Data Security Alchemy FindsWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Data Security Alchemy Finds returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Security Monitoring
 •   Network Security
 •   Endpoint Security
 •   Security Policies
 •   Enterprise Data Protection and Privacy
 •   Application Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Wireless Security
 •   Managed Security Services

Related Searches
 •   Balancing Data
 •   Based Data Security
 •   Data Delivery
 •   Data Network
 •   Data Security Printable
 •   Event Data Security
 •   Events Data Security Alchemy
 •   New Data Security
 •   Solution Data Security
 •   Webinars Data Security Alchemy
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Business Value Analysis Study: Citizens Business Bank by Symantec Corporation

March 2009 - (Free Research)
As a result of its relationship with Symantec, Citizens is achieving substantial business value. The Alchemy Solutions Group conducted a Total Operational and Economic Impact (TOEI) analysis of the different solutions deployed and quantified business value. Read this paper to see what they found. 
(WHITE PAPER) READ ABSTRACT |

Mobile Data Security Finding the Balance by IBM

April 2013 - (Free Research)
Access this white paper to learn how to develop a secure mobile strategy that not only protects business data, but keeps the user experience simple and efficient. 
(WHITE PAPER) READ ABSTRACT |

eBook: Data Security in the E-discovery Process by Dell and VMware

December 2011 - (Free Research)
In this e-book from SearchCompliance.com, find expert advice that will help you ease the pain – and the cost – of e-discovery, as well as tips and tactics for bridging the gap between e-discovery and data security. 
(EBOOK) READ ABSTRACT |

Discover Data Security Issues and Strengthen Compliance with Data Loss Prevention by Trend Micro, Inc.

July 2010 - (Free Research)
When AFCO began focusing on their IT system's security to prevent data leaks, they turned to Trend Mico's Data Loss Prevention. Not only were they able to discover data security issue but they were also able to strengthen their foundation for compliance. Read this case study and find out how they did it. 
(CASE STUDY) READ ABSTRACT |

Identity Finder Enterprise Suite 4.5 by Identity Finder, LLC

July 2010 - (Free Research)
Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability. 
(TRIAL SOFTWARE) READ ABSTRACT |

Preventing Cyber-Attacks with Big Data Security Analytics and SIEM by LogRhythm, Inc.

February 2013 - (Free Research)
This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future. 
(WEBCAST) READ ABSTRACT |

E-Guide: Information Security Essential Guide to Compliance by Information Security Magazine

July 2010 - (Free Research)
Compliance with government regulations and industry standards shapes the formation of most information security programs. There’s no way around it; your organization must comply. This essential guide will help you sort out and prioritize your compliance responsibilities. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Computer Weekly – 26 February 2013: European Commission targets data security by ComputerWeekly.com

February 2013 - (Free Research)
In this week's Computer Weekly, we look at the new IT security proposals from the European Commission and ask whether the benefits will be worth it. We reveal the challenges of managing big data, with help from some industry analysts, and hear from the Open University CIO on IT tools that support learning. Read the issue now. 
(EZINE) READ ABSTRACT |

Securing Data Stored On Tape With Encryption by Quantum Corporation

July 2009 - (Free Research)
With companies storing data for longer periods of time to meet compliance regulations and business best practices, the inherent risk of a data breach is growing significantly. Organizations should develop sound encryption key management processes to minimize administrative overhead and maximize the value of data encryption. 
(WHITE PAPER) READ ABSTRACT |

Employee Mobility Shifts its Focus to Data Security and Delivery by Citrix

June 2014 - (Free Research)
This expert guide from SearchConsumerization.com highlights the change in focus from desktop and laptop delivery to security risks associated with mobility. Read on and also find out why it's important to get upper management involved in your BYOD programs. 
(EGUIDE) READ ABSTRACT |

E-Guide: Key Considerations for Creating a Hybrid Cloud by SearchDataCenter.com

March 2011 - (Free Research)
In this e-guide from SearchCloudComputing.com, discover key considerations for creating a hybrid cloud for your organization. Learn why it is important to keep in mind data security, hypervisor usage, and cloud management. Also, find out how to identify applications that can be moved to the public cloud to optimize capacity in the private cloud. 
(EGUIDE) READ ABSTRACT |

Achieving PCI Compliance at the Point Of Sale Using Bit9 Parity™ to Protect Cardholder Data by Bit9, Inc.

June 2009 - (Free Research)
As the technology used by merchants and their partners has evolved, card fraud has become more sophisticated. In response to this evolving threat, the major credit card companies have created a set of security standards to protect their customers from security breaches. Read this whitepaper to find out how Bit9 Parity helps achieve compliance... 
(WHITE PAPER) READ ABSTRACT |

Keeping Up with PCI: Implementing Network Segmentation and Monitoring Security Controls by SonicWALL

February 2010 - (Free Research)
Read this expert e-guide to get tips on establishing a process for logging activity and tying records to users, learn three main requirements for testing security controls, and find out how to implement PCI network segmentation and how it may ease PCI compliance for your organization. 
(EGUIDE) READ ABSTRACT |

The Deloitte Consumer Review: A more secure customer by ComputerWeekly.com

March 2013 - (Free Research)
This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond. 
(ESSENTIAL GUIDE) READ ABSTRACT |

E-Guide: The Basics of Endpoint Security: Expert Reveals Tips for Finding Data on the Endpoints by Panda Security

September 2009 - (Free Research)
In this E-Guide, security expert Mike Chapple reveals tips on finding sensitive information on the endpoint. Get a basic understanding of the algorithms used to detect sensitive information, software tools to assist you in your search for data, and two basic approaches for managing sensitive information. 
(EGUIDE) READ ABSTRACT |

De-risking IT Lifecycle Management by ComputerWeekly.com

November 2012 - (Free Research)
Analysts Clive Longbottom and Rob Bamforth offer advice on managing IT assets more effectively. 
(ESSENTIAL GUIDE) READ ABSTRACT |

Choosing a Cloud Provider with Confidence by GeoTrust, Inc.

July 2011 - (Free Research)
In this white paper you will find out how your business can protect sensitive business information in the cloud. You will also learn what you must look for in the security of a cloud vendor and how to find the right vendor for your business. 
(WHITE PAPER) READ ABSTRACT |

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study by LogRhythm, Inc.

May 2013 - (Free Research)
This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

Backup Partner Criteria for Smart Partnerships by Iron Mountain

March 2012 - (Free Research)
Check out this white paper to discover how an offsite storage partner can be the answer to your content security and storage challenges. Learn about the advantages associated with offsite storage, discover how to define your needs and find the best potential backup partner you can, receive 4 key questions to ask regarding storage partners and more. 
(WHITE PAPER) READ ABSTRACT |

Stay on Top of Threats: Use Next Generation Security for Protection by IBM

October 2012 - (Free Research)
This informative whitepaper covers the constant threat of hackers to the security of your organization and offers a solution to help keep your data safe. 
(WHITE PAPER) READ ABSTRACT |

Preventing Cyber-Attacks with Big Data Security Analytics and SIEM by LogRhythm, Inc.

February 2013 - (Free Research)
This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future. 
(WEBCAST) READ ABSTRACT |

Find the Needle in the Haystack – Audit and Compliance Reporting for AIX by Safestone Technologies

November 2011 - (Free Research)
This white paper discusses how organizations can address the challenge of meeting audit and compliance regulations, whilst driving down costs and reducing risk. It outlines how Safestone’s Compliance Center for AIX solution efficiently collects raw data and refines it into easy-to-understand, actionable information. 
(WHITE PAPER) READ ABSTRACT |

Tablets & Smartphones in the Enterprise by SearchSecurity.com

January 2013 - (Free Research)
Frantic IT departments are being forced to manage BYOD on the fly. Read this white paper to get strategic, practical advice on how to manage this consumer-driven trend. 
(EGUIDE) READ ABSTRACT |

Expert Tips on Getting Mobile Securely with Virtual Desktops by SearchSecurity.com

September 2011 - (Free Research)
In this expert eguide from SearchEnterpriseDesktop.com, find out why it is essential to secure all workers’ mobile devices. 
(EGUIDE) READ ABSTRACT |

Discover the Risks and Rewards Behind a Mobile Workforce by SearchSecurity.com

April 2013 - (Free Research)
Read this expert guide to learn more about how mobile devices are affecting productivity in the workplace, the top security issues concerning mobile devices, and how to balance risk with productivity effectively. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts