Measures Data PrivacyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Measures Data Privacy returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Security Monitoring
 •   Business Intelligence Solutions
 •   Endpoint Security
 •   Application Security
 •   Data Center Management
 •   Network Security
 •   Vulnerability Assessment

Related Searches
 •   Construction Measures
 •   Event Measures Data
 •   Internet Measures Data
 •   Measures Collection
 •   Measures Data Definition
 •   Measures Data Privacy Application
 •   Measures Data Privacy Publishing
 •   Measures Data Time
 •   Measures Desktops
 •   Sheet Measures
Advertisement

ALL RESULTS
1 - 25 of 466 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

Kazeon Data Privacy & Security Solution by Kazeon

November 01, 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

The Tangled Web of Data Privacy Issues by Thawte Inc.

November 18, 2013 - (Free Research)
In this expert e-guide from SearchCIO.com, discover how IT executives are handling data privacy issues on the web. Also, learn how public-sectors CIOs are hiring in the changing IT workforce, the future of cloud, what exactly users are up to on the web and more. 
(EGUIDE) READ ABSTRACT |

E-Guide: Why your clients should measure their data center energy efficiency by Intel

February 14, 2011 - (Free Research)
Read this E-Guide to learn more about why measuring data center efficiency is important for your clients and what exactly they should be measuring. 
(EGUIDE) READ ABSTRACT |

Guidance for Calculation of Efficiency (PUE) in Data Centres by APC by Schneider Electric

December 09, 2011 - (Free Research)
The efficiency ratings of a data centre can vary substantially depending on what methodologies are applied. Access this exclusive resource to discover the importance of measuring data centre efficiency and learn about the issues companies face when establishing the PUE of an infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Energy Efficient IT E-Book - Chapter 4: A Step-by-Step Guide to Data Center Energy Efficiency by SearchDataCenter.com

March 30, 2010 - (Free Research)
Chapter 4 of this e-book summarizes strategies for lessening the environmental impact of data centers and helps IT managers create a holistic four-phased approach to an energy-efficient data center project that includes persuading C-level executives to pursue energy efficiency, measuring data center energy consumption, and much more. 
(EBOOK) READ ABSTRACT |

eBook: The Green Data Center 2.0: Energy Efficient Computing in the 21st century by Hewlett Packard Company and Intel

May 12, 2009 - (Free Research)
Chapter 4 of the eBook, Green Data Center, picks up where the other previous chapters left off in the plan for going green in the data center. This chapter takes a step back and looks at the project from a holistic point of view for creating a green and energy efficient data center. 
(EBOOK) READ ABSTRACT |

Using Social Media to Deepen Your Customer Relationships by Infor

November 24, 2010 - (Free Research)
Written for the marketing executive, this paper provides a useful framework to begin to assess how an organization can engage in social media to build deeper relationships with its customers. 
(WHITE PAPER) READ ABSTRACT |

eBook: Data Center Facilities IT Handbook Chapter 3 - Capping Energy Consumption In The Data Center by APC by Schneider Electric

July 20, 2009 - (Free Research)
Data center managers used to describe their facilities in terms of square footage. All of this has changed, however, and power consumption is now the reference of choice. Data centers consume more power now than ever before. This e-book chapter gives you the tools you need to work with local utility providers and some ways to benefit from utility 
(EBOOK) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

August 31, 2010 - (Free Research)
Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 16, 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

Energy Logic: Calculating and Prioritizing Your Data Center IT Efficiency Actions by Emerson Network Power

July 07, 2009 - (Free Research)
This paper reviews the challenges of measuring data center energy efficiency and proposes a solution: a new metric called CUPS, or Compute Units per Second, that allows data center managers to calculate data center efficiency. 
(WHITE PAPER) READ ABSTRACT |

Data Security and Privacy Concerns Pushed into the Spotlight by GeoTrust, Inc.

July 19, 2013 - (Free Research)
In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD. 
(EGUIDE) READ ABSTRACT |

The CISOs Guide to Measuring IT Security by Lumension

January 12, 2012 - (Free Research)
In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat. 
(WHITE PAPER) READ ABSTRACT |

Forrester: Formulate A Database Security Strategy to Ensure Investments Will Actually Prevent Data Breaches and Satisfy Regulatory Requirements by Oracle Corporation

January 31, 2012 - (Free Research)
Although most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core — their databases. Commissioned by Oracle, this Forrester paper will help you formulate a database security strategy. 
(WHITE PAPER)

Keep Your Hard Drive by Dell, Inc.

January 09, 2009 - (Free Research)
The Keep Your Hard Drive service puts Dell customers in complete control of their data and hard drive disposal, while preserving all the benefits of the Dell Limited Warranty on Failed Hard Drives. 
(DATA SHEET) READ ABSTRACT |

Data Loss Prevention from the Inside Out by Cisco Systems, Inc.

June 2008 - (Free Research)
In this Techwise TV episode learn about data loss prevention and the three primary loss vectors that you must assess for your organization. 
(VIDEOCAST) READ ABSTRACT |

KPMG 2012 Global Technology Innovation Survey by ComputerWeekly.com

June 2012 - (Free Research)
China and the US are the countries most likely to come up with disruptive technology breakthroughs over the next four years, but Europe is lagging, this report from KPMG reveals. 
(IT BRIEFING) READ ABSTRACT |

Data Protection Solutions at Midsize Organizations by Trend Micro, Inc.

February 2008 - (Free Research)
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more. 
(WHITE PAPER) READ ABSTRACT |

Virtual Data Center E-Zine:Volume 32: Public vs. Private: Comparing Cloud Architectures by Thawte Inc.

February 2012 - (Free Research)
In this e-zine, compare the trade-offs of private and public cloud computing. Find out how you can measure, monitor and optimize the performance of applications in the cloud. Plus, learn how you can develop a solid plan for virtualizing your applications. 
(EZINE)

Presentation Transcript: Endpoint security fundamentals by Sophos, Inc.

June 2009 - (Free Research)
This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Your Enterprise Database Security Strategy (Forrester Consulting Report) by IBM

September 2009 - (Free Research)
Database security is the last line of defense, so it deserves greater focus on the protection of private data from both internal and external attacks than IT pros have traditionally given it. Read this paper to learn what steps you can take to improve database security in your organization. 
(WHITE PAPER) READ ABSTRACT |

Oracle’s Optimized Solution for CRM - A Business Case for Secured Siebel CRM on Oracle’s SPARC T-Series by Oracle Corporation

March 2011 - (Free Research)
Data privacy and thefts, contractual terms and compliance requirements are issues that all need to be considered when installing a CRM system. This paper outlines how deploying Siebel CRM on Oracle's SPARC T-Series servers mitigates risk while helping maintain a low total cost of ownership by not requiring more equipment. 
(WHITE PAPER) READ ABSTRACT |

IOUG 2011 Survey: The Petabyte Challenge: 2011 IOUG Database Growth Survey by Oracle Corporation

October 2011 - (Free Research)
More than 300 database and information security professionals were recently surveyed on their data security practices. The results were disturbing with 60% saying that a data breach is likely over the next 12 months. Download this complimentary copy of the 2011 IOUG Data Security Survey Report and see how your organization measures up. 
(WHITE PAPER)

Jericho Forum: Data Protection by ComputerWeekly.com

January 2013 - (Free Research)
Data protection needs to provide stronger, more flexible protection mechanisms around the data itself, the Jericho Forum/Open Group argues in this report. 
(ESSENTIAL GUIDE) READ ABSTRACT |

How Secure Is Your Data? Enhancing Data Security And Compliance With Oracle Database 11g by Miro Consulting, Inc.

February 2011 - (Free Research)
Most organizations suffer from data security vulnerabilities within their databases. In addition to the need for securing business data, regulations across industries demand compliance with standards regarding data access, auditing, segregation of duties and the protection of personally identifiable information (PII). 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 466 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts