Enterprise Data Protection and PrivacyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Browse Directory>   Infrastructure and Systems ManagementSecurity SolutionsEnterprise Data Protection and Privacy  What is RSS?
Advertisement

ALL RESULTS
  1 - 25 of 497 | Next Page

The new era of big data security analytics by SearchSecurity.com

October 10, 2013 - (Free Research)
This expert guide examines the reasons why Big Data security is so important, providing helpful tips for adapting and utilizing it to your business' advantage. 
(EGUIDE) READ ABSTRACT |

Web Application Firewalls: Patching, SDLC Key for Security, Compliance by SearchSecurity.com

February 11, 2013 - (Free Research)
In this expert e-guide, discover how web application firewalls (WAFs), combined with a strong software development lifecycle (SDLC), are playing an essential role in web application security and compliance. See how you can achieve a strategic, defense-in-depth approach to enterprise security by reading on now. 
(EGUIDE) READ ABSTRACT |

E-Book: Technical Guide on PCI by SearchSecurity.com

October 10, 2011 - (Free Research)
TechTarget’s Security Media Group presents a global look at PCI, and how it is impacted by today’s evolving business needs. Our technical editors from the U.S., Europe, India and Asia provide their respective regions’ perspective on PCI compliance. 
(EBOOK) READ ABSTRACT |

Delivering enterprise information securely on Android, Apple iOS and Microsoft Windows tablets and smartphones by Citrix

August 07, 2012 - (Free Research)
A recent report found that almost two-thirds of organizations were able to increase productivity because of flexibility with mobile devices in the workplace. But utilizing mobile devices can also make the enterprise more vulnerable to attacks. Access this exclusive resource to learn how to mitigate some of the risks associated with BYOD adoption. 
(WHITE PAPER) READ ABSTRACT |

Best Practices for Audit and Compliance Reporting for the IBM System i (AS/400) by PowerTech

July 2008 - (Free Research)
This white paper outlines the key items that need to be reviewed on AS/400 for both configuration data and transactional log information from the audit journal, it also explains various challenges of auditing and reporting on the System i platform. 
(WHITE PAPER) READ ABSTRACT |

Web Security Gateway: Web 2.0 Secured and Simplified by Websense, Inc.

January 2011 - (Free Research)
The Websense Web Security Gateway is designed for customers that want to ensure their level of web security increases as the web evolves from a static resource, to a dynamic communication platform. 
(WHITE PAPER) READ ABSTRACT |

Bailing Out Your Budget: How Websense Lowers Your TCO by Websense, Inc.

January 2011 - (Free Research)
The unfortunate reality for today’s enterprises is that IT security risks continue to escalate at the same time that the resources available to mitigate them are diminishing or, at best, remaining constant. 
(WHITE PAPER) READ ABSTRACT |

Bailing Out Your Budget: How Websense Lowers Your TCO by Websense, Inc.

December 2010 - (Free Research)
The unfortunate reality for today’s enterprises is that IT security risks continue to escalate at the sametime that the resources available to mitigate them are diminishing or, at best, remaining constant. Check out this white paper to learn how to efficiently secure your data while lowering your overall total cost of ownership. 
(WHITE PAPER) READ ABSTRACT |

Risk and Compliance Outlook by McAfee, Inc.

November 2011 - (Free Research)
Forward-thinking companies have implemented or are in the process of developing risk management and compliance initiatives. Learn about options for auditable risk management programs that address IT security as a business risk. 
(WHITE PAPER) READ ABSTRACT |

Dell AppAssure 5 Trial Download by Dell Software

October 2013 - (Free Research)
Check out this free trial download of one vendor's data backup software that has revolutionized data protection by unifying backup, replication and recovery all in one solution. Download your free trial now. 
(TRIAL SOFTWARE) READ ABSTRACT |

Protecting applications and data in a virtual world with AppAssure by Dell Software

September 2013 - (Free Research)
Data protection in a virtual environment often requires strategies and tools different from those utilized in a physical infrastructure. Dell AppAssure provides holistic data protection for both physical and virtual environments, dramatically improving recovery time and recovery point objectives. Read the Brief 
(WHITE PAPER) READ ABSTRACT |

Data Management Strategies for the CIO by SearchDataCenter.com

August 2011 - (Free Research)
CIOs are turning to emerging forms of data management, including predictive business intelligence and information architectures, to harness the power of their data. Inside this expert e-book, gain insight on data management topics such as storage and retention policies, data protection and lifecycle management. 
(EBOOK) READ ABSTRACT |

IT in Europe: Security in the Cloud by SearchSecurity.com

August 2011 - (Free Research)
Although cloud computing offers the ability to be flexible and agile at lower costs, many organisations are still hesitant to adopt because of one concern – security. This SearchSecurity.co.UK E-Zine explores the security challenges of cloud computing and offers expert advice for defending against the latest threats and mitigating risks. 
(EZINE) READ ABSTRACT |

Expert E-zine: Who has access to your email? by SearchSecurity.com

December 2011 - (Free Research)
In this edition of The Exchange Insider, explore the next steps for your email messaging platform with the following Exchange topics: Evaluating Office 365, auditing Exchange 2010 and troubleshooting virtualized Exchange Servers. 
(EZINE) READ ABSTRACT |

TechGuide: Adopting New Threat Detection Techniques for Advanced Attacks by SearchSecurity.com

August 2013 - (Free Research)
Check out this informative guide on the latest threat detection technologies to protect your company from advanced persistent threats today. 
(EBOOK) READ ABSTRACT |

ExaGrid Appliance Product Line Configurations by ExaGrid Systems, Inc.

September 2013 - (Free Research)
In this brief white paper, you will discover a disk-based deduplication system that leverages GRID computing software to provide long-term backup capacity. Find out how your backup system can be optimized with this innovative technology. 
(DATA SHEET) READ ABSTRACT |

Exagrid Product Overview: High Performance, Scalable Disk Backup with Data Deduplication by ExaGrid Systems, Inc.

September 2013 - (Free Research)
This informative data sheet outlines a disk-based backup and data deduplication appliance that's purpose-built for backup that leverages a unique architecture optimized for backup and restore performance, scalability and cost. 
(WHITE PAPER) READ ABSTRACT |

DCIG Disk Backup Report by ExaGrid Systems, Inc.

September 2013 - (Free Research)
This buyer's guide identifies, weighs and scores product features to help organizations select products that deliver on competing requirements. Find out why a series of dedupe appliances is the best set of solutions for midsize enterprises to select from in order to meet next-gen IT infrastructure priorities. 
(WHITE PAPER) READ ABSTRACT |

DCIG Buyer's Guide: Deduplicating Backup Appliance Under $100K by ExaGrid Systems, Inc.

September 2013 - (Free Research)
This exclusive buyer's guide evaluates midrange deduplicating backup appliances under $100K. 
(WHITE PAPER) READ ABSTRACT |

DR Planning: Top 10 tips by SearchStorage.com

April 2013 - (Free Research)
This expert E-Guide explores the top ten DR tips from John Toigo to help navigate DR planning more efficiently and shows you how to justify your DR initiatives by analyzing critical DR data. 
(EGUIDE) READ ABSTRACT |

Expert Checklist: 11 Steps for Aligning Your BC/DR Program with Business Needs by SearchStorage.com

July 2013 - (Free Research)
This e-guide provides an expert checklist for developing a successful business continuity program, designed with the specific needs of your organization in mind. 
(EGUIDE) READ ABSTRACT |

Expert Steps for Testing DR Effectiveness by SearchStorage.com

June 2013 - (Free Research)
This E-Guide outlines three key phases of DR performance evaluation and provides two examples of how conducting a business impact analysis can minimize the effects of a disruption. 
(EGUIDE) READ ABSTRACT |

Essential Guide to Disaster Recovery by SearchStorage.com

February 2012 - (Free Research)
With the mushrooming of disaster recovery technology in the past few years, your excuses for not having a DR plan are falling away. Use this Essential Guide to learn how to take advantage of new technologies that make the disaster recovery provision and planning process easier than it’s ever been. 
(EZINE) READ ABSTRACT |

FAQ: Building a DR site vs. outsourcing disaster recovery by SearchStorage.com

April 2013 - (Free Research)
Access this E-Guide to learn more about the thought that should go into making this decision. Read on to discover more about the importance of a good DR plan and learn: pros and cons of custom-built DR sites vs. outsourced DR, differences between hot sites, cold sites and warm sites, considerationswhen developing your own site and more. 
(EGUIDE) READ ABSTRACT |

Combining virtual server backup methods for a complete strategy by SearchStorage.com

May 2012 - (Free Research)
This expert e-guide outlines strategies for combining virtual server backup methods with traditional approaches for a more comprehensive VM backup system. Discover tips that will protect your virtual environment at no extra cost. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 497 | Next Page

> Explore alternative searches for: Enterprise Data Protection and Privacy

We are always striving to improve our customer experience. Please notify us if there is a company missing that you feel should be in our directory.


Advertisement

Search FindTech

Search the
Technology Services Directory

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts