Consults Computer Data SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Consults Computer Data Security returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Security Monitoring
 •   Enterprise Data Protection and Privacy
 •   Wireless Security
 •   Endpoint Security
 •   SSL Certificates
 •   Security Policies
 •   Managed Security Services
 •   Application Security

Related Searches
 •   Capacities Consults
 •   Companies Consults Computer
 •   Computers Consults Computer
 •   Consults Computer Licenses
 •   Consults Multi
 •   Improvements Consults Computer Data
 •   Integration Consults Computer Data
 •   Maintain Consults
 •   Researching Consults
 •   System Consults Computer Data
Advertisement

ALL RESULTS
1 - 25 of 498 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

How Secure Is Your Data? Enhancing Data Security And Compliance With Oracle Database 11g by Miro Consulting, Inc.

February 22, 2011 - (Free Research)
Most organizations suffer from data security vulnerabilities within their databases. In addition to the need for securing business data, regulations across industries demand compliance with standards regarding data access, auditing, segregation of duties and the protection of personally identifiable information (PII). 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Data Security and Privacy Concerns Pushed into the Spotlight by GeoTrust, Inc.

July 19, 2013 - (Free Research)
In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD. 
(EGUIDE) READ ABSTRACT |

Strategies to Maintain PCI DSS Compliance by GeoTrust, Inc.

July 23, 2013 - (Free Research)
This e-guide outlines strategies for streamlining key PCI DSS processes to ensure that comprehensive compliance is achieved efficiently – for maximum business benefit. 
(EGUIDE) READ ABSTRACT |

Enterprise Customers Embrace Deduplication Technology by EMC Computer Systems (UK) Ltd.

April 27, 2011 - (Free Research)
With exponential growth of data volume, enterprises require faster backup, restore, and disaster recovery to meet their shrinking backup windows, and the use of disk in the data protection process relieves many of the backup bottlenecks associated with using traditional storage methods. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

EMC Bridges the Data Protection Gap by EMC Computer Systems (UK) Ltd.

April 27, 2011 - (Free Research)
This informative white paper from EMC, takes a look at the foundation of EMC Backup and Recovery. It looks at relevant analytical data to help illustrate the benefits of implementing a backup and recovery solution. Read this white and its corresponding graphs to learn more today! 
(WHITE PAPER) READ ABSTRACT |

Comparing the TCO of Physical PCs, VDI, and Cloud-hosted Desktops as a Service (Daas) by Desktone (VMware)

February 01, 2011 - (Free Research)
This white paper compares the total cost of ownership (TCO) of physical PCs, virtual desktops, and cloud-hosted desktops as a service (DaaS). 
(WHITE PAPER) READ ABSTRACT |

EMC VNXe Series Software Packs: Simple Data Protection and More by EMC Computer Systems (UK) Ltd.

February 11, 2011 - (Free Research)
EMC has packaged unique and powerful add-on storage software into two attractively priced, easy-to-order software packs: Total Value Pack and Total Protection Pack available for the VNXe 3100 and VNXe 3300 respectively, ensuring maximum protection, security, and compliance. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Leveraging EMC Deduplication Solutions for Backup, Recovery, and Long-term Information Retention by EMC Computer Systems (UK) Ltd.

April 27, 2011 - (Free Research)
This white paper from EMC takes a closer look at the advantages associated with a disk-based backup solution. Read on to learn more today! 
(WHITE PAPER) READ ABSTRACT |

How SSL and TLS Secure Network Transactions by GeoTrust, Inc.

December 20, 2012 - (Free Research)
This E-Guide from SearchEnterpriseWAN.com aims to provide introductory knowledge of the ins and outs of SSL VPN and TLS and how they protect network transactions. View now to learn more! 
(EGUIDE) READ ABSTRACT |

Simplifying management and lowering total cost of ownership for SSL certificates by GlobalSign

May 17, 2011 - (Free Research)
This white paper explains the basics of using a Managed PKI for SSL solution to alleviate such issues, the benefits of using GlobalSign’s Managed SSL Solution and how this solution enables organisations to quickly and simply manage their SSL Certificates, as well as significantly reduce the operating costs of using SSL. 
(WHITE PAPER) READ ABSTRACT |

GlobalSign Malware Monitoring: Protecting your website from distributing hidden malware by GlobalSign

May 17, 2011 - (Free Research)
This paper gives you a solution to keeping your websites safe, protecting your customers and securing the reputation of your company. 
(WHITE PAPER) READ ABSTRACT |

Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities by GeoTrust, Inc.

May 16, 2013 - (Free Research)
This e-guide from SearchSecurity.com explores the issues threatening SSL vulnerabilities and offers advice on how to defend against said risks. View now to learn more! 
(EGUIDE) READ ABSTRACT |

Choosing a Cloud Provider with Confidence by GeoTrust, Inc.

July 05, 2011 - (Free Research)
In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business. 
(WHITE PAPER) READ ABSTRACT |

Choosing a Cloud Provider with Confidence by GeoTrust, Inc.

February 02, 2011 - (Free Research)
The goal of this paper is to help enterprises make decisions about where and when to use cloud solutions by outlining issues that enterprises should raise with hosting providers before selecting a vendor, and by highlighting ways in which SSL from a trusted certificate authority can help enterprises conduct business in the cloud with confidence. 
(WHITE PAPER) READ ABSTRACT |

Magic Quadrant for Mobile Data Protection by McAfee.

September 07, 2010 - (Free Research)
Mobile data protection (MDP) systems are crucial to for ensuring data privacy and compliance. This report explores the overall MDP market, ranking vendors against each other based on competitive criteria. View now to discover were each vendor ranks and which ones meet the needs and budget of your organisation. 
(ANALYST REPORT) READ ABSTRACT |

Getting Real About Virtual Backup and Recovery by Acronis

March 05, 2012 - (Free Research)
Check out this white paper to learn about the latest trends in virtualisation technology and discover what impact these improvements will have on backup and disaster recovery operations. Learn about the latest in off-site backups, data protection for virtual environments and more. 
(WHITE PAPER) READ ABSTRACT |

The Rising Impact of Virtualization on Data Backup and Recovery by Acronis

February 20, 2012 - (Free Research)
This white paper highlights the rise of virtualization and explores what businesses today can do in terms of adjusting backup and recovery functions to maintain a functioning virtual data center. Learn what applications are most commonly virtualized today, discover the differences in backup between small and large organizations and more. 
(WHITE PAPER) READ ABSTRACT |

The Rising Threat of Corporate Cybercrime: Cybercriminal Motives and Methods by Trusteer

December 20, 2012 - (Free Research)
In this white paper, uncover the major cybercriminal attack methods and motives, and learn what modern cybercrime means for endpoint security. Also inside, discover the growing need for effective antimalware – read on to learn more today. 
(WHITE PAPER) READ ABSTRACT |

Extending Advanced Malware Protection to Unmanaged devices, Cloud and Virtual Desktops by Trusteer

July 19, 2012 - (Free Research)
Advanced threats and emerging IT initiatives such as BYOD, cloud applications and desktop virtualization are making security more challenging than ever before. This resource explores these challenges and offers insight on how to build a layered defense. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Register Free to Visit Infosecurity Europe - 19th - 21st April 2011 by Infosecurity Europe

February 08, 2011 - (Free Research)
Europe's No. 1 Information Security event, with an unrivalled free education programme, exhibitors showcasing new and emerging technologies and offering practical and professional expertise. 
(EVENT) READ ABSTRACT |

Introduction to Web Analytics for E-Commerce: How to Track Activity to Optimize Your Website by GeoTrust, Inc.

December 31, 2011 - (Free Research)
This white paper explores the basics of web analytics and why they're important, what metrics you should track, and how you can use this information to optimize your site and encourage customers to visit often and buy more. 
(WHITE PAPER) READ ABSTRACT |

Mobile Security: Rewards Outweigh Risks by GeoTrust, Inc.

July 19, 2013 - (Free Research)
This expert guide examines the impact that enterprise mobility can have on your organization, comparing the pros and cons, and explains why the benefits outweigh the risks. 
(EGUIDE) READ ABSTRACT |

Explaining How Trusted SSL Certificates and Forged SSL Certificates Work by GeoTrust, Inc.

May 16, 2013 - (Free Research)
This e-guide from SearchSecurity.com takes an in-depth look at what Certificate Authorities and digital certificates do for secure web browsing and explores what trusted SSL certificates and forged SSL certificates mean to your business. 
(EGUIDE) READ ABSTRACT |

SSL Certificate Management: Avoiding Common Mistakes by GeoTrust, Inc.

May 09, 2013 - (Free Research)
This expert E-Guide from SearchSecurity.com explores the common mistakes inherent to SSL certificate management and provides advice on how to avoid them. View now to learn more! 
(EGUIDE) READ ABSTRACT |

Threat Prevention Techniques: Best Practices for Threat Management by GeoTrust, Inc.

May 02, 2013 - (Free Research)
SearchSecurity.com put together this E-Guide to provide you with expert advice on creating an effective threat management program. View now for best practices that will help you build a strategy for your business. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 498 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts