Privacy SearchWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Privacy Search returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Data Protection and Privacy
 •   Enterprise Search / Search Engines
 •   Data Security
 •   Enterprise Information Integration/ Metadata Management
 •   Enterprise Content Management (ECM)
 •   Taxonomies/ Indexing/ Information Retrieval Tools
 •   Business Intelligence Solutions
 •   Disk-based Backup & Storage/ RAID
 •   Backup Systems and Services
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Configuration Privacy Search
 •   Net Privacy
 •   Privacy Applications
 •   Privacy Experts
 •   Privacy Flow
 •   Privacy Search Basics
 •   Privacy Search Digital
 •   Privacy Search Maintenance
 •   Privacy Search Sheet
 •   Privacy Sheets
Advertisement

ALL RESULTS
1 - 25 of 459 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Thinking Outside the (Search) Box: Powering Enterprise Search with Knowledge by Consona Corporation

June 17, 2011 - (Free Research)
Enterprise search delivers the highest value when it helps create a great customer experience. Read this whitepaper to learn how execute enterprise search with knowledge. 
(WHITE PAPER) READ ABSTRACT |

The MATH, MYTH, & MAGIC: An Introduction to Identity Data Search-and-Match by Informatica

December 2008 - (Free Research)
This book is of value to both the person who is tackling a "name search" and "name matching" problem for the first time, as well as to the experienced specialist in "identification and search" systems. 
(BOOK) READ ABSTRACT |

Identity Finder Enterprise Suite 4.5 by Identity Finder, LLC

July 2010 - (Free Research)
Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability. 
(TRIAL SOFTWARE) READ ABSTRACT |

Presentation Transcript: Data Protection Market Drivers and Channel Opportunities by Sophos, Inc.

December 2009 - (Free Research)
Join Andy Briney and Chris Doggett as they provide insight into the reseller opportunities in data leak protection and endpoint security. Read this transcript to get answers to your biggest data leak protection reseller questions, including how a partner can differentiate themselves and what a VAR should consider when searching for a solution. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Data Quality and Identity Resolution by Informatica

May 2008 - (Free Research)
This paper describes how identity resolution complements and extends the application of data quality and data integration processes into business applications. 
(WHITE PAPER) READ ABSTRACT |

Steps to Discovery and Protection of Sensitive Data: Find IT. Search IT. Mask IT. by dataguise, Inc.

June 2010 - (Free Research)
Protecting sensitive data in the enterprise has never been more important, or more challenging. An effective data protection strategy must start with finding all of the data repositories on the network and identifying all of the sensitive data contained in those repositories. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Police Academy of the Netherlands Utilizes DocAve® to Replicate and Protect Mission Critical SharePoint® Data by AvePoint, Inc.

February 2010 - (Free Research)
The IT administrators of the Police Academy of the Netherlands demanded a data protection solution that delivered granular, item-level backup and restore capabilities. In their search, they came to DocAve's Backup and Recovery solution as well as their Replicator solution to meet their backup and data protection needs. 
(CASE STUDY) READ ABSTRACT |

KPMG 2012 Global Technology Innovation Survey by ComputerWeekly.com

June 2012 - (Free Research)
China and the US are the countries most likely to come up with disruptive technology breakthroughs over the next four years, but Europe is lagging, this report from KPMG reveals. 
(IT BRIEFING) READ ABSTRACT |

E-Guide: The Basics of Endpoint Security: Expert Reveals Tips for Finding Data on the Endpoints by Panda Security

September 2009 - (Free Research)
In this E-Guide, security expert Mike Chapple reveals tips on finding sensitive information on the endpoint. Get a basic understanding of the algorithms used to detect sensitive information, software tools to assist you in your search for data, and two basic approaches for managing sensitive information. 
(EGUIDE) READ ABSTRACT |

A Buyer's Guide to Data Loss Protection Solutions by Websense, Inc.

July 2011 - (Free Research)
Selecting an DLP solution can be a challange and it is important to find one that provides the right amount of coverage for your business. View this guide for list of recommended features and capabilities to consider when searching for the right DLP solution. 
(WHITE PAPER) READ ABSTRACT |

10 Common Pitfalls to Avoid When Evaluating Security Information Management (SIM) Solutions by netForensics

September 2009 - (Free Research)
This paper was created to help companies searching for a SIM solution narrow their options and determine which technology is the right one for their IT environment and security objectives. 
(WHITE PAPER) READ ABSTRACT |

IDC: CommVault's Great Leap Forward by CommVault Systems, Inc.

February 2013 - (Free Research)
This two-page white paper explores why one vendor's new data protection and recovery solution stands out from the rest and provides features like snapshot management, archiving, deduplication, replication, search, reporting and more all from a single platform to keep up with today's highly virtualized industry. 
(WHITE PAPER) READ ABSTRACT |

FAQ Guide: An Introduction to Data Compression by IBM

August 2011 - (Free Research)
In this SearchStorage.com interview, W. Curtis Preston, independent analyst and executive editor in TechTarget's Storage Media Group, discusses the basics of data compression – one of the most popular search terms on SearchStorage.com this year. 
(EGUIDE) READ ABSTRACT |

Case Study: Implementing Database Activity Monitoring for a Major International Telecommunications Company by IBM

March 2011 - (Free Research)
InfoSphere Guardium’s appliance-based technology allows companies to secure their enterprise data and rapidly address compliance requirements without affecting performance or requiring changes to databases or applications. Read on to learn more about InfoSphere today. 
(CASE STUDY) READ ABSTRACT |

What's New in Enterprise Search in SharePoint 2010 by Microsoft Corporation India Pvt Ltd

November 2009 - (Free Research)
Microsoft SharePoint Server 2010 offers all of the enterprise search features and functionality that are in Microsoft Office SharePoint Server 2007 and provides many new enterprise search capabilities. This article summarizes the new enterprise search features and functionality in SharePoint Server 2010. 
(WHITE PAPER) READ ABSTRACT |

Overview of Windows Search Technologies by Global Knowledge

February 2009 - (Free Research)
This paper helps us to understand the importance of desktop search tools fit in the universe of Microsoft search tools. 
(WHITE PAPER) READ ABSTRACT |

Learn More About KnowledgeStorm by KnowledgeStorm, Inc (E-mail this company)

June 2007 - (Free Research)
KnowledgeStorm is the Internet's top-ranked search resource for technology solutions and information. With our premier network, search expertise and performance tools and services, KnowledgeStorm provides technology vendors the most opportunities to reach buyers on the Internet and convert them into Web leads. 
(WHITE PAPER) READ ABSTRACT |

Discover the Unique Benefits of Enterprise Search Technology for Your Organization by Google Search Appliance

December 2010 - (Free Research)
Read this e-guide and uncover how enterprise search technology is helping knowledge workers find relevant information quickly and easily. Learn about how enterprise search has positively impacted the content management applications market. 
(EGUIDE) READ ABSTRACT |

Case Study: Northern Trust Turns To Google For More Accurate and Relevant Search by Google Search Appliance

November 2010 - (Free Research)
In order to ensure regulatory compliance, Northern Trust's IT department needed a better tool to help employees quickly find the latest forms and information. Using the Google Search Appliance, OneBox and User-Added Results, Northern Trust increased both the accuracy and relevance of all intranet searches. Read this case study. 
(CASE STUDY) READ ABSTRACT |

Scaling Strategies for Mission-Critical Search Applications by Vivisimo, Inc.

January 2010 - (Free Research)
This paper will discuss scaling strategies for building flexible, high performance and high availability solutions for mission-critical search applications that will be able to handle the sheer amount of data while securely crawling and indexing all data repositories. 
(WHITE PAPER) READ ABSTRACT |

Expanding Information Access Initiatives with Embedded Enterprise Search by Vivisimo, Inc.

December 2009 - (Free Research)
This paper focuses specifically on what application developers—specifically, ISVs and solution integrators—need to do in order to satiate this emerging market demand. Read on to learn some of Vivisimo's capabilities and how ISVs and solution integrators can leverage them to address evolving search challenges within their respective applications. 
(WHITE PAPER) READ ABSTRACT |

Using Social Search to Drive Innovation through Collaboration by Vivisimo, Inc.

December 2009 - (Free Research)
This paper, will try to help you strike a balance between solid business thinking and explosive enthusiasm for any new technology option with 2.0 in the description. Our goal is to give you a new way of looking at old challenges. 
(WHITE PAPER) READ ABSTRACT |

8 Problems of Keyword Search in E-Discovery - A Guide for Fortune 1000 Companies by FTI Technology

December 2009 - (Free Research)
With data collections growing at an epic pace, legal teams must sift quickly through documents and e-mail at rates that would have seemed unrealistic just 5 years ago. Simply put, keyword search strategies break when thrown against the mountains of data which define today’s legal matters. 
(WHITE PAPER) READ ABSTRACT |

8 Problems of Keyword Search in E-Discovery – A Guide for Fortune 1000 Companies by FTI Technology

November 2009 - (Free Research)
In this paper – first in a three part series - we will examine the difficulties of working with keywords during a matter, the many challenges associated with relying on keyword search, and the cost and risk associated with attempting to “guess” one’s way to a relevant document set. 
(WHITE PAPER) READ ABSTRACT |

How to Effectively Deploy and Manage Enterprise Search by Lucid Works

August 2012 - (Free Research)
Enterprise search offers significant businesses benefits – if you know how to deploy and manage it effectively. Read through this informative presentation transcript to learn enterprise search implementation and administration best practices from Lynda Moulton, a content and search technology guru with 30+ years of experience. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

1 - 25 of 459 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts