Privacy And Security New HampshireWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Privacy And Security New Hampshire returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Data Protection and Privacy
 •   Data Security
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Security Policies
 •   Network Security
 •   Application Security
 •   Virtualization
 •   Data Center Management
 •   Endpoint Security
 •   Enterprise Information Integration/ Metadata Management

Related Searches
 •   Device Privacy
 •   Distributions Privacy And Security
 •   Introduction Privacy
 •   Privacy And Activity
 •   Privacy And Examples
 •   Privacy And Security File
 •   Privacy And Security Productivity
 •   Privacy Configuration
 •   Privacy Products
 •   Privacy Programming
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Data privacy best practices: time to take action! by IBM

September 01, 2008 - (Free Research)
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish. 
(WHITE PAPER) READ ABSTRACT |

Data privacy best practices: time to take action! by IBM

February 24, 2009 - (Free Research)
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Using proven data masking techniques can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish. 
(WHITE PAPER) READ ABSTRACT |

Data privacy best practices: time to take action! by IBM

September 30, 2008 - (Free Research)
This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. 
(WHITE PAPER) READ ABSTRACT |

Celina Insurance Group Streamlines Collaborative Processes with Agents to Stay ahead of the Competition by IBM

March 13, 2009 - (Free Research)
Read this case study to see how Celina Insurance Group implemented a collaborative extranet based on IBM Lotus Notes and Lotus Domino to enhance their competitive edge. 
(CASE STUDY) READ ABSTRACT |

Basingstoke and North Hampshire NHS Foundation Trust unites the ‘clinical five’ by IBM

August 05, 2011 - (Free Research)
Check out this case study to learn how leading health care provider Basingstoke and North Hampshire NHS Foundation Trust was able to integrate and consolidate data between locations for significant cost savings, as well as increases in efficiency and productivity. 
(CASE STUDY) READ ABSTRACT |

UNH Data Protection Makes the Grade with SEPATON S2100-ES2 Virtual Tape Library by SEPATON

August 21, 2009 - (Free Research)
As part of a data center consolidation project, the University of New Hampshire wanted to implement a faster, more efficient way to backup and protect their academic and administrative data. They turned to the SEPATON S2100-ES2 virtual tape library (VTL) with DeltaStor data deduplication. 
(CASE STUDY) READ ABSTRACT |

Global Best Practices in Email Security, Privacy and Compliance by Proofpoint, Inc.

August 2008 - (Free Research)
A new generation of email security solutions is needed to meet the challenges of growing message traffic, rapidly-evolving security threats and increasingly complex data protection and privacy regulations. This paper examines such a solution. 
(WHITE PAPER) READ ABSTRACT |

Employee Use of Personal Devices: Managing Risk by Balancing Privacy & Security by McAfee, Inc.

November 2011 - (Free Research)
In this business brief, Jules Polonetsky, the author of, Employee Use of Personal Devices—Managing risk by balancing privacy and security, outlines the top security and compliance issues that companies need to take into consideration while maintaining privacy balance when employees use their own personal mobile devices for work. 
(WHITE PAPER) READ ABSTRACT |

Healthcare and Compliance - The New Reality by Juniper Networks, Inc.

April 2011 - (Free Research)
This paper outlines the three most important mandates for Healthcare today. 
(WHITE PAPER) READ ABSTRACT |

Network Faxing and HIPAA: Security and Privacy in the Health Care Industry by Castelle

January 2007 - (Free Research)
The Health Insurance Portability and Accountability Act (HIPAA) prescribes new health care industry rules and recommendations for the handling and transmission of patient health information. 
(WHITE PAPER) READ ABSTRACT |

The Tangled Web of Data Privacy Issues by Thawte Inc.

November 2013 - (Free Research)
In this expert e-guide from SearchCIO.com, discover how IT executives are handling data privacy issues on the web. Also, learn how public-sectors CIOs are hiring in the changing IT workforce, the future of cloud, what exactly users are up to on the web and more. 
(EGUIDE) READ ABSTRACT |

Cisco Web Security Appliance by Cisco Systems, Inc.

April 2014 - (Free Research)
This exclusive paper examines a web security appliance that combines advanced malware protection, application visibility and control, insightful reporting and highly secure mobility to ensure the protection and control of web traffic. 
(WHITE PAPER) READ ABSTRACT |

Cisco Cloud Web Security: Single Interface for Global Control by Cisco Systems, Inc.

February 2014 - (Free Research)
This resource features a cloud Web security solution that offers unique features to help you gain clear visibility and complete control over today's more expansive networks. 
(WHITE PAPER) READ ABSTRACT |

Security in the Cloud: New Intel® technologies enable more secure business computing in the cloud by Intel

April 2011 - (Free Research)
Intel has developed new technologies to help improve cloud security, and has been collaborating with leading hardware and software solution providers to enable more comprehensive and integrated solutions that can make it easier for businesses to adopt cloud computing. Continue reading to learn more. 
(WHITE PAPER) READ ABSTRACT |

The Massachusetts Data Protection Law by SearchSecurity.com & SearchCompliance.com

June 2009 - (Free Research)
Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned. 
(EBOOK) READ ABSTRACT |

The State of Privacy and Data Security Compliance by Sophos, Inc.

November 2009 - (Free Research)
The purpose of the study is to determine if various international, federal and state data security laws improve an organization’s security posture. What is the value of compliance and does it correlate with the value of the compliance effort? Read on to find out. 
(ANALYST REPORT) READ ABSTRACT |

The Role of Security Management in Achieving "Continuous Compliance" by CA Technologies.

December 2007 - (Free Research)
There's a focus today on regulatory compliance involving financial reporting, security and data privacy. But there are also tremendous business performance opportunities that can be fueled by the new requirements. This paper details the benefits of continuous compliance, which include reduction of risk and cost. 
(WHITE PAPER) READ ABSTRACT |

Dirty Little Secrets: Mobile Apps Invading Your Privacy by Veracode, Inc.

July 2011 - (Free Research)
Join Tyler Shields, Senior Security Researcher at Veracode, as he discusses the evolving mobile security threat landscape and shares real-world examples of how your data is being used (or misused) in some of the most popular mobile applications. 
(WEBCAST) READ ABSTRACT |

Top Five Security Issues for Small and Medium-Sized Businesses by Cisco Systems, Inc.

February 2008 - (Free Research)
Small and medium-sized businesses use the Internet and networked applications to reach new customers and serve their existing ones more effectively. 
(WHITE PAPER) READ ABSTRACT |

Global Sourcing Trends in 2012 by ComputerWeekly.com

March 2012 - (Free Research)
The latest IT outsourcing trends from global law firm Morrison & Foerster. 
(IT BRIEFING) READ ABSTRACT |

E-Book: New Rules for HIPAA by SearchSecurity.com & SearchCompliance.com

May 2010 - (Free Research)
Organizations that had to comply with HIPAA were frustrated by the lack of enforcement and specifics. The HITECH Act is changing all of that. Read this e-book to learn how the HIPAA is getting new teeth, new ways the FTC is getting involved, and more. 
(EBOOK) READ ABSTRACT |

A Guide to Data Privacy for Business and IT Executives by IntraLinks, Inc

December 2013 - (Free Research)
This white paper explains the latest global government efforts in enforcing stronger data privacy laws. Click now to uncover 6 data protection recommendations to help you mitigate the risks of information sharing and prevent regulatory and market sanctions. 
(WHITE PAPER) READ ABSTRACT |

Oracle Accelerate - Not Just Smart but Timely by Oracle Corporation

March 2009 - (Free Research)
This paper gives you an overview of how Ovum has helped penetrate the upper-midmarket. Even when the slowing growth of the market hasn't. 
(WHITE PAPER) READ ABSTRACT |

Clustered SAN enables seamless scaling and greater storage efficiency by NetApp

December 2012 - (Free Research)
Storage systems today must match agility with proven, diversified I/O performance to satisfy an enterprise's changing needs. NetApp has benchmarked superior I/O performance in their FAS6240 Clustered SAN storage array, resulting in its ranking as Silverton Consulting's Enterprise OLTP Champion of Champions™ for 1Q-2013. 
(WHITE PAPER) READ ABSTRACT |

Essential Guide to HIPAA Compliance and Data Protection Strategies by SearchHealthIT.com and SearchSecurity.com

August 2011 - (Free Research)
Effectively addressing the new HIPAA privacy and security rules introduced in the HITECH Act requires an assessment of your organization’s biggest vulnerabilities as well as the deployment of the right technology to reduce the risk of data loss. Inside this expert resource, gain insight on current healthcare security topics. 
(EZINE)

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts