Data Security Research
-
GDPR Developments Will Dominate Storage and Compliance in 2017
Sponsored by: Arrow + NetAppIn this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.
-
Tips for Finding a Compliant DaaS Platform and 3 Security Features to Look for in a Provider
Sponsored by: NerdioFinding a compliant DaaS platform isn't always easy. Every organization has their own unique requirements when it comes to compliance and security needs. Use this e-guide to discover tips for finding a platform that meets your organization's needs, and discover 3 security features to look for in a provider.
-
5 Ways to Boost Mobile Application Security & Craft an Effective Mobile Strategy
Sponsored by: BlackBerryIn an era of mobile everything, organizations must adopt mobility strategies to keep up with their on-the-go workforces. However, IT continues to struggle with mobility issues, from security to cost control. Discover 5 ways to boost your mobile application security and learn how to craft the most effective mobility strategy for your organization.
-
Top Mobile Security Threats IT Needs to Know About
Sponsored by: BlackBerryIn an era of mobile everything, mobile security threats are on the rise and security is becoming increasingly important. Discover the top 5 mobile security threats that should be on your radar and the benefits of security solutions like two-factor authentication.
-
How to Manage Oracle E-Business Suite Apps and Databases
Sponsored by: Data IntensityIn this expert e-guide, explore how to simplify and achieve a number of tasks that go into managing Oracle E-Business Suite (EBS) and databases, including patch updates, improving security, and managing cost-based optimizer stats.
-
What to Consider Before Buying Database Performance Monitoring Tools
Sponsored by: TechTarget Data ManagementTo help you select the right tool, or tools, to meet your organization's particular database needs, this buyer's handbook offers advice from Mullins on the key features and functions to look for across the different product categories.
-
Don't Rush into Cloud Databases without a Well-Grounded Plan
Sponsored by: Data IntensityIn this expert e-guide, DBA Brian Peasland helps you weigh the benefits of moving to the cloud. Discover how to take a strategic approach to implementing an Oracle cloud database that anticipates a variety of challenges from legal regulations to data security.
-
Ransomware Detection and Prevention Tools You Need Now
Sponsored by: TechTarget SecurityFighting today's malware threats requires a range of ransomware prevention tools. Learn how to tweak the tools you have and identify what new tools you need.
-
Five Windows 10 security risks that are easy to overlook
Sponsored by: vmware airwatchAs more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.
-
The Current State of Blockchain Compliance
Sponsored by: BAE Systems Applied IntelligenceIn this expert e-guide, we examine blockchains and how they're affecting digital enterprise assets and cybersecurity. Discover how these distributed ledgers relate to Bitcoin and data security. Plus, learn how blockchain innovation and apps like smart contracts are affecting compliance.
-
Artificial Intelligence and Machine Learning: Cybersecurity Advances
Sponsored by: TechTarget SecurityIn this issue of Information Security magazine, we look at machine learning in security and how recent advances may bolster your defenses.
-
Secure Information Exchange in the Digital Age
Sponsored by: OpenTextForrester Senior Analyst Heidi Shey answers five questions regarding secure information exchange (SIE) and discusses how digital transformations are changing the way that IT decision-makers have to approach SIE in the digital age.
-
Seeking secure Wi-Fi
Sponsored by: MicroScopeAn issue looking at the issues around wireless networking, the dangers of advertising with some hints of verticals that are spending
-
Backup target features expand use cases and evolve for better data protection
Sponsored by: Hedvig IncDisk-based backup targets have evolved to become far more than just cheap disk arrays. It is vital to understand the different capabilities these systems can offer. In this guide discover new features such as in-place recovery - that allows a virtual machine to instantiate its data store directly from an appliance.
-
How to Plan Your Hybrid Cloud Backup Strategy
Sponsored by: Colospace Inc.Considering using hybrid cloud to backup your business? It can get complicated very quickly if you're not sure what you're doing. This e-guide walks you through everything you need to know to establish, or strengthen, your cloud backup strategy.
-
How to Determine if Cloud ERP Software is Right for You
Sponsored by: Sage SoftwareMost businesses wait until the pain points grow too large before accepting the need for an ERP system. In this guide, expert IT strategist Adam Boyce helps you determine if cloud ERP software can successfully future-proof your business and explores the differences between on-premise and cloud ERP software.
-
Eight Emerging Data Center Trends to Follow in 2016
Sponsored by: Chatsworth Products EuropeLearn how to develop a stronger infrastructure plan that embraces the Internet of Things as it becomes more widespread. Discover what Henrique Cecci, a research director at Gartner Inc., believes are the top 8 emerging trends that will affect data center facilities moving forward.
-
The Evolution of Enterprise File Sync and Share
Sponsored by: ibm boxEnterprise file sync and share (EFSS) tools have evolved significantly over the past few years. Given these changes, it can be difficult to know exactly which business needs any given tool will meet. Read on to gain an understanding of the changes happening in EFSS, the market, which deployment model is best for your organization, and more.
-
Resource Center: Stop Threats and Prevent Data Loss
Sponsored by: McAfee, Inc.Get a deeper understanding of who is behind theft, the types of data being stolen and the ways it is getting outside of organizations. Though it's difficult to completely stop, discover policies and procedures you can easily follow to reduce overall data loss.
-
Resource Center: How to Safeguard Data
Sponsored by: McAfee, Inc.This Ponemon Institute study, a featured resource on this custom site, details the critical components of data loss prevention (DLP) maturity and gives you eye-opening statistics on data loss incidents worldwide.
-
Insider Security Threats: What CISOs Can Do to Mitigate Them
Sponsored by: Preempt SecurityInsider security threats will always exist, but there are steps you can take to limit their impact. Discover how to implement technical access control and authentication to ensure only the right eyes are consuming sensitive data.
-
Five AWS Data Migration Methods to Consider and How to Overcome Common Mistakes
Sponsored by: UXC Oxygen and Amazon Web ServicesMore enterprises are looking to store data in the public cloud, often at a fraction of the cost of on-premises storage. But transferring that data isn't straightforward. Examine 5 data migration methods for moving storage to AWS in this expert guide, as well as 4 additional mistakes to avoid when transferring servers and apps to the cloud.
-
Formulate an Enterprise Storage Capacity Plan that Doesn't Bust Your Budget
Sponsored by: IBMLearn how to formulate a storage capacity plan that won't bust the IT budget; here, you will also find guidance on how to reduce component complexity with the adoption of now-affordable SSDs, all-flash arrays, and storage as a service, so as to accommodate unstructured data growth.
-
Healthcare Ransomware Attacks: The Critical Role of Backup and 5 Steps for Response
Sponsored by: XeroxIn early 2016 alone, healthcare organizations saw a 300% increase in daily ransomware attacks from 2015. That's why Harun Rashid, CIO of Children's Hospital of Pittsburgh, has provided 6 pointers for the prevention of a ransomware attack. And in the event that attacks still get through, read through Reda Chouffani's 5 steps for effective response.
-
How IAM Can Address Unstructured Content Security Risks
Sponsored by: IBMIn this guide, expert Sean Martin explains why IAM is an important component of unstructured data management and security. Learn how to build an asset inventory and get a better handle on all your data, unstructured or otherwise.