Companies Data SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Companies Data Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Business Intelligence Solutions
 •   Enterprise Information Integration/ Metadata Management
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Mobile Device Management
 •   Data Warehousing
 •   Storage Security
 •   Wireless Security
 •   Security Policies

Related Searches
 •   Application Of Companies
 •   Asp Companies Data
 •   Companies Data Knowledge
 •   Companies Data Security Case Study
 •   Companies Data Security Own
 •   Companies Data Security Pay
 •   Companies Data Security Related
 •   Companies Firms
 •   Presentation Companies Data Security
 •   Site Companies Data
Advertisement

ALL RESULTS
1 - 25 of 487 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Enabling Compliance with the PCI Data Security Standards by Vormetric

January 2007 - (Free Research)
Data Encryption Expert fills the gaps in your data protection efforts as an affordable and easy to implement solution to difficult compliance requirements like encryption, access control, host protection and auditing. 
(WHITE PAPER) READ ABSTRACT |

Europe's Largest Regional Airline Protects Reservations System and Company Data with Veeam by Veeam Software

December 2013 - (Free Research)
Check out this resource to find out how a leading vendor's backup solution helped Europe's largest regional airline eliminate downtime. 
(WHITE PAPER) READ ABSTRACT |

Is Your Data at Risk?: Why Physical Security is Insufficient for Laptop Computers by Sophos, Inc.

June 2009 - (Free Research)
Evaluating the various data security options to protect your PCs can be challenging. This paper examines the options, discusses why passwords alone are not sufficient and makes the case for strong data encryption. 
(WHITE PAPER) READ ABSTRACT |

Unprotected Laptops: The Million Dollar Gamble: How Much Can Your Company Afford to Lose? by Dell, Inc. and Intel®

January 2009 - (Free Research)
Read this white paper to learn more about laptop security and how asset and data protection solutions from Dell can help save your company millions of dollars. 
(WHITE PAPER) READ ABSTRACT |

McAfee Enterprise Mobility Management platform by McAfee, Inc.

May 2013 - (Free Research)
Learn how you can say "yes" to mobile productivity while still protecting your most valuable company data and assets. Learn how you can properly secure today's next-generation endpoint for business - the mobile device - with comprehensive authentication and encryption enforcement, remote device locking, secure containers, and more. 
(WHITE PAPER) READ ABSTRACT |

Four Things Your Server Could Tell You: McAfee Total Protection for Server - Security and Compliance from a Single Solution by McAfee, Inc.

November 2010 - (Free Research)
For years when people thought about security, it was usually in terms of desktop/laptop anti-virus, or perhaps email and spam filtering. Read this paper to learn about specific vulnerabilities that could affect your server and how McAfee Total Protection for Server can help protect company data and ensure compliance. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Improving Regulatory Compliance with Encryption by Utimaco Safeware

February 2007 - (Free Research)
This white paper examines the role that encryption plays in minimizing your company's risk and helps IT directors, security officers, and executives meet confidentiality mandates and satisfy legal requirements within particular geographic regions. 
(WHITE PAPER) READ ABSTRACT |

Securing Data Stored on Tape with Encryption by Quantum Corporation

April 2010 - (Free Research)
Considering company data needs to be stored for longer periods of time and the high cost of a data breach; the need to encrypt data stored on tape is becoming increasingly important. Read this paper now to learn about why companies are moving in this direction, and what technologies are out there to help. 
(IT BRIEFING) READ ABSTRACT |

What You Need to Know about Cloud Backup: 10 FAQs Answered by Asigra

June 2013 - (Free Research)
This white paper discusses the ten most common questions that companies are asking about cloud backup. 
(WHITE PAPER) READ ABSTRACT |

4 issues caused by retaining too much unnecessary data by DLT Solutions

June 2012 - (Free Research)
Access this expert SearchDataBackup.com E-Guide to explore four problem points concerning retention of critical and unnecessary data and learn how to discern between the two. 
(EGUIDE) READ ABSTRACT |

IT, IG and Compliance: The New World Order for Data Management by SearchCompliance.com

October 2013 - (Free Research)
Join ARMA, SearchCompliance, and hundreds of your peers online for this look at information governance processes in the age of big data. Hear expert opinions on information governance strategies and best practices to keep mobile data secure, stay regulatory compliant and even make data management processes more efficient in the big data era. 
(VIRTUAL TRADE SHOW) READ ABSTRACT |

The High Stakes of Security: Protecting Your Brand by IBM Software Group

July 2008 - (Free Research)
This white paper reviews a security approach that's integrated with your business strategy. Without this, you're risking a lot more than downtime or the simple loss of information assets or capital-you may be betting your organization... 
(WHITE PAPER) READ ABSTRACT |

Introducing BlackBerry Balance™ Technology by BlackBerry

September 2011 - (Free Research)
Learn more about how BlackBerry® Enterprise Server or BlackBerry® Enterprise Server Express, along with specific IT policies and features built into the device software, help keep personal information separate and business information highly secure. 
(WEBCAST) READ ABSTRACT |

Business-Class Security and Compliance for On-Demand Instant Messaging by WebEx Communications, Inc.

December 2006 - (Free Research)
Instant messaging (IM) can increase productivity, but not without potentially compromising the security and privacy of the information that is being shared. Read this paper to learn how your organization can securely meet its business goals with IM. 
(WHITE PAPER) READ ABSTRACT |

IBM zSecure Compliance and Administration by IBM

March 2013 - (Free Research)
View this webcast to learn how you can improve collaboration with your employees and business data. Find out the key to keeping up with today's fast-paced culture and how you can ensure your data is protected no matter where your employees access the information. 
(WEBCAST) READ ABSTRACT |

Chapter 2: EBook: Corporate Data in the Consumer Cloud by BlackBerry

November 2013 - (Free Research)
This expert resource examines specific policy considerations IT needs to keep in mind when using consumer cloud storage services, and discusses features of services and tools that can help control the use of the cloud. 
(WHITE PAPER) READ ABSTRACT |

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions by Symantec Corporation

August 2010 - (Free Research)
This paper discusses common security shortfalls found through a survey of U.S. small businesses, and provides five important tips for a security-aware business. 
(WHITE PAPER) READ ABSTRACT |

New Insider Threat Emerges in the New Economy by Lumension

February 2009 - (Free Research)
Learn how employees and partners are engaging with IT assets and intellectual property. 
(WHITE PAPER) READ ABSTRACT |

Simple Steps to Protect and Retain Valuable Data by Iron Mountain

October 2008 - (Free Research)
This expert E-Guide details some simple steps your organization can take to ensure its data is secure and features a Q&A discussion that details what you need to know to protect and retain valuable company information. 
(WHITE PAPER) READ ABSTRACT |

Demo: Protecting Microsoft SQL Server 2008 Using FalconStor CDP by FalconStor Software

July 2010 - (Free Research)
Watch this video demonstration to see exactly how FalconStor Continuous Data Protector is used to protect and recover your Microsoft SQL Server data. 
(PRODUCT DEMO) READ ABSTRACT |

Real-time vs. right-time analytics in Oracle environments by SearchOracle

April 2013 - (Free Research)
We live in a 24/7 world- making real-time analytics an essential part of any business intelligence strategy. Access this exclusive handbook today to gain an in-depth analysis of what real-time analytics should mean for you. Learn how the right real-time analytics tools and strategies can give users what they need. 
(EGUIDE) READ ABSTRACT |

Sparking a Plan: Offsite Tape Storage and Smarter Protection Against the Elements by Iron Mountain

October 2012 - (Free Research)
There's always a chance your data can be destroyed or damaged if it's only stored in one place, so while it's important to secure your on-site storage against the elements, it can't hurt to look into partnering with an off-site tape storage and data restoration pro. This article explains why. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Is Your Backup System Ready to Scale with Your Data? by SonicWALL

December 2011 - (Free Research)
Check out this informative presentation transcript to hear how backup automation with rule-based, enforced administrative policy control can efficiently streamline backup workflow and adapt to the changing dynamics of your backup environment. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Introducing IBM Storwize V7000 Unified by IBM

November 2011 - (Free Research)
This video provides insight into today's data growth trends and explores the impact they are having on company data centers. Learn about the latest storage developments that enable management of both block and file level data, increase disk utilization, and improve application performance. 
(WEBCAST) READ ABSTRACT |

Domino’s Pizza:  Datacentre Transformation by ComputerWeekly.com

May 2012 - (Free Research)
Colin Rees, IT Director at Domino’s Pizza explains how a project to move the company data centre into the cloud has transformed its online business. 
(PRESENTATION) READ ABSTRACT |

1 - 25 of 487 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts