Data Security FormatWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Data Security Format returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Network Security
 •   Security Monitoring
 •   Vulnerability Assessment
 •   Encryption and Key Management
 •   Storage Security
 •   Wireless Security

Related Searches
 •   Code Data Security
 •   Data Fast
 •   Data Plans
 •   Data Security Firm
 •   Data Security Format Buys
 •   Data Security Format Improve
 •   Data Security Impact
 •   Data Security Price
 •   Data Security Sql
 •   Decisions Data
Advertisement

ALL RESULTS
1 - 25 of 468 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

The New Era of Big Data Security Analytics by SearchSecurity.com

October 10, 2013 - (Free Research)
This expert guide examines the reasons why Big Data security is so important, providing helpful tips for adapting and utilizing it to your business' advantage. 
(EGUIDE) READ ABSTRACT |

Preventing Cyber-Attacks with Big Data Security Analytics and SIEM by LogRhythm, Inc.

February 06, 2013 - (Free Research)
This webcast explains the rise in IT security attacks and how security information and event management (SIEM) solutions can help you block them in the future. 
(WEBCAST) READ ABSTRACT |

A Guide to Big Data Security Analytics and SIEM Strategies by LogRhythm, Inc.

December 31, 2012 - (Free Research)
Explore the current SIEM tools and capabilities today and uncover how new improvements in SIEM can help boost your defenses in today's threat-filled world. 
(WHITE PAPER) READ ABSTRACT |

PCI and PA DSS Compliance Assurance with LogRhythm by LogRhythm, Inc.

October 31, 2012 - (Free Research)
Gain insight into the six domains of Payment Card Industry Data Security Standard (PCI DSS) and its 12 control requirements and learn how a particular solution enables you to improve your overall security and compliance posture while simultaneously reducing associated costs. 
(WHITE PAPER) READ ABSTRACT |

LogRhythm and PCI Compliance by LogRhythm, Inc.

September 09, 2009 - (Free Research)
LogRhythm has extensive experience in helping organizations improve their overall security and compliance posture while reducing costs. This paper illustrates and discusses the 6 domains of PCI DSS requirements as well as uses tables to outline how LogRhythm supports PCI compliance. 
(WHITE PAPER) READ ABSTRACT |

PCI Compliance for IBM System i (AS/400) by PowerTech

November 2007 - (Free Research)
This whitepaper examines how the standard relates to the System i (AS/400). When applicable, specific operating systems commands and configuration settings are provided. 
(WHITE PAPER) READ ABSTRACT |

Data Security Checklist: Tips for Managing the Mobile Enterprise by Accellion, Inc.

November 2013 - (Free Research)
This document presents a checklist of data security features to consider when establishing an enterprise mobility management strategy. 
(WHITE PAPER) READ ABSTRACT |

Mobile Data Security and Compliance Challenges in the Enterprises by SearchSecurity.com

September 2012 - (Free Research)
The bring your own device (BYOD) era has ushered in a number of benefits and security challenges alike. In this E-Guide from SearchConsumerization.com, learn about the top mobile data security and compliance challenges and the best ways you can conquer them. 
(EGUIDE) READ ABSTRACT |

PCI in the cloud: Compliance guide by SearchSecurity.com

April 2012 - (Free Research)
Adhering to the requirements of the PCI DSS, especially in a cloud computing environment, is no easy task and unfortunately there is no one-size-fits all approach. This guide offers expert insight on PCI in the cloud as well as key guidance to help you navigate through the cloud to meet compliance goals. 
(EGUIDE) READ ABSTRACT |

Best Practices for Improving Mobile Data Security by SearchSecurity.com

July 2013 - (Free Research)
This expert guide from SearchConsumerization.com takes an in-depth look at mobile data security best practices, including creating a robust PIN or passcode, implementing anti-malware, understanding the top mobile risks and how to offset them, and much more. 
(EGUIDE) READ ABSTRACT |

Addressing Data Security In The Cloud And Low Cost Large File Transfer by SearchSecurity.com

October 2013 - (Free Research)
The location of cloud storage can play a huge part in cost as well as security. Delivering large files from non-scrutinized locations can compromise sensitive data in more ways than not. 
(EGUIDE) READ ABSTRACT |

10 Ways to Build a Better Big Data Security Strategy by Hewlett-Packard Limited

January 2014 - (Free Research)
This informative whitepaper explores the role of Big Data and outlines 10 best practices for Big Data security. 
(WHITE PAPER) READ ABSTRACT |

Mobile, Social Engineering Top Data Security Management Concerns by Thawte Inc.

November 2013 - (Free Research)
This e-guide, from SearchCIO.com, explores how to set up the right policies in order to successfully eliminate mobile, social engineering and data security management concerns. 
(EGUIDE) READ ABSTRACT |

CORE Security and the Payment Card Industry Data Security Standard by Core Security Technologies

October 2013 - (Free Research)
This informative resource explores a security testing method that ensures PCI DSS validation and compliance to keep payment cardholder data protected from cybercrime at all times. 
(WHITE PAPER) READ ABSTRACT |

Data Security in the E-discovery Process by SearchCompliance.com

October 2011 - (Free Research)
In this eBook from the experts at SearchCompliance.com, discover all you need to know about e-discovery, compliance, and data security in order to plan for success in your organization. Find out how effective records management can ease the pain of e-discovery, how Web forensics can help protect your data, and more. 
(EBOOK)

Using Microsoft Active Directory to Address Payment Card Industry (PCI) Data Security Standard Requirements in Heterogeneous Environments by Centrify Corporation

September 2012 - (Free Research)
This white paper outlines the business and technical case for centralizing administration. Learn more about the steps to take with user authentication and access controls as well as how to provide accountability through direct auditing of user activities. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Pragmatic Data Security by Websense, Inc.

March 2010 - (Free Research)
This presentation transcript busts through hype, hyperbole, and complexity and details a pragmatic approach to information-centric security for nearly any organization. Read on to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

PCI Compliance Made Simple by Alert Logic

February 2008 - (Free Research)
Major data breaches have caused untold damage. These unfortunate events have led to the creation of a data security standard (PCI DSS) that all payment card industry members must comply to. This white paper helps to simplify and provide a deeper understanding of the PCI DSS v1.1 and discusses best practices to achieve PCI compliance. 
(WHITE PAPER) READ ABSTRACT |

PCI DSS: Next-Generation Data Security, Storage and Integrity by SearchSecurity.com

October 2010 - (Free Research)
SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard. 
(EBOOK) READ ABSTRACT |

The Business Case for Data Security by Imperva

March 2011 - (Free Research)
This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions. 
(WHITE PAPER) READ ABSTRACT |

The Business Case for Data Security by Imperva

November 2010 - (Free Research)
This paper examines the drivers for adopting a strategic approach to data security, compares and contrasts current approaches, and presents the Return on Security Investment (ROSI) of viable data security solutions. 
(WHITE PAPER) READ ABSTRACT |

Technology Audit: Imperva SecureSphere Data Security Suite by Imperva

June 2010 - (Free Research)
Any organization delivering services or products via the Web should consider SecureSphere as a “must-have” piece of its IT protection infrastructure. The product set makes a strong case for itself as a leading contender in this market space. Read this paper to read more. 
(WHITE PAPER) READ ABSTRACT |

The State of Privacy and Data Security Compliance by Sophos, Inc.

November 2009 - (Free Research)
The purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out. 
(ANALYST REPORT) READ ABSTRACT |

Closing the Gaps in Enterprise Data Security: A Model for 360° Protection by Sophos, Inc.

November 2009 - (Free Research)
This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations worldwide as components of a 
(WHITE PAPER) READ ABSTRACT |

The Business Impact of Data Security Regulations: Featuring Massachusetts by Sophos, Inc.

November 2009 - (Free Research)
Massachusetts has taken the lead in passing a new regulation - 201 CMR 17:00 -that requires companies to implement a comprehensive data security plan that includes encryption. This article discusses some aspects of this regulation and offers suggestions on how data security best practices can help with compliance. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 468 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts