backup solution over a typical backup product lifecycle.
-
Keep Your Hard Drive
Sponsored by: DellEMC and Intel®The Keep Your Hard Drive service puts Dell customers in complete control of their data and hard drive disposal, while preserving all the benefits of the Dell Limited Warranty on Failed Hard Drives.
-
Dell ProSupport Laptop Tracking and Recovery
Sponsored by: DellEMC and Intel®The Dell ProSupport Laptop Tracking and Recovery Service helps protect your data by enabling you to track your mobile systems in the event a system is lost or stolen.
-
Dell ProSupport Certified Data Destruction
Sponsored by: DellEMC and Intel®The Certified Data Destruction Service can give Dell customers - from small businesses to large public companies and government agencies - peace of mind that your sensitive data stored on a failed hard drive will not fall into the wrong hands.
-
Presentation Transcript: Phishing and the Underground Economy
Sponsored by: MarkMonitorThis document describes the risks of the new Underground Economy, phishing types, malware and how to combat phishing exploitation.
-
IBM Application Security Solutions Demo
Sponsored by: IBMIBM's application security solutions allow companies to preemptively and actively protect applications from external and internal threats, increase efficiencies, support compliance and improve an organization's overall security posture.
-
Laws, regulations and compliance: Top tips for keeping your data under your control
Sponsored by: SophosThis paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology, can provide the solution.
-
Take a Holistic Approach to Business Driven Security
Sponsored by: IBMRead this white paper to learn about actions that organizations can take to drive security efforts from a business-driven perspective, and how leadership from IBM can help enable success.
-
Enabling Sustainable Compliance Management
Sponsored by: IBMRead this white paper to see how adopting a sustainable security compliance strategy minimizes risk, while making proper use of people, process and technology. Also learn how you can cost-effectively comply with regulations, while maintaining business flexibility to achieve mission goals.
-
eBook: Strategies for Securing Virtual Machines
Sponsored by: Information Security MagazineCheck out this expert eBook to learn about the special security concerns of virtualization and get best practices for securing virtual machines.
-
eBook: Priorities: Despite Economic Uncertainty, Spending on Information Security Remains Strong
Sponsored by: TechTarget ComputerWeekly.comCheck out this expert eBook and learn about the security issues that are receiving increased focus in the UK for 2009 and get tips for addressing these challenges.
-
Enabling Developer Access to Production Data
Sponsored by: Voltage Security, Inc.With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
-
Integrating HP Data Protector Software with HP Data Deduplication Solutions
Sponsored by: HP IncThis white paper will discuss HP Data Protector Software which fully supports HP data deduplication technologies allowing you to recover files more quickly while reducing your data management and storage costs.
-
HP Data Protector Software Advanced Backup to Disk Integration with Virtual Tape Libraries White Paper
Sponsored by: Hewlett Packard EnterpriseThis white paper provides a better understanding of the integration of HP Data Protector Software with Virtual Tape Libraries by utilizing the Advanced Backup to Disk functionality available with the HP Data Protector Software.
-
Ethical Hacking and Risk Assessments
Sponsored by: Global KnowledgeAttend this webcast to learn about risk assessment process and tools used by ethical hackers.
-
Agentless Application Virtualization: Enabling the Evolution of the Desktop
Sponsored by: VMware, Inc.In this study, IDC analyst Michael Rose discusses how VMware ThinApp, an agentless virtualization solution, addresses the challenges of desktop computing. Read this paper to learn about the pros and cons of virtualized client computing.
-
eBook: Mobile Security: Protecting Mobile Devices, Data Integrity and Your Corporate Network
Sponsored by: TechTarget Mobile ComputingStructured in four in-depth chapters, this E-Book will provide an objective perspective into the key defenses against device and data loss, network compromise and mobile malware.
-
Blackberry Enterprise Solution: Security Technical Overview
Sponsored by: BlackBerryThis document describes the security features of the BlackBerry Enterprise Solution and provides an overview of the BlackBerry security architecture.
-
7 Essential Steps of Network Security
Sponsored by: QualysThis paper details the essential aspects of putting into place a measurable and sustainable 7 step vulnerability management program, and demonstrates how QualysGuard automates everything you need along the way.
-
IBM Optim Data Privacy Solution for SAP
Sponsored by: IBMThe IBM® Optim™ Data Privacy Solution for SAP® offers comprehensive, proven capabilities for de-identifying test data, making the data appropriate for testing.
-
Solving the Distributed Data Problem
Sponsored by: IBMCompanies need to reevaluate traditional methods of protecting branch office and PC data such as tape backups and other localized do-it-yourself solutions. Read this white paper to learn about remote on-demand services.