Data Security Efficiency TechniquesWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Data Security Efficiency Techniques returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Application Security
 •   Security Policies
 •   Security Monitoring
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy
 •   Wireless Security
 •   Storage Security
 •   Storage Management

Related Searches
 •   Calls Data Security
 •   Data Documentation
 •   Data Security Efficiency Faqs
 •   Data Security Efficiency Performance
 •   Data Security Suite
 •   Data Security Unix
 •   Data Services
 •   Fact Data Security Efficiency
 •   Full Data Security Efficiency
 •   Types Data
Advertisement

ALL RESULTS
1 - 25 of 487 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Proactive data security, audit and compliance solutions by IBM

April 30, 2013 - (Free Research)
Access this white paper for key information about a data management solution that supports enterprises in their entirety, and ensures automated, integrated compliance and security across all platforms. 
(WHITE PAPER) READ ABSTRACT |

The Future for VMware's vStorage APIs for Data Protection Looks Promising: Presentation Transcript by HP

October 04, 2011 - (Free Research)
Conventional, agent-based, file-level techniques for virtual machine backup could cause problems -- most notably resource contention, which could compromise the performance of all virtual machines running on an ESX or ESXi host. Read this expert presentation transcript to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Panda Cloud Systems Management: Management Datasheet by Panda Security

July 15, 2013 - (Free Research)
Access this informative resource to learn about a cloud-based IT management solution that can automate maintenance tasks centrally, saving time and money while improving security, efficiency and productivity. 
(WHITE PAPER) READ ABSTRACT |

Seagate NAS - What's Driving Data Security and Remote Access Inside by Seagate Technology

February 18, 2014 - (Free Research)
Check out this brief, 1-page resource that delivers a NAS solution that provides simple, scalable and cost-effective ways to store and serve files securely over the network. 
(WHITE PAPER) READ ABSTRACT |

Securing Your Private Keys as Best Practice for Code Signing Certificates by Thawte Inc.

September 30, 2013 - (Free Research)
This paper describes recent security breaches and why they may have happened. It discusses best practices, especially for the Windows platform, which can help to safeguard the private keys associated with code signing certificates. 
(WHITE PAPER) READ ABSTRACT |

Mobile, Social Engineering Top Data Security Management Concerns by Thawte Inc.

November 15, 2013 - (Free Research)
This e-guide, from SearchCIO.com, explores how to set up the right policies in order to successfully eliminate mobile, social engineering and data security management concerns. 
(EGUIDE) READ ABSTRACT |

CORE Security and the Payment Card Industry Data Security Standard by Core Security Technologies

October 09, 2013 - (Free Research)
This informative resource explores a security testing method that ensures PCI DSS validation and compliance to keep payment cardholder data protected from cybercrime at all times. 
(WHITE PAPER) READ ABSTRACT |

Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with Netcordia's NetMRI by Netcordia

October 2008 - (Free Research)
This paper describes the ways that Netcordia's NetMRI can help you quickly achieve and maintain PCI DSS compliance across your network. 
(WHITE PAPER) READ ABSTRACT |

Expert Ebook: Mastering PCI by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

August 2008 - (Free Research)
This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance. 
(BOOK) READ ABSTRACT |

Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with Netcordia's NetMRI by Netcordia

July 2009 - (Free Research)
Many network monitoring products are easy to install and give you basic tools for managing your network, but achieving and maintaining compliance with the latest version of the PCI DSS requires a network solution that can manage unprecedented levels of change and complexity. Read this whitepaper to learn more about one such solution. 
(WHITE PAPER) READ ABSTRACT |

Thawte in Education by Thawte Inc.

September 2013 - (Free Research)
Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks. 
(WHITE PAPER) READ ABSTRACT |

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance by Rapid7

July 2012 - (Free Research)
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy. 
(WHITE PAPER) READ ABSTRACT |

Internet Gambling Sites: Expose Fraud Rings and Stop Repeat Offenders with Device Reputation by iovation, Inc.

June 2009 - (Free Research)
This white paper will help you understand what new and innovative techniques can be used to combat online fraud and abuse, and how online casinos can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within the fraud detection process. 
(WHITE PAPER) READ ABSTRACT |

Expert Advice: Storage Efficiency Best Practices and Pitfalls to Avoid by NetApp

October 2013 - (Free Research)
This e-guide elaborates on the tools and techniques to maintaining storage efficiency and points out the costs, performance impact, and capacity features of each. Find out how you can extend efficiency to your data protection processes and learn how to avoid common pitfalls when integrating backup and DR plans. 
(EGUIDE) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

Agentless Backup—Separating Myth from Reality by Asigra

June 2013 - (Free Research)
This white paper explores a backup solution that eliminates the requirement for locally installed agents, enabling substantial time and cost savings and simplified management. 
(WHITE PAPER) READ ABSTRACT |

NetApp Storage Efficiency Guide by NetApp

February 2012 - (Free Research)
While IT managers wrestle with budget concerns and IT purchasing decisions, data continues to grow day by day, causing data proliferation. This resource presents best practices you can use to your advantage in order to attack the problems related to data proliferation. 
(WHITE PAPER)

WAN-optimized Replication: Built into FalconStor Solutions by FalconStor Software

April 2011 - (Free Research)
Data replication has become part of the fabric of IT due to its multiple uses and benefits. However, data replication can quickly increase your bandwidth and storage costs. Read this white paper to learn how WAN optimization can help to solve these issues. 
(WHITE PAPER) READ ABSTRACT |

How to Secure Your Microsoft SharePoint Products by Thawte Inc.

May 2013 - (Free Research)
This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order. 
(EGUIDE) READ ABSTRACT |

SSL Certificate Management: Common Mistakes and How to Avoid Them by Thawte Inc.

February 2013 - (Free Research)
Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes. 
(EGUIDE) READ ABSTRACT |

2009 Annual Study: U.S. Enterprise Encryption Trends by PGP Corporation

September 2009 - (Free Research)
Check out this study, which analyzes survey results from 997 U.S. business and IT managers about their current and future needs, motivations, uses, budgets, and strategies for enterprise data protection. 
(ANALYST REPORT) READ ABSTRACT |

Presentation Transcript: The Other Green - Storage Efficiency and Optimization by Symantec Corporation

September 2009 - (Free Research)
This session will look at various techniques and strategies to optimize either on-line active or primary as well as near-line or secondary storage environment during tough economic times, as well as to position for future growth, after all, there is no such thing as a data recession! 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Merging Backup and Disaster Recovery (DR) Processes by FalconStor Software

April 2011 - (Free Research)
This paper describes how continuous data protection (CDP) technology can bridge various DR methodologies to help organizations overcome the challenges of tape and achieve maximum benefits from their IT investments. 
(WHITE PAPER) READ ABSTRACT |

Ensure Data Protection with Sun StorageTek T10000B Tape Drives by Sun StorageTek

October 2008 - (Free Research)
Learn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements. 
(VIDEOCAST) READ ABSTRACT |

File-interface Deduplication System (FDS) Technical Whitepaper: Using FalconStor FDS as a Backup Target for Veritas NetBackup by FalconStor Software

April 2011 - (Free Research)
This document describes the basic concepts and integration guidelines for FalconStor FDS in a Veritas NetBackup environment. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 487 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts