BeyeNETWORK business intelligence and data warehousing resources

Research Library

IT Management  >  Systems Operations  >  
Data Security
MORE SPECIFIC TOPICS:  Customer Privacy |  Data Destruction |  Data Encryption |  Data Loss Prevention (DLP)
SEE: Related Topics

 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:

1 - 15 of 1981 Matches
sponsored by Webroot

WHITE PAPER - These performance results show testing of 8 compteting security software products and breaks down how each perform in relation to a wide variety of criteria.
Posted: April 18, 2014 | Published: February 28, 2014

Get This Now
Topics:  Data Security | Endpoint Security | Security Infrastructure | Security Software | Windows 7 | Windows Security

Webroot


sponsored by Webroot

CASE STUDY - This brief case study shows how one organization deployed a standardized single endpoint security solution and saw improved efficiency and performance.
Posted: April 18, 2014 | Published: February 28, 2014

Get This Now
Topics:  Data Security | Endpoint Security | Malware | Security Infrastructure | Security Threats | Virus Protection

Webroot


sponsored by PHD Virtual

SOFTWARE DOWNLOAD - This free trial provides PHD Virtual Backup for Hyper-V, an easy to use, flexible and affordable offsite backup and archiving solution.
Posted: April 18, 2014 | Premiered: April 18, 2014

Get This Now
Topics:  Backup Software | Backups | Data Security | Data Storage | Security Threats | Virtualization Security

PHD Virtual


sponsored by IBM

WHITE PAPER - This technical paper explores the best practices of database mirroring, which allows for a failover or recovery strategy as an economical approach to availability.
Posted: April 18, 2014 | Published: April 30, 2013

Get This Now
Topics:  Data Management | Data Mirroring | Data Security | Database Management | Databases | Solid State Disks | Solid State Storage

IBM


sponsored by PHD Virtual

SOFTWARE DEMO - This software trial download provides a fully functional enterprise data protection solution, featuring automated scheduling, forever incremental backups, global deduplication, instant recovery, archiving and more.
Posted: April 18, 2014 | Premiered: April 18, 2014

Get This Now
Topics:  Backup Software | Backups | Data Deduplication | Data Recovery | Data Replication | Data Security | Data Storage | Storage Security

PHD Virtual


sponsored by IntraLinks, Inc

WHITE PAPER - This white paper explains the latest global government efforts in enforcing stronger data privacy laws. Click now to uncover 6 data protection recommendations to help you mitigate the risks of information sharing and prevent regulatory and market sanctions.
Posted: April 18, 2014 | Published: December 31, 2013

Get This Now
Topics:  Compliance (Systems Operations) | Data Security | Laws | Privacy Rights | Risk Management | Security | Security Best Practices | Security Management | Security Managers | Security Policies

IntraLinks, Inc


sponsored by Sophos, Inc.

WHITE PAPER - This white paper offers 3 key questions to ask an encryption vendor to help you find a tool that best fits your business needs.
Posted: April 18, 2014 | Published: April 18, 2014

Get This Now
Topics:  Cloud Computing | Cloud Security | Data Security | Encryption Standards | Endpoint Security | Mobile Workers | Risk Management | Security | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Spending | Security Systems

Sophos, Inc.


sponsored by Apptix

WHITE PAPER - This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: April 18, 2014 | Published: December 31, 2013

Get This Now
Topics:  Cloud Computing | Data Security | Email | Email Encryption | Email Encryption Software | Email Security | Email Security Policies | Email Security Services | Risk Management | Security | Security Management | Security Managers | Security Policies | Security Spending

Apptix


sponsored by SIOS Technology Corp

WHITE PAPER - Take a look at this resource to uncover 5 DR and HA in cloud deployment myths, so you can reduce the risk of downtime and data loss, and save big bucks.
Posted: April 18, 2014 | Published: April 18, 2014

Get This Now
Topics:  Cloud Computing | Cloud Disaster Recovery | Data Recovery | Data Replication | Data Security | Disaster Planning | Disaster Recovery | Downtime | Oracle (Product) | SAP (Product) | SQL | SQL Server

SIOS Technology Corp


sponsored by Bull

CASE STUDY - This case study tells how one Belgian hospital group implemented a converged infrastructure and saw benefits in terms of productivity, efficiency and security
Posted: April 17, 2014 | Published: April 17, 2014

Get This Now
Topics:  Converged Networks | Data Integration | Data Management | Data Security | Health Care Industry | Health Care Networking | Infrastructure Management | Infrastructure Services | Network Infrastructure | Networking

Bull


sponsored by Exterro

WHITE PAPER - This white paper delves into the e-discovery challenges faced by today's enterprises and provides practical steps for applying a "facts first" approach that both exceeds court expectations and reduces discovery costs.
Posted: April 17, 2014 | Published: December 31, 2013

Get This Now
Topics:  Business Intelligence | Compliance (Systems Operations) | Compliance Audits | Compliance Best Practices | Data Security | Risk Management

Exterro


sponsored by IntraLinks, Inc

WHITE PAPER - This resource reveals best practices on how to protect intellectual property, especially from the U.S. National Security Agency (NSA) and other government actors, who have the power to exploit critical data.
Posted: April 17, 2014 | Published: April 17, 2014

Get This Now
Topics:  Customer Privacy | Data Security | Information Security | Privacy Rights | Risk Management | Security | Security Best Practices | Security Management | Security Managers | Security Threats

IntraLinks, Inc


sponsored by IntraLinks, Inc

WHITE PAPER - This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Posted: April 17, 2014 | Published: April 17, 2014

Get This Now
Topics:  Cloud Computing | Cloud Security | Data Security | Laws | Risk Management | Security | Security Audits | Security Management | Security Managers | Security Policies

IntraLinks, Inc


sponsored by TigerText, Inc.

WHITE PAPER - In this white paper, explore 8 valuable recommendations on how to develop a secure text messaging policy to ensure data security and compliance.
Posted: April 17, 2014 | Published: December 31, 2013

Get This Now
Topics:  Compliance (Systems Operations) | Data Security | EHR (Electronic Health Records) | Health Care Compliance | Health Care Industry | Health Care Security | HIPAA | Messaging Middleware | Messaging Security | Mobile Workers | Risk Management | Security | Security Best Practices | Security Management | Security Managers | Security Policies

TigerText, Inc.


sponsored by RSA, The Security Division of EMC

ANALYST REPORT - This Ponemon Institute report sheds light on your organization's level of complexity and how to best reduce it for an effective, yet easy-to-manage identity and access management (IAM) program.
Posted: April 17, 2014 | Published: August 31, 2013

Get This Now
Topics:  Access Control | Cloud Computing | Compliance (Systems Operations) | Data Security | Identity Management | Risk Management | Security | Security Best Practices | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Systems | Vulnerability Management

RSA, The Security Division of EMC


1 - 15 of 1981 Matches


Partner with Us
Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other
What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics |
Business Intelligence Network Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com