Retail Data Security UkWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Retail Data Security Uk returned the following results.
RSS What is RSS?
Related Categories

 •   Data Security
 •   Network Security
 •   Enterprise Data Protection and Privacy
 •   Virtualization
 •   Storage Management
 •   Storage Security
 •   Mobile Device Management
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Wireless Technologies and Mobile Computing
 •   Managed Security Services

Related Searches
 •   History Retail
 •   Purchase Retail Data
 •   Related Retail
 •   Retail Data Alabama
 •   Retail Data Practices
 •   Retail Data Templates
 •   Sql Retail Data Security
 •   Support Retail Data
 •   Use Retail Data
 •   White Paper Retail
Advertisement

ALL RESULTS
1 - 25 of 475 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

2009 Annual Study: UK Enterprise Encryption Trends by PGP Corporation

July 25, 2009 - (Free Research)
Read this paper to learn the results of a study that analyzes survey results from 615 UK businesses and IT managers about their current and future needs, motivations, uses, budgets, and strategies for enterprise data protection. 
(ANALYST REPORT) READ ABSTRACT |

Podcast: Automating Access Certification in Just 17 Days by Aveksa

August 10, 2012 - (Free Research)
This podcast describes why one of your peers implemented a particular IAM solution to automate their certification process and also offers best practices that will help you as you start your own IAM program. 
(PODCAST) READ ABSTRACT |

Presentation Transcript: Automating Access Certification in Just 17 Days by Aveksa

August 10, 2012 - (Free Research)
This presentation transcript describes the benefits one of your peers enjoyed after implementing a particular IAM solution which helped them automate their certification process. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with Netcordia's NetMRI by Netcordia

October 2008 - (Free Research)
This paper describes the ways that Netcordia's NetMRI can help you quickly achieve and maintain PCI DSS compliance across your network. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Helix Energy Solutions Replicates Data and Content to Geo-Distributed SharePoint Farms & Sea Vessels with DocAve by AvePoint, Inc.

August 2011 - (Free Research)
This case study covers how Helix Energy Solutions, an offshore energy production service firm, leveraged DocAve to replicate data to globally distributed SharePoint server farms and ships at sea. 
(CASE STUDY) READ ABSTRACT |

Expert Ebook: Mastering PCI by Information Security Magazine Sponsored by: Breach, Cisco, Fiberlink, Rapid7, Sentrigo, Solidcore, Thawte, Tripwire, and Utimaco

August 2008 - (Free Research)
This eBook gives expert advice on successfully achieving PCI compliance, by selecting the right auditor and implementing new requirements into your company's IT infrastructure. Read this book and learn how to master PCI compliance. 
(BOOK) READ ABSTRACT |

Computer Weekly - 22 May 2012: Why Tesco is spending £150m online by ComputerWeekly.com

May 2012 - (Free Research)
This week’s Computer Weekly, we talk exclusively to Tesco CIO Mike McNamara about why the UK's biggest retailer is spending £150m on its online business. And, with the London 2012 Olympics only weeks away; we look at how IT testing is progressing. 
(EZINE) READ ABSTRACT |

Computer Weekly 20 September 2011: Download the new issue of the UK's leading technology publication, featuring in-depth analysis of the latest IT news and technology trends by ComputerWeekly.com

September 2011 - (Free Research)
In this week's Computer Weekly, we examine what reform of the UK's banks will mean for financial services IT strategies. We also look at the problems of software licensing when moving to desktop virtualisation, discuss how to make sense of cloud computing, and provide part three of our guide to business intelligence. Download the new issue now. 
(EZINE)

How retailers can manage customer data collection to decrease fraud by SonicWALL

March 2011 - (Free Research)
This expert Q & A session explores the challenges retailers face as they increase data collection to combat fraudulent returns and policy abuse in today’s struggling economy. Find strategic advice on how retailers can cut down on fraud and determine the necessary tools and processes that must be in place to protect customer identities. 
(EGUIDE) READ ABSTRACT |

Mobile, Social Engineering Top Data Security Management Concerns by Thawte Inc.

November 2013 - (Free Research)
This e-guide, from SearchCIO.com, explores how to set up the right policies in order to successfully eliminate mobile, social engineering and data security management concerns. 
(EGUIDE) READ ABSTRACT |

CORE Security and the Payment Card Industry Data Security Standard by Core Security Technologies

October 2013 - (Free Research)
This informative resource explores a security testing method that ensures PCI DSS validation and compliance to keep payment cardholder data protected from cybercrime at all times. 
(WHITE PAPER) READ ABSTRACT |

Achieving Network Payment Card Industry Data Security Standard (PCI DSS) Compliance with Netcordia's NetMRI by Netcordia

July 2009 - (Free Research)
Many network monitoring products are easy to install and give you basic tools for managing your network, but achieving and maintaining compliance with the latest version of the PCI DSS requires a network solution that can manage unprecedented levels of change and complexity. Read this whitepaper to learn more about one such solution. 
(WHITE PAPER) READ ABSTRACT |

Thawte in Education by Thawte Inc.

September 2013 - (Free Research)
Access this white paper to discover a number of trends accelerating the urgency of deploying SSL across distributed campuses and how this approach can ensure safety and security in higher educational networks. 
(WHITE PAPER) READ ABSTRACT |

Computer Weekly - 28 February 2012: Taking UK government into the cloud by ComputerWeekly.com

February 2012 - (Free Research)
This week's edition asks, now that the the G-Cloud store is up and running, will the government's cloudstore transform the market for public sector IT buyers and suppliers? It also examines research that has indicated OS upgrades will attract a significant chunk of investment this year. 
(EZINE)

Computer Weekly - 31 January 2012: The importance of IT strategy by ComputerWeekly.com

January 2012 - (Free Research)
In this week’s Computer Weekly, we look at the importance of IT strategy when budgets are under pressure. The first part of our Buyer’s Guide to virtualisation examines the barriers preventing many organisations from adopting the technology; and Transport for London’s CIO talks about how IT helps avoid Olympic travel chaos. Download the issue now. 
(EZINE)

Best Practices to Protect the Cardholder Data Environment and Achieve PCI Compliance by Rapid7

July 2012 - (Free Research)
Cyber-attacks that target customer and financial information are becoming more popular and businesses need to protect their data. Prevent attackers from taking advantage of the gaps in your security plan by creating a comprehensive information security policy. 
(WHITE PAPER) READ ABSTRACT |

10 Tips for Managing Security in the Cloud by Dell, Inc. and Intel®

November 2011 - (Free Research)
With the cloud’s dynamic nature, IT professionals are often wary about how effective data security is in this type of environment. This white paper outlines the top 10 considerations to keep in mind when managing security in the cloud to ensure your business is protected. 
(WHITE PAPER) READ ABSTRACT |

Dell Asset Recovery Services by Dell, Inc. and Intel®

October 2009 - (Free Research)
To protect your company's assets and reputation, Dell's Asset Recovery Services help ensure that sensitive information does not fall into the wrong hands while also promoting environmental stewardship through our efforts to achieve zero-landfill and zero-export policies. 
(DATA SHEET) READ ABSTRACT |

A Planner's Realistic Guide to Cloud Data Security by Dell, Inc. and Intel®

March 2014 - (Free Research)
This expert e-guide will walk you through the creation of a safe and secure cloud environment. 
(EGUIDE) READ ABSTRACT |

Ensure Data Protection with Sun StorageTek T10000B Tape Drives by Sun StorageTek

October 2008 - (Free Research)
Learn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements. 
(VIDEOCAST) READ ABSTRACT |

Seagate NAS - What's Driving Data Security and Remote Access Inside by Seagate Technology

February 2014 - (Free Research)
Check out this brief, 1-page resource that delivers a NAS solution that provides simple, scalable and cost-effective ways to store and serve files securely over the network. 
(WHITE PAPER) READ ABSTRACT |

Financial Services Report: Reshaping ICT, Reshaping Business by ComputerWeekly.com

November 2012 - (Free Research)
This report from Fujtsu assesses the IT trends and prioirties in the financial services industry. 
(IT BRIEFING) READ ABSTRACT |

Presentation Transcript: Mobile Strategies, Part 1: Harnessing the IT Consumerization Deluge by Dell, Inc. and Intel®

January 2012 - (Free Research)
This presentation transcript reveals key findings from a recent consumerisation poll and provides recommendations and best practices to help organisations address these key topics. Obtain predictions for the future of the media tablet market and gain insight into five trends that are shaping the consumerisation landscape. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Shouldn't Single Sign-on Be Child's Play? by Microsoft & Quest Software

October 2008 - (Free Research)
Check out this webcast and learn how your company can improve network efficiency, enhance security, and achieve compliance by integrating Single Sign-On (SSO) technology into the IT infrastructure. 
(WEBCAST) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 475 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts