Measures Data PrivacyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Measures Data Privacy returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Security Policies
 •   Security Monitoring
 •   Business Intelligence Solutions
 •   Data Center Management
 •   Endpoint Security
 •   Application Security
 •   Network Security
 •   Vulnerability Assessment

Related Searches
 •   Contract Measures
 •   Markets Measures Data
 •   Measures Capacity
 •   Measures Data Privacy Forms
 •   Measures Data Privacy System Software
 •   Measures Data Tool
 •   Measures Improvements
 •   Open Measures
 •   Projects Measures Data Privacy
 •   User Measures
Advertisement

ALL RESULTS
1 - 25 of 479 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..
Cisco Secure Wireless Office Solution for SMBs by Cisco Systems, Inc..
The Cisco Secure Wireless Office Solution consolidates all network requirements into a complete, reliable wired and wireless infrastructure. more...
>> Discover more offerings from Cisco Systems, Inc..

A Guide to Data Privacy for Business and IT Executives by IntraLinks, Inc

December 31, 2013 - (Free Research)
This white paper explains the latest global government efforts in enforcing stronger data privacy laws. Click now to uncover 6 data protection recommendations to help you mitigate the risks of information sharing and prevent regulatory and market sanctions. 
(WHITE PAPER) READ ABSTRACT |

Kazeon Data Privacy & Security Solution by Kazeon

November 01, 2006 - (Free Research)
This white paper examines an Information Classification Management (ICM) solution that helps classify and secure your company's sensitive information and overcome the challenges of securing data while complying with federal guidelines. 
(WHITE PAPER)

The Tangled Web of Data Privacy Issues by Thawte Inc.

November 18, 2013 - (Free Research)
In this expert e-guide from SearchCIO.com, discover how IT executives are handling data privacy issues on the web. Also, learn how public-sectors CIOs are hiring in the changing IT workforce, the future of cloud, what exactly users are up to on the web and more. 
(EGUIDE) READ ABSTRACT |

E-Guide: Why your clients should measure their data center energy efficiency by Intel

February 14, 2011 - (Free Research)
Read this E-Guide to learn more about why measuring data center efficiency is important for your clients and what exactly they should be measuring. 
(EGUIDE) READ ABSTRACT |

The Most Powerful of Adversaries: NSA Programs and Techniques Provide Lessons in Data Privacy and Managing Enterprise Collaboration by IntraLinks, Inc

April 17, 2014 - (Free Research)
This resource reveals best practices on how to protect intellectual property, especially from the U.S. National Security Agency (NSA) and other government actors, who have the power to exploit critical data. 
(WHITE PAPER) READ ABSTRACT |

Guidance for Calculation of Efficiency (PUE) in Data Centres by APC by Schneider Electric

December 09, 2011 - (Free Research)
The efficiency ratings of a data centre can vary substantially depending on what methodologies are applied. Access this exclusive resource to discover the importance of measuring data centre efficiency and learn about the issues companies face when establishing the PUE of an infrastructure. 
(WHITE PAPER) READ ABSTRACT |

Data Privacy: Where Should I House My Data? by IntraLinks, Inc

April 17, 2014 - (Free Research)
This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders. 
(WHITE PAPER) READ ABSTRACT |

Energy Efficient IT E-Book - Chapter 4: A Step-by-Step Guide to Data Center Energy Efficiency by SearchDataCenter.com

March 30, 2010 - (Free Research)
Chapter 4 of this e-book summarizes strategies for lessening the environmental impact of data centers and helps IT managers create a holistic four-phased approach to an energy-efficient data center project that includes persuading C-level executives to pursue energy efficiency, measuring data center energy consumption, and much more. 
(EBOOK) READ ABSTRACT |

eBook: The Green Data Center 2.0: Energy Efficient Computing in the 21st century by Hewlett Packard Company and Intel

May 12, 2009 - (Free Research)
Chapter 4 of the eBook, Green Data Center, picks up where the other previous chapters left off in the plan for going green in the data center. This chapter takes a step back and looks at the project from a holistic point of view for creating a green and energy efficient data center. 
(EBOOK) READ ABSTRACT |

Using Social Media to Deepen Your Customer Relationships by Infor

November 24, 2010 - (Free Research)
Written for the marketing executive, this paper provides a useful framework to begin to assess how an organization can engage in social media to build deeper relationships with its customers. 
(WHITE PAPER) READ ABSTRACT |

eBook: Data Center Facilities IT Handbook Chapter 3 - Capping Energy Consumption In The Data Center by APC by Schneider Electric

July 20, 2009 - (Free Research)
Data center managers used to describe their facilities in terms of square footage. All of this has changed, however, and power consumption is now the reference of choice. Data centers consume more power now than ever before. This e-book chapter gives you the tools you need to work with local utility providers and some ways to benefit from utility 
(EBOOK) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

August 31, 2010 - (Free Research)
Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 16, 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

Buy the right enterprise collaboration solution the first time by IntraLinks, Inc

April 18, 2014 - (Free Research)
Access the following buyer's guide to enterprise collaboration to learn what you need to look for when selecting an appropriate vendor for your unique situation. 
(WHITE PAPER) READ ABSTRACT |

Security - Three Necessary Security Measures to Empower Data Center Transformation by Cisco Systems, Inc.

July 12, 2013 - (Free Research)
Access this informative white paper that presents three must-have security measures to empower data center transformation to virtualization and the cloud. 
(WHITE PAPER) READ ABSTRACT |

Energy Logic: Calculating and Prioritizing Your Data Center IT Efficiency Actions by Emerson Network Power

July 07, 2009 - (Free Research)
This paper reviews the challenges of measuring data center energy efficiency and proposes a solution: a new metric called CUPS, or Compute Units per Second, that allows data center managers to calculate data center efficiency. 
(WHITE PAPER) READ ABSTRACT |

The CISOs Guide to Measuring IT Security by Lumension

January 12, 2012 - (Free Research)
In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat. 
(WHITE PAPER) READ ABSTRACT |

Data Security and Privacy Concerns Pushed into the Spotlight by GeoTrust, Inc.

July 19, 2013 - (Free Research)
In this searchCompliance.com e-guide, uncover the core benefits data privacy programs, data protection strategies, and data-loss incident readiness plans have to offer and key steps for achieving them, with a particular focus placed on BYOD. 
(EGUIDE) READ ABSTRACT |

Forrester: Formulate A Database Security Strategy to Ensure Investments Will Actually Prevent Data Breaches and Satisfy Regulatory Requirements by Oracle Corporation

January 31, 2012 - (Free Research)
Although most organizations are taking stronger measures to protect their data, significant gaps still exist at the very core — their databases. Commissioned by Oracle, this Forrester paper will help you formulate a database security strategy. 
(WHITE PAPER)

Keep Your Hard Drive by Dell, Inc.

January 09, 2009 - (Free Research)
The Keep Your Hard Drive service puts Dell customers in complete control of their data and hard drive disposal, while preserving all the benefits of the Dell Limited Warranty on Failed Hard Drives. 
(DATA SHEET) READ ABSTRACT |

KPMG 2012 Global Technology Innovation Survey by ComputerWeekly.com

June 27, 2012 - (Free Research)
China and the US are the countries most likely to come up with disruptive technology breakthroughs over the next four years, but Europe is lagging, this report from KPMG reveals. 
(IT BRIEFING) READ ABSTRACT |

Mobile Application Security Study by Hewlett-Packard Company

February 28, 2014 - (Free Research)
In this resource, unveil the major vulnerabilities created when mobile application developers speed through to meet deadlines instead of integrating top security measures. 
(WHITE PAPER) READ ABSTRACT |

Data Loss Prevention from the Inside Out by Cisco Systems, Inc.

July 2008 - (Free Research)
In this Techwise TV episode learn about data loss prevention and the three primary loss vectors that you must assess for your organization. 
(VIDEOCAST) READ ABSTRACT |

Presentation Transcript: Endpoint security fundamentals by Sophos, Inc.

June 2009 - (Free Research)
This presentation transcript, taken from the video of the same name, offers a "back-to-basics" look at endpoint security and helps you identify the truly critical components of an enterprise client security program, especially when budgets are tight. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Data Protection Solutions at Midsize Organizations by Trend Micro, Inc.

February 2008 - (Free Research)
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 479 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts