Privacy SearchWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Privacy Search returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Data Protection and Privacy
 •   Enterprise Search / Search Engines
 •   Data Security
 •   Enterprise Information Integration/ Metadata Management
 •   Enterprise Content Management (ECM)
 •   Taxonomies/ Indexing/ Information Retrieval Tools
 •   Business Intelligence Solutions
 •   Disk-based Backup & Storage/ RAID
 •   Backup Systems and Services
 •   Compliance Management/ Sarbanes-Oxley Compliance

Related Searches
 •   Issues Privacy Search
 •   Mapping Privacy
 •   Privacy Calls
 •   Privacy Experts
 •   Privacy Search Arkansas
 •   Privacy Search Batch
 •   Privacy Search Practices
 •   Privacy Search Procedures
 •   Privacy Search Rhode Island
 •   Report Privacy Search
Advertisement

ALL RESULTS
1 - 25 of 467 | Next Page

Featured Sponsors

WebFOCUS Operational Enterprise Business Intelligence by Information Builders Inc..
WebFOCUS is a comprehensive and fully integrated enterprise business intelligence platform. It sets the standard for enterprise business intelligence by scaling to support more...
>> Discover more offerings from Information Builders Inc..

Thinking Outside the (Search) Box: Powering Enterprise Search with Knowledge by Consona Corporation

June 17, 2011 - (Free Research)
Enterprise search delivers the highest value when it helps create a great customer experience. Read this whitepaper to learn how execute enterprise search with knowledge. 
(WHITE PAPER) READ ABSTRACT |

The MATH, MYTH, & MAGIC: An Introduction to Identity Data Search-and-Match by Informatica

December 2008 - (Free Research)
This book is of value to both the person who is tackling a "name search" and "name matching" problem for the first time, as well as to the experienced specialist in "identification and search" systems. 
(BOOK) READ ABSTRACT |

Presentation Transcript: Data Protection Market Drivers and Channel Opportunities by Sophos, Inc.

December 2009 - (Free Research)
Join Andy Briney and Chris Doggett as they provide insight into the reseller opportunities in data leak protection and endpoint security. Read this transcript to get answers to your biggest data leak protection reseller questions, including how a partner can differentiate themselves and what a VAR should consider when searching for a solution. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Data Quality and Identity Resolution by Informatica

May 2008 - (Free Research)
This paper describes how identity resolution complements and extends the application of data quality and data integration processes into business applications. 
(WHITE PAPER) READ ABSTRACT |

Identity Finder Enterprise Suite 4.5 by Identity Finder, LLC

July 2010 - (Free Research)
Identity Finder accurately finds and allows remediation of sensitive data across desktops, laptops, servers, databases, and websites. This can be performed agent or agentlessly with full dynamic policy and reporting capability. 
(TRIAL SOFTWARE) READ ABSTRACT |

Steps to Discovery and Protection of Sensitive Data: Find IT. Search IT. Mask IT. by dataguise, Inc.

June 2010 - (Free Research)
Protecting sensitive data in the enterprise has never been more important, or more challenging. An effective data protection strategy must start with finding all of the data repositories on the network and identifying all of the sensitive data contained in those repositories. Read this paper to learn more. 
(WHITE PAPER) READ ABSTRACT |

Police Academy of the Netherlands Utilizes DocAve® to Replicate and Protect Mission Critical SharePoint® Data by AvePoint, Inc.

February 2010 - (Free Research)
The IT administrators of the Police Academy of the Netherlands demanded a data protection solution that delivered granular, item-level backup and restore capabilities. In their search, they came to DocAve's Backup and Recovery solution as well as their Replicator solution to meet their backup and data protection needs. 
(CASE STUDY) READ ABSTRACT |

A Buyer's Guide to Data Loss Protection Solutions by Websense, Inc.

July 2011 - (Free Research)
Selecting an DLP solution can be a challange and it is important to find one that provides the right amount of coverage for your business. View this guide for list of recommended features and capabilities to consider when searching for the right DLP solution. 
(WHITE PAPER) READ ABSTRACT |

10 Common Pitfalls to Avoid When Evaluating Security Information Management (SIM) Solutions by netForensics

September 2009 - (Free Research)
This paper was created to help companies searching for a SIM solution narrow their options and determine which technology is the right one for their IT environment and security objectives. 
(WHITE PAPER) READ ABSTRACT |

IDC: CommVault's Great Leap Forward by CommVault Systems, Inc.

February 2013 - (Free Research)
This two-page white paper explores why one vendor's new data protection and recovery solution stands out from the rest and provides features like snapshot management, archiving, deduplication, replication, search, reporting and more all from a single platform to keep up with today's highly virtualized industry. 
(WHITE PAPER) READ ABSTRACT |

FAQ Guide: An Introduction to Data Compression by IBM

August 2011 - (Free Research)
In this SearchStorage.com interview, W. Curtis Preston, independent analyst and executive editor in TechTarget's Storage Media Group, discusses the basics of data compression – one of the most popular search terms on SearchStorage.com this year. 
(EGUIDE) READ ABSTRACT |

Case Study: Implementing Database Activity Monitoring for a Major International Telecommunications Company by IBM

March 2011 - (Free Research)
InfoSphere Guardium’s appliance-based technology allows companies to secure their enterprise data and rapidly address compliance requirements without affecting performance or requiring changes to databases or applications. Read on to learn more about InfoSphere today. 
(CASE STUDY) READ ABSTRACT |

KPMG 2012 Global Technology Innovation Survey by ComputerWeekly.com

June 2012 - (Free Research)
China and the US are the countries most likely to come up with disruptive technology breakthroughs over the next four years, but Europe is lagging, this report from KPMG reveals. 
(IT BRIEFING) READ ABSTRACT |

E-Guide: The Basics of Endpoint Security: Expert Reveals Tips for Finding Data on the Endpoints by Panda Security

September 2009 - (Free Research)
In this E-Guide, security expert Mike Chapple reveals tips on finding sensitive information on the endpoint. Get a basic understanding of the algorithms used to detect sensitive information, software tools to assist you in your search for data, and two basic approaches for managing sensitive information. 
(EGUIDE) READ ABSTRACT |

What's New in Enterprise Search in SharePoint 2010 by Microsoft Corporation India Pvt Ltd

November 2009 - (Free Research)
Microsoft SharePoint Server 2010 offers all of the enterprise search features and functionality that are in Microsoft Office SharePoint Server 2007 and provides many new enterprise search capabilities. This article summarizes the new enterprise search features and functionality in SharePoint Server 2010. 
(WHITE PAPER) READ ABSTRACT |

Overview of Windows Search Technologies by Global Knowledge

February 2009 - (Free Research)
This paper helps us to understand the importance of desktop search tools fit in the universe of Microsoft search tools. 
(WHITE PAPER) READ ABSTRACT |

SharePoint E-Zine Volume 9: Rediscovery, Research and Prediction in SharePoint Search by SearchWinIT

April 2009 - (Free Research)
In this month's issue of SharePoint eZine, you'll learn how indexing content creates a search environment that gives users information as they need it, how to maintain your SharePoint governance documents while keeping them current, and how setting guidelines for site provisioning gives flexibility for users and helps manage growth. 
(EZINE)

Learn More About KnowledgeStorm by KnowledgeStorm, Inc (E-mail this company)

June 2007 - (Free Research)
KnowledgeStorm is the Internet's top-ranked search resource for technology solutions and information. With our premier network, search expertise and performance tools and services, KnowledgeStorm provides technology vendors the most opportunities to reach buyers on the Internet and convert them into Web leads. 
(WHITE PAPER) READ ABSTRACT |

Discover the Unique Benefits of Enterprise Search Technology for Your Organization by Google Search Appliance

December 2010 - (Free Research)
Read this e-guide and uncover how enterprise search technology is helping knowledge workers find relevant information quickly and easily. Learn about how enterprise search has positively impacted the content management applications market. 
(EGUIDE) READ ABSTRACT |

Case Study: Northern Trust Turns To Google For More Accurate and Relevant Search by Google Search Appliance

November 2010 - (Free Research)
In order to ensure regulatory compliance, Northern Trust's IT department needed a better tool to help employees quickly find the latest forms and information. Using the Google Search Appliance, OneBox and User-Added Results, Northern Trust increased both the accuracy and relevance of all intranet searches. Read this case study. 
(CASE STUDY) READ ABSTRACT |

Scaling Strategies for Mission-Critical Search Applications by Vivisimo, Inc.

January 2010 - (Free Research)
This paper will discuss scaling strategies for building flexible, high performance and high availability solutions for mission-critical search applications that will be able to handle the sheer amount of data while securely crawling and indexing all data repositories. 
(WHITE PAPER) READ ABSTRACT |

Expanding Information Access Initiatives with Embedded Enterprise Search by Vivisimo, Inc.

December 2009 - (Free Research)
This paper focuses specifically on what application developers—specifically, ISVs and solution integrators—need to do in order to satiate this emerging market demand. Read on to learn some of Vivisimo's capabilities and how ISVs and solution integrators can leverage them to address evolving search challenges within their respective applications. 
(WHITE PAPER) READ ABSTRACT |

Using Social Search to Drive Innovation through Collaboration by Vivisimo, Inc.

December 2009 - (Free Research)
This paper, will try to help you strike a balance between solid business thinking and explosive enthusiasm for any new technology option with 2.0 in the description. Our goal is to give you a new way of looking at old challenges. 
(WHITE PAPER) READ ABSTRACT |

8 Problems of Keyword Search in E-Discovery - A Guide for Fortune 1000 Companies by FTI Technology

December 2009 - (Free Research)
With data collections growing at an epic pace, legal teams must sift quickly through documents and e-mail at rates that would have seemed unrealistic just 5 years ago. Simply put, keyword search strategies break when thrown against the mountains of data which define today’s legal matters. 
(WHITE PAPER) READ ABSTRACT |

8 Problems of Keyword Search in E-Discovery – A Guide for Fortune 1000 Companies by FTI Technology

November 2009 - (Free Research)
In this paper – first in a three part series - we will examine the difficulties of working with keywords during a matter, the many challenges associated with relying on keyword search, and the cost and risk associated with attempting to “guess” one’s way to a relevant document set. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 467 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts