Terms Data Privacy AndWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Terms Data Privacy And returned the following results.
RSS What is RSS?
Related Categories

 •   Enterprise Data Protection and Privacy
 •   Data Security
 •   Storage Management
 •   Virtualization
 •   Backup Systems and Services
 •   Network Security
 •   Security Monitoring
 •   Data Center Management
 •   Storage Security
 •   Security Policies

Related Searches
 •   Company Terms
 •   Development Terms
 •   Measurement Of Terms Data Privacy
 •   Terms Data Assessment
 •   Terms Data Manual
 •   Terms Data Papers
 •   Terms Design
 •   Terms Function
 •   Terms Mapping
 •   Terms Providers
Advertisement

ALL RESULTS
1 - 25 of 443 | Next Page

Featured Sponsors

Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Simplifying the Management of Tier 1 ERP Systems for Mid-Sized Companies by Oracle Corporation

May 04, 2009 - (Free Research)
This white paper will discuss the impact of Tier 1 systems on IT departments in terms of ongoing maintenance, demonstrating that Tier 1 systems make many IT tasks easier, ranging from new-report generation to user training to upgrade management. 
(WHITE PAPER) READ ABSTRACT |

Oracle Business Brief: Controlling Costs with Flexible Processes by Oracle Corporation

February 24, 2009 - (Free Research)
Read this business brief to learn how your growing business can: lower costs by enabling process flexibility, improve process flexibility by cutting costs, use process flexibility to control costs across your entire organization, and to continuously keep your costs under control. 
(WHITE PAPER) READ ABSTRACT |

The Massachusetts Data Protection Law by SearchSecurity.com & SearchCompliance.com

June 18, 2009 - (Free Research)
Massachusetts businesses facing down MA 201 CMR 17.00 can meet the challenge with preparation and execution. Read this e-book to learn more about important topics such as identity theft, data breach prevention, mandatory encryption, and getting ahead of the game where Massachusetts data protection law is concerned. 
(EBOOK) READ ABSTRACT |

The SMB Cloud Atlas by SearchCIO.com

August 07, 2013 - (Free Research)
Access this expert resource to find out CIOs are reaping the benefits of cloud computing while still ensuring security, privacy and cost are appropriately managed. 
(EBOOK) READ ABSTRACT |

The Human Face of Big Data: Data Driven by ComputerWeekly.com

January 18, 2013 - (Free Research)
Software engineers are transforming the daily lives of hundreds of millions of people for good and for ill, writes Jonathan Harris. 
(BOOK) READ ABSTRACT |

How Tiered Storage Slashes Your TCO by Oracle Corporation UK Ltd

February 01, 2011 - (Free Research)
In this paper you will learn some of the critical ways in which tiered storage solutions enable organizations to cut their total cost of storage and improve their long-term total cost of ownership. 
(WHITE PAPER) READ ABSTRACT |

Got Files? Get Cloud! by F5 Networks

August 12, 2011 - (Free Research)
This paper examines the challenges that arise as more storage is consumed for file-type data and as new policies for the long-term retention of file-type data emerge. It also discusses the most visible challenges revolving around controlling the costs associated with data migrations, tiering to the cloud, and more. 
(WHITE PAPER) READ ABSTRACT |

Spam 2011: Protection Against Evolving Threats by Proofpoint, Inc.

March 09, 2011 - (Free Research)
The very best anti-spam solutions today de­liver 95% effectiveness. Unfortunately, that’s not good enough. Check out this white paper to see how enterprises can defend themselves with a comprehensive and adaptive anti-spam solution such as the Proofpoint Protection Suite. 
(WHITE PAPER) READ ABSTRACT |

Discover information integration and governance in your organization by IBM

May 05, 2011 - (Free Research)
In this presentation transcript, Ron Powell will provide an overview of the information integration and governance theme and discuss the importance of the five topics within that theme: information integration, MDM, data warehousing and analytics, database management and tools, and database security and privacy, and lifecycle management. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Benefits of Consolidating and Virtualizing Microsoft Exchange and SharePoint in a Private Cloud Environment by EMC

February 28, 2013 - (Free Research)
This white paper reveals the benefits of virtual private cloud deployment and how one leading vendor's cloud virtualization technologies support the implementation of secure private cloud deployments of Microsoft Exchange Server and Microsoft SharePoint. 
(WHITE PAPER) READ ABSTRACT |

Oracle’s Optimized Solution for CRM - A Business Case for Secured Siebel CRM on Oracle’s SPARC T-Series by Oracle Corporation

March 16, 2011 - (Free Research)
Data privacy and thefts, contractual terms and compliance requirements are issues that all need to be considered when installing a CRM system. This paper outlines how deploying Siebel CRM on Oracle's SPARC T-Series servers mitigates risk while helping maintain a low total cost of ownership by not requiring more equipment. 
(WHITE PAPER) READ ABSTRACT |

Hitachi Data Systems Object Storage Solutions by Hitachi Data Systems

April 30, 2013 - (Free Research)
This solution profile explores the innovation of object storage designed to address the challenges of fast growing file data, and integrate many key technologies in a single storage platform. Find out how this approach provides a path to short-term return on investment and significant long-term efficiency improvements. 
(WHITE PAPER) READ ABSTRACT |

Tape Storage Systems Continue to Evolve with Long-Term Data Archiving Functionality by Spectra Logic Corporation

May 17, 2012 - (Free Research)
This tutorial will cover the latest developments in tape storage systems and review the major differences between backup software vs. archiving software. The benefits of tape storage systems, including long-term data archiving will also be discussed. 
(EGUIDE) READ ABSTRACT |

Evolving Threats Demand New Approaches To Security by Akamai Technologies

November 28, 2012 - (Free Research)
Consult this white paper for a profile of the evolving cast behind today's advanced threats and find out the key steps you can take to ensure enterprise security – click through to read on. 
(WHITE PAPER) READ ABSTRACT |

Data Mart Consolidation by Hexaware Technologies

September 12, 2011 - (Free Research)
This white paper explores how Data Mart consolidation is an effective tool for saving money when dealing with large volumes of data. 
(WHITE PAPER) READ ABSTRACT |

Debunking APT myths: What it really means and what you can do about it by Websense, Inc.

July 29, 2011 - (Free Research)
This E-Guide defines APT, dispels common myths and explains what you can do about this adversary. Additionally, uncover why the idea of keeping intruders out with traditional, perimeter-based security is useless against APT and how you can best protect against modern security threats. 
(EGUIDE) READ ABSTRACT |

Meeting the True Intent of File Integrity Monitoring by Tripwire, Inc.

October 28, 2010 - (Free Research)
In this paper, we give an overview of FIM, an explanation of how FIM provides data protection and improves security, and what capabilities FIM must offer to effectively provide that data protection and security. 
(WHITE PAPER) READ ABSTRACT |

The CISOs Guide to Measuring IT Security by Lumension

January 12, 2012 - (Free Research)
In this comprehensive white paper, learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat. 
(WHITE PAPER) READ ABSTRACT |

A clearer horizon. Do CIOs have more clarity about cloud computing? by ComputerWeekly.com

December 01, 2011 - (Free Research)
This research from management consultants, Xantus, shows that while there is still a lack of clarity and a reluctance to fully commit to the cloud, there is a general acceptance from CIOs of the benefits and a growing commitment to develop those benefits. 
(IT BRIEFING) READ ABSTRACT |

Mobile location-based services gaining ground by ComputerWeekly.com

November 24, 2010 - (Free Research)
From the turn of the millennium until the end of 2007 MLBS (Mobile Location Based Services) had promised much, but delivered very little in terms of commercial applications. Even in Japan and South Korea, the most advanced markets for commercial MLBS, usage was disappointing. 
(WHITE PAPER) READ ABSTRACT |

Bring Distributed Environments Under Control with Desktop Virtualization by Dell, Inc.

November 18, 2013 - (Free Research)
This resource highlights the fact that IT departments are no longer dealing with one set of PCs all using the same operating system. It also shows how desktop virtualization can be implemented to improve efficiency and security. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Regional Medical Center finds HIPAA-compliant storage by Iron Mountain

February 22, 2012 - (Free Research)
In this case study, discover how one health care provider employed a pay-as-you-go, cloud-based storage model to help them save hundreds of thousands of dollars on their long-term archiving and disaster recovery requirements. 
(CASE STUDY) READ ABSTRACT |

ER/Studio 7.5 by Embarcadero Technologies, Inc.

March 2008 - (Free Research)
Embarcadero® ER/Studio®, an industry-leading data modeling tool, helps companies discover, document, and re-use data assets while providing intuitive reverse engineering, logical modeling, and physical modeling. 
(DEMO) READ ABSTRACT |

Four Things Your Server Could Tell You: McAfee Total Protection for Server - Security and Compliance from a Single Solution by McAfee, Inc.

November 2010 - (Free Research)
For years when people thought about security, it was usually in terms of desktop/laptop anti-virus, or perhaps email and spam filtering. Read this paper to learn about specific vulnerabilities that could affect your server and how McAfee Total Protection for Server can help protect company data and ensure compliance. 
(PRODUCT OVERVIEW) READ ABSTRACT |

Beyond Virtual Tape Libraries: End-to-End Data Protection with Syncsort Disk-to-Disk Solutions by Syncsort

January 2007 - (Free Research)
While VTL data storage has been a popular data protection solution in recent years, the VTL solution may be incomplete for long-term needs. Read this white paper to learn why D2D backup solutions are the ideal data protection technologies for y... 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 443 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts