Data Privacy LearningWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Data Privacy Learning returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Policies
 •   Business Intelligence Solutions
 •   Network Security
 •   Security Monitoring
 •   Databases
 •   Endpoint Security
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   Audit Data
 •   Benefits Data Privacy
 •   Data Calendars
 •   Data Filing
 •   Data Privacy Learning Help
 •   Data Privacy Learning White Paper
 •   Data Privacy Rhode Island
 •   Data Script
 •   Demonstration Data
 •   Monitor Data
Advertisement

ALL RESULTS
1 - 25 of 455 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The Tangled Web of Data Privacy Issues by Thawte Inc.

November 18, 2013 - (Free Research)
In this expert e-guide from SearchCIO.com, discover how IT executives are handling data privacy issues on the web. Also, learn how public-sectors CIOs are hiring in the changing IT workforce, the future of cloud, what exactly users are up to on the web and more. 
(EGUIDE) READ ABSTRACT |

Business-driven data privacy policies - Establish and enforce enterprise data privacy policies to support compliance and protect sensitive data. by IBM

February 28, 2013 - (Free Research)
This resource offers insight to help you establish and enforce business-driven data privacy policies. Read on to learn how to comply with privacy regulations, navigate data governance requirements, and more. 
(WHITE PAPER) READ ABSTRACT |

Strengthening Data Privacy in PeopleSoft by Approva Corporation

May 2008 - (Free Research)
Understanding the vulnerabilities of ERPs such as Peoplesoft can help your company mitigate the risk of data breaches. This white paper discusses how automated CPM solutions can help to fight the threat of data loss. 
(WHITE PAPER) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

Closing the Data Privacy Gap: Protecting Sensitive Data in Non-Production Environments by IBM

August 2007 - (Free Research)
This White Paper explains why protecting sensitive information and ensuring privacy have become high priorities. 
(WHITE PAPER) READ ABSTRACT |

IBM Optim Data Privacy Solution for SAP by IBM

October 2008 - (Free Research)
The IBM® Optim™ Data Privacy Solution for SAP® offers comprehensive, proven capabilities for de-identifying test data, making the data appropriate for testing. 
(ARTICLE) READ ABSTRACT |

Optim™ Data Privacy Solution by IBM

The Optim™ Data Privacy Solution de-identifies application data so that it can be safely used in testing or training environments. By substituting fictionalized yet realistic data for confidential information, Optim enables sites to test effectively while supporting privacy compliance initiatives. 
(SOFTWARE PRODUCT)

Data privacy best practices: time to take action! by IBM

September 2008 - (Free Research)
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish. 
(WHITE PAPER) READ ABSTRACT |

Data privacy best practices: time to take action! by IBM

September 2008 - (Free Research)
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. 
(WHITE PAPER) READ ABSTRACT |

Data privacy best practices: time to take action! by IBM

February 2009 - (Free Research)
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Using proven data masking techniques can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish. 
(WHITE PAPER) READ ABSTRACT |

White Paper: Closing the Data Privacy Gap: Protecting Sensitive Data in Non-production Environments by IBM

March 2010 - (Free Research)
By downloading this complimentary White Paper, you'll gain insight into the requirements for protecting privacy in non-production environments and what to look for in an effective data privacy solution. 
(WHITE PAPER) READ ABSTRACT |

Closing the data privacy gap for SAP Applications by IBM

October 2008 - (Free Research)
This white paper provides insight into the requirements for protecting privacy in SAP non-production environments and describes some of the comprehensive data masking techniques available with the IBM® Optim™ Data Privacy Solution for SAP® Applications. 
(WHITE PAPER) READ ABSTRACT |

How to manage data privacy by ComputerWeekly.com

November 2010 - (Free Research)
Data privacy refers to the evolving relationship between technology and the legal right to, or public expectation of, privacy in the collection,  storing, management and sharing of data. 
(WHITE PAPER) READ ABSTRACT |

Data Privacy e-Book by SearchSecurity.co.UK

April 2011 - (Free Research)
SearchSecurity.Co.UK presents a comprehensive guide to data privacy in the UK. Our experts cover all the angles in order to help you protect the data your organisation collects, transmits and stores. 
(TECHNICAL ARTICLE) READ ABSTRACT |

Confidential Collaboration: How to manage regulatory compliance & data privacy while keep your data safe by IntraLinks, Inc

October 2013 - (Free Research)
This resource offers 4 key recommendations on how to maintain regulatory compliance while using collaborative processes. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly – 12 March 2013: Will software-defined networking justify the hype? by ComputerWeekly.com

March 2013 - (Free Research)
In this week's Computer Weekly, we take an in-depth look at one of the hottest emerging technologies – software-defined networking – and what it means for IT departments. We visit Iceland, home of the greenest datacentres, and see what they offer to CIOs. And we look at the growth of governance as a key task for CIOs. Read the issue now. 
(EZINE) READ ABSTRACT |

Global Best Practices in Email Security, Privacy and Compliance by Proofpoint, Inc.

August 2008 - (Free Research)
A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution. 
(WHITE PAPER) READ ABSTRACT |

Oracle’s Optimized Solution for CRM - A Business Case for Secured Siebel CRM on Oracle’s SPARC T-Series by Oracle Corporation

March 2011 - (Free Research)
Data privacy and thefts, contractual terms and compliance requirements are issues that all need to be considered when installing a CRM system. This paper outlines how deploying Siebel CRM on Oracle's SPARC T-Series servers mitigates risk while helping maintain a low total cost of ownership by not requiring more equipment. 
(WHITE PAPER) READ ABSTRACT |

Data Security and Privacy: A Holistic Approach by IBM

September 2011 - (Free Research)
This paper examines the complex data security and privacy threat landscape; compliance and regulatory requirements; and, the IBM InfoSphere portfolio of integrated solutions designed to help you stay focused on meeting your organization’s business goals, achieving compliance and reducing risk. 
(WHITE PAPER) READ ABSTRACT |

Improving Regulatory Compliance with Encryption by Utimaco Safeware

February 2007 - (Free Research)
This white paper examines the role that encryption plays in minimizing your company's risk and helps IT directors, security officers, and executives meet confidentiality mandates and satisfy legal requirements within particular geographic regions. 
(WHITE PAPER) READ ABSTRACT |

Data Security and Privacy Concerns Pushed into the Spotlight by GeoTrust, Inc.

July 2013 - (Free Research)
In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD. 
(EGUIDE) READ ABSTRACT |

May Issue of Information Security Magazine: Data Protection: Going the Distance by Information Security Magazine

May 2011 - (Free Research)
This month’s Information Security cover story explores the practical ways you can avoid mishaps by building on the technical specifications of compliance requirements like PCI DSS. Learn to focus your efforts on not only satisfying these compliance mandates, but also create a robust, comprehensive information security program at the same time. 
(EZINE)

The Massachusetts Data Protection Law by SearchSecurity.com & SearchCompliance.com

June 2009 - (Free Research)
Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned. 
(EBOOK) READ ABSTRACT |

Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc.

The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. 
(HARDWARE PRODUCT)

Secure Your Journey to the Cloud with Data Protection by Trend Micro, Inc.

October 2011 - (Free Research)
View this paper to discover how Trend Micro can help tackle cloud security risks with a cloud data protection solution, integrated with VMware, which enables organizations to maximize virtual and cloud benefits without compromising data privacy and security. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 455 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts