Data Security Concerns For Human ResourcesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Data Security Concerns For Human Resources returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Application Security
 •   Network Security
 •   Security Policies
 •   Wireless Security
 •   Endpoint Security
 •   Security Monitoring
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Virtualization
 •   Storage Security

Related Searches
 •   Batch Data
 •   Collection Data
 •   Data North Dakota
 •   Data Security Concerns Orders
 •   Data Security Improvement
 •   Data Security Sql
 •   Data Terms
 •   Data Vendor
 •   Disk Data Security
 •   Internet-Based Data Security
Advertisement

ALL RESULTS
1 - 25 of 454 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Achieving Security With Cloud Data Protection by Iron Mountain

January 27, 2011 - (Free Research)
Today, more companies than ever recognize the value and convenience of using cloud backup to protect their server data. However, enterprises considering cloud backup for protecting their vital data face these security concerns. Read this white paper to learn how to secure your cloud. 
(WHITE PAPER) READ ABSTRACT |

10 Security Concerns for Cloud Computing by Global Knowledge

March 17, 2010 - (Free Research)
Read this paper to learn the many benefits of cloud computing as well as the 10 security concerns that need to be addressed when considering moving critical applications and sensitive data to public and shared cloud environments. 
(WHITE PAPER) READ ABSTRACT |

Addressing Outlook Security Concerns and Preparing Mobile Users for an Exchange Migration by Thawte Inc.

May 19, 2011 - (Free Research)
Users enticed by the ability to check email at a glance increasingly log onto Exchange 2010 remotely and cause new security risks. This expert e-guide from SearchExchange.com explains how to address these Outlook security concerns by creating a buffer zone between your internal network and the Internet. 
(EGUIDE) READ ABSTRACT |

eBook: Strategies for Securing Virtual Machines by Information Security Magazine

December 2008 - (Free Research)
Check out this expert eBook to learn about the special security concerns of virtualization and get best practices for securing virtual machines. 
(EBOOK) READ ABSTRACT |

5 Cloud Security Concerns You Must Address by Hewlett-Packard Company

May 2012 - (Free Research)
This white paper explains why security is a top deterrent to cloud adoption. Discover threats to consider when evaluating cloud for your organization and learn how to minimize risk by establishing an effective defense strategy. 
(WHITE PAPER) READ ABSTRACT |

Cloud security concerns you must address by HP & Intel®

July 2013 - (Free Research)
This exclusive white paper discusses the five cloud security concerns that must be addressed for your initiative to be successful. Discover how you can respond to today's threat landscape and efficiently deal with new security dynamics to protect both your physical and virtual assets along with your cloud data. 
(WHITE PAPER) READ ABSTRACT |

Demystifying Data Loss Prevention: Requirements for Comprehensive Protection by DynTek Inc. and McAfee

May 2008 - (Free Research)
Learn how Data Loss Prevention technology provides unprecedented visibility intohow data is used, and by whom, why, and when. With this insight, you can define and enforce data usage policies that help prevent both accidental and malicious data loss. 
(WHITE PAPER) READ ABSTRACT |

Delivering Enterprise Information Securely on Android and Apple iOS Devices by Citrix Systems, Inc. (E-mail this company)

June 2014 - (Free Research)
Uncover the issues that arise when allowing Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions – and the steps you should take to maintain security and control. 
(WHITE PAPER) READ ABSTRACT |

Mobile, Social Engineering Top Data Security Management Concerns by Thawte Inc.

November 2013 - (Free Research)
This e-guide, from SearchCIO.com, explores how to set up the right policies in order to successfully eliminate mobile, social engineering and data security management concerns. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Disaster Recovery Planning and Security for the IT Industry by IBM

May 2011 - (Free Research)
The biggest security issues are the ones that you don’t know about – and the reality is many businesses don’t truly know where they stand. Check out this presentation transcript from a SearchDisasterRecovery.com webcast to learn about today’s biggest security concerns and best practices for protecting your IT center. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Reconciling Datacenter Consolidation and Security by Oracle Corporation

January 2010 - (Free Research)
Security concerns continue to hobble consolidation efforts in the data center. The concerns are real, and most often stem from a scattershot, non-integrated approach to consolidation. There is a better, more secure way, grounded in servers and software platforms built from the ground up to work optimally with one another. 
(WHITE PAPER) READ ABSTRACT |

Solving Security Challenges for Government Cloud-Based IT Environments by Red Hat

December 2011 - (Free Research)
Faced with tigher budgets, the federal government is also moving into cloud technology. Access this white paper to explore how new technologies are enabling the government to address unique security concerns while reaping cloud benefits. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Securing Access to Resources in the Cloud:  What's Really Possible Today by FoxT

May 2010 - (Free Research)
This presentation transcript explores the cloud from both a business and technical perspective to show how organizations can benefit from cloud services while maintaining the control and auditing capabilities to remain secure. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

How much security do you really need? by IBM

May 2011 - (Free Research)
<p>Deciding exactly how much to invest in security can be challenging for any business. Too great an investment can waste resources, too little can jeopardize the business. In this resource, explore the top security concerns for midsize organizations and how to determine a security approach that is both practical and effective.</p> 
(WHITE PAPER) READ ABSTRACT |

Securing the Physical, Virtual, Cloud Continuum by Juniper Networks, Inc and Plan B Technologies, Inc

July 2010 - (Free Research)
Information security best practices remain largely the same as 15 years ago, based on a strong perimeter defense. However, virtualization and cloud computing are radically changing data center operations. Security and compliance controls need to extend across the physical, virtual, cloud continuum in order to adapt to this new infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Windows Azure Platform Security Essentials for Technical Decision Makers by Microsoft

December 2010 - (Free Research)
In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other technical decision-makers have regarding the security of their data in Windows Azure cloud platform. 
(WEBCAST) READ ABSTRACT |

Internet Security… a Priority you can Forget About: High on protection low on maintenance, AVG frees the support team. by AVG Technologies USA, Inc.

March 2010 - (Free Research)
Waingels College in Wokingham is a successful secondary school with almost 500 workstations and servers across the campus. They are challenged with maintaining the efficient running of back office and classroom systems with limited ICT support resources. Read this short case study to learn more about how Waingels College manage their IT security. 
(CASE STUDY) READ ABSTRACT |

Smart Devices, Smart Security by Voltage Security, Inc.

July 2012 - (Free Research)
This short white paper explores the top 5 tips for protecting your organization against new looming security threats from smartphones and tablets. These 5 tips can make or break mobile data security efforts. Read now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Securing the mobile enterprise with IBM security solutions by IBM

August 2013 - (Free Research)
Thisinformative resource discusses a portfolio of mobile security solutions that take an adaptive approach to security and can drive down costs. 
(WHITE PAPER) READ ABSTRACT |

Application Security Handbook: Application Security: Managing Software Threats by CA Technologies.

December 2012 - (Free Research)
Check out this expert e-book from the editorial team at SearchSoftwareQuality.com to read the following three articles designed to help you address your application security before it's threatened: 'Ten Ways to Build in Security From the Start', 'Secure Your Mobile Apps in Enterprise Integration', and 'How to Boost Your Application Security Savvy'. 
(EBOOK) READ ABSTRACT |

Windows Azure Platform Security Essentials for Business Decision Makers by Microsoft

November 2010 - (Free Research)
In this video, Graham Calladine, Security Architect with Microsoft Services, answers the most common security concerns CxOs and other business decision-makers have regarding the security of their data in Windows Azure cloud platform. Watch this video to learn more! 
(VIDEO) READ ABSTRACT |

Delivering Enterprise Information Securely on Android and Apple iOS Devices by Citrix

April 2012 - (Free Research)
This white paper describes the issues that can arise when incorporating Android and iOS-based tablets and smartphones into the enterprise – with special attention paid to the latest Android 4.0 and iOS 5.1 versions. In addition, uncover the steps you should take to maintain security and control. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Evaluating cloud security concerns by SearchSecurity.com

June 2011 - (Free Research)
The benefits of cloud computing such as reduced costs and greater efficiency are widely understood by today’s organisations, but security still remains a top concern. This expert tip provides advice on how to evaluate cloud computing providers and highlights some of the risks that must be considered when evaluating cloud solutions. 
(EGUIDE) READ ABSTRACT |

Advanced Project Version Management in Schlumberger Petrel Platform Environments with Hitachi Storage Adapter for Petrel by Hitachi Data Systems

August 2013 - (Free Research)
This resource profiles a storage adapter for advanced project management that can help you optimize exploration and development operations, reduce storage management complexity and TCO, and more. 
(WHITE PAPER) READ ABSTRACT |

Managing Risk in the Cloud by NetApp

October 2009 - (Free Research)
This white paper explores today's top security concerns in cloud environments, and aims to dispel the common (and growing) myth that a cloud-based infrastructure introduces new risks that cannot be quantified nor controlled. In this paper, you'll learn how a holistic approach to information security can help your company successfully combat risks. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 454 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts