Retail Data Security ExpertWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Retail Data Security Expert returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Security Policies
 •   Application Security
 •   Endpoint Security
 •   Enterprise Data Protection and Privacy
 •   Virtualization
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Storage Security
 •   Wireless Security

Related Searches
 •   Export Retail
 •   Industries Retail Data
 •   Intranet Retail
 •   Knowledge Retail Data
 •   Maintain Retail
 •   Plans Retail Data
 •   Retail Data Security Application
 •   Retail Data Security Support
 •   Retail Data Security Usa
 •   Solution Retail Data
Advertisement

ALL RESULTS
1 - 25 of 465 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

How retailers can manage customer data collection to decrease fraud by SonicWALL

March 07, 2011 - (Free Research)
This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities. 
(EGUIDE) READ ABSTRACT |

Advanced Virtualization E-book - Chapter 5: Avoid Security Holes in the Virtual Data Center by SearchServerVirtualization

April 29, 2010 - (Free Research)
In Chapter 5 of the Advanced Virtualization e-book, security experts Danielle Ruest and Nelson Ruest explain how to identify, map out and prevent some of the most common resource pool threats. The authors also debunk five common security misconceptions of server virtualization. 
(EBOOK) READ ABSTRACT |

Expert Ebook: Mastering PCI by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

August 20, 2008 - (Free Research)
This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance. 
(BOOK) READ ABSTRACT |

Addressing Outlook Security Concerns and Preparing Mobile Users for an Exchange Migration by Thawte Inc.

May 19, 2011 - (Free Research)
Users enticed by the ability to check email at a glance increasingly log onto Exchange 2010 remotely and cause new security risks. This expert e-guide from SearchExchange.com explains how to address these Outlook security concerns by creating a buffer zone between your internal network and the Internet. 
(EGUIDE) READ ABSTRACT |

How to Secure Your Microsoft SharePoint Products by Thawte Inc.

May 22, 2013 - (Free Research)
This e-guide from our experts at searchEnterpriseDesktop.com will help you understand what it takes to make sure SharePoint is secure. Read on to discover a quick checklist you can use to keep security priorities in order. 
(EGUIDE) READ ABSTRACT |

SSL Certificate Management: Common Mistakes and How to Avoid Them by Thawte Inc.

February 04, 2013 - (Free Research)
Explore the common challenges associated with manual SSL certificate management and uncover how you can avoid these costly mistakes. 
(EGUIDE) READ ABSTRACT |

The Future for VMware's vStorage APIs for Data Protection Looks Promising: Presentation Transcript by HP

October 04, 2011 - (Free Research)
Conventional, agent-based, file-level techniques for virtual machine backup could cause problems -- most notably resource contention, which could compromise the performance of all virtual machines running on an ESX or ESXi host. Read this expert presentation transcript to learn more. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

SharePoint Security Should Not Be an Afterthought by Thawte Inc.

May 20, 2013 - (Free Research)
This expert guide from SearchSecurity.com will help you understand the top security issues facing SharePoint and how to ensure that you are deploying this system securely. Read on to learn more. 
(EGUIDE) READ ABSTRACT |

Securing SharePoint: SharePoint Security Best Practices by Thawte Inc.

May 16, 2013 - (Free Research)
This expert e-guide reveals must-see best practices for effectively securing your Microsoft SharePoint environment. Inside, learn how you can navigate tricky SharePoint security issues, including access control, security testing, policy and training, and more. 
(EGUIDE) READ ABSTRACT |

How to Comply with the HIPAA Security Rule by Thawte Inc.

July 17, 2013 - (Free Research)
In this expert guide from SearchHealthIT.com, find out how to comply appropriately with the HIPAA compliance regulations to ensure that your organization doesn't run into unexpected and unneeded complications. 
(EGUIDE) READ ABSTRACT |

IT Handbook: VM Automation in the Private Cloud - Enforcing Policies to Meet Compliance and Security by OnX USA LLC

September 07, 2011 - (Free Research)
To ensure your enterprise meets compliance and security standards for external audits, your security settings must be properly configured. This is even more important in the private cloud, which introduces a wealth of new security threats. 
(EBOOK)

Successful Backup & Recovery—Key Metrics and Goals to Achieve by Asigra

June 28, 2013 - (Free Research)
This expert guide from SearchDisasterRecovery.com explores the measures and management tactics for data protection success, particularly if you're using cloud backup services as part of your strategy. 
(EGUIDE) READ ABSTRACT |

The Tangled Web of Data Privacy Issues by Thawte Inc.

November 18, 2013 - (Free Research)
In this expert e-guide from SearchCIO.com, discover how IT executives are handling data privacy issues on the web. Also, learn how public-sectors CIOs are hiring in the changing IT workforce, the future of cloud, what exactly users are up to on the web and more. 
(EGUIDE) READ ABSTRACT |

Presentation Transcript: Changing the Rules of Backup and Disaster Recovery by FalconStor Software

April 07, 2009 - (Free Research)
Join Independent Backup Expert W. Curtis Preston and Falconstor's Product Marketing Manager Peter Eichers as they explore common data protection challenges and what technologies can be used to address them. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Evolve your Endpoint Security Strategy Past Antivirus and into the Cloud by SearchSecurity.com

October 18, 2013 - (Free Research)
In this expert e-guide, you will gain insight into an endpoint security strategy that looks beyond antivirus and the key functions that are missing in many cloud-based endpoint security services. Read the e-guide and discover how to evolve your endpoint strategy. 
(EGUIDE) READ ABSTRACT |

Computer Weekly - 22 May 2012: Why Tesco is spending £150m online by ComputerWeekly.com

May 22, 2012 - (Free Research)
This week’s Computer Weekly, we talk exclusively to Tesco CIO Mike McNamara about why the UK's biggest retailer is spending £150m on its online business. And, with the London 2012 Olympics only weeks away; we look at how IT testing is progressing. 
(EZINE) READ ABSTRACT |

Choose Your Own Device (CYOD) Workshop by Insight

March 31, 2013 - (Free Research)
Read on to learn about a CYOD workshop that can help you understand and develop a winning CYOD strategy with help from industry experts. Find out how taking advantage of this valuable learning experience will help you get a good grasp on policies and compliance, device lifecycles, device management, and more. 
(WHITE PAPER) READ ABSTRACT |

Network Evolution E-Zine: Network security in a world of mobile workers by SearchNetworking.com

March 29, 2012 - (Free Research)
In the April edition of SearchNetworking.com’s Network Evolution E-Zine, we explore how VDI is solving many BYOD challenges and provide examples of how this strategy has seen success within industries including retail, healthcare and finance. 
(EZINE) READ ABSTRACT |

Enabling Compliance with the PCI Data Security Standards by Vormetric

January 2007 - (Free Research)
Data Encryption Expert fills the gaps in your data protection efforts as an affordable and easy to implement solution to difficult compliance requirements like encryption, access control, host protection and auditing. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly 20 September 2011: Download the new issue of the UK's leading technology publication, featuring in-depth analysis of the latest IT news and technology trends by ComputerWeekly.com

September 2011 - (Free Research)
In this week's Computer Weekly, we examine what reform of the UK's banks will mean for financial services IT strategies. We also look at the problems of software licensing when moving to desktop virtualisation, discuss how to make sense of cloud computing, and provide part three of our guide to business intelligence. Download the new issue now. 
(EZINE)

Ensure Data Protection with Sun StorageTek T10000B Tape Drives by Sun StorageTek

October 2008 - (Free Research)
Learn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements. 
(VIDEOCAST) READ ABSTRACT |

Expert eBook: Encryption: Properly Securing Your Valuable Data by Information Security Magazine

October 2008 - (Free Research)
Check out this expert eBook and learn about best practices and techniques for protecting your company's data with encryption technology. 
(WHITE PAPER) READ ABSTRACT |

Mobile, Social Engineering Top Data Security Management Concerns by Thawte Inc.

November 2013 - (Free Research)
This e-guide, from SearchCIO.com, explores how to set up the right policies in order to successfully eliminate mobile, social engineering and data security management concerns. 
(EGUIDE) READ ABSTRACT |

CORE Security and the Payment Card Industry Data Security Standard by Core Security Technologies

October 2013 - (Free Research)
This informative resource explores a security testing method that ensures PCI DSS validation and compliance to keep payment cardholder data protected from cybercrime at all times. 
(WHITE PAPER) READ ABSTRACT |

PCI DSS 3.0: The Expert's Guide to the New Guidance by SearchSecurity.com

January 2014 - (Free Research)
This SearchSecurity.com Editorial TechGuide gives an overview of the major changes with PCI DSS 3.0, outlines where procedures and policies remain unclear, and closes with a practical list of the top five ways this new standard affects merchants. 
(EGUIDE) READ ABSTRACT |

1 - 25 of 465 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts