BeyeNETWORK business intelligence and data warehousing resources

Research Library

IT Management  >  Systems Operations  >  
Data Security
MORE SPECIFIC TOPICS:  Customer Privacy |  Data Destruction |  Data Encryption |  Data Loss Prevention (DLP)
SEE: Related Topics

 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:

1 - 15 of 2201 Matches
sponsored by BlackBerry

WHITE PAPER - This white paper explains how mobile device containerization technologies vary on a wide scale, and can significantly impact the effectiveness of enterprise mobility management (EMM).
Posted: July 25, 2014 | Published: July 25, 2014

Get This Now
Topics:  Application Deployment | Data Loss Prevention (DLP) | Data Security | Enterprise | Mobile Device Management | Risk Management | Security | Security Management | TCO | Virtualization Security | Vulnerability Management

BlackBerry


sponsored by Fortinet, Inc.

WHITE PAPER - Uncover the key features of an industry-leading, next-gen firewall option.
Posted: July 25, 2014 | Published: July 25, 2014

Get This Now
Topics:  Data Security | Firewall Appliances | Firewall Management | Network Management | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Security

Fortinet, Inc.


sponsored by BlackBerry

WHITE PAPER - View this white paper to explore how mobile apps are improving productivity and collaboration across the enterprise, discover options for mobile development tools, and compare native, web-based, and hybrid options. Plus, learn the three most important factors to consider in order to get the most value from mobile apps.
Posted: July 24, 2014 | Published: July 24, 2014

Get This Now
Topics:  Application Development | Application Life-Cycle Management | Application Security | Data Security | Mobile Device Management | Mobile Workers

BlackBerry


sponsored by BlackBerry

WHITE PAPER - Discover how to stay HIPAA compliant even with mobile devices. Read on to learn about the government's relationship with healthcare providers, as well as insight for securing devices to protect sensitive data.
Posted: July 24, 2014 | Published: July 24, 2014

Get This Now
Topics:  Compliance (Systems Operations) | Data Loss Prevention (DLP) | Data Security | Health Care Compliance | Health Care Industry | Health Care Security | HIPAA

BlackBerry


sponsored by IBM

CASE STUDY - Read this case study to find out how RailCom, a versatile professional telematics specialist in the Netherlands, switched their field technicians to smartphones with ease using a flexible, cloud-based mobile solution.
Posted: July 24, 2014 | Published: July 24, 2014

Get This Now
Topics:  Data Management | Data Security | Mobile Device Management | Mobile Workers | Smart Phones

IBM


sponsored by IBM

WHITE PAPER - To serve your enterprise well, data must be scaled with fewer resources and managed with speed and continuity. Read this white paper to compare storage platforms and their benefits so you can find a solution that can expand cost-effectively, respond quickly, and doesn't require additional training.
Posted: July 24, 2014 | Published: April 30, 2014

Get This Now
Topics:  Data Center Management | Data Management | Data Security | Data Storage | Structured Data | Unstructured Data

IBM


sponsored by HID

WHITE PAPER - Discover a threat detection service that uses revolutionary identification technology to protect against fraud and data breaches.  Read on to find out how it works in combating threats and the benefits of implementing a detection service.
Posted: July 24, 2014 | Published: May 3, 2013

Get This Now
Topics:  Access Control | Data Management | Data Security | Fraud Protection | Identity Management | Malware | Security | Security Threats

HID


sponsored by Amazon Web Services

WHITE PAPER - This informative guide offers 3 different models for how encryption keys are managed and where they are used. Read on to learn about the different methods for encrypting your data at rest in AWS today.
Posted: July 23, 2014 | Published: November 30, 2013

Get This Now
Topics:  Amazon Web Services | Cloud Computing | Cloud Security | Data Encryption | Data Encryption Standard | Data Governance | Data Security | Encryption Standards


sponsored by AlienVault

WHITE PAPER - This report contains data collected by SANS regarding the successes and challenges that colleges and universities experience in protecting their environments from threats, and also provides advice for security professionals working in these environments to improve their tactics in this critical area.
Posted: July 23, 2014 | Published: June 30, 2014

Get This Now
Topics:  Data Loss Prevention (DLP) | Data Security | Education Industry | IT Best Practices | IT Departments | IT Industry | IT Management | IT Managers | IT Spending | Risk Management | Securities Industry | Security | Security Best Practices | Security Industry | Security Management | Security Managers | Security Spending | Security Threats | Vulnerability Management

AlienVault


sponsored by AlienVault

WEBCAST - This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Posted: July 23, 2014 | Premiered: July 23, 2014

Get This Now
Topics:  Data Loss Prevention (DLP) | Data Security | Malware | Risk Management | Security | Security Best Practices | Security Management | Security Managers | Security Systems | Security Threats | Virus Detection Software | Virus Protection | Vulnerability Management

AlienVault


sponsored by Idera

SOFTWARE DOWNLOAD - Learn about the key features of SQL Safe Backup – and find out how you can gain access to a free trial.
Posted: July 22, 2014 | Premiered: July 22, 2014

Get This Now
Topics:  Backup Software | Backups | Data Management | Data Security | Database Management | Database Security | Disaster Recovery | Software | SQL | SQL Server

Idera


sponsored by CDW Corporation

VIDEO - This helpful video provides an overview of advanced persistent threats (APTs) and identifies several best practices that organizations should keep in mind to identify vulnerabilities and enforce stronger security policies.
Posted: July 22, 2014 | Premiered: May 21, 2014

Get This Now
Topics:  Data Loss Prevention (DLP) | Data Security | IT Best Practices | Risk Management | Securities Industry | Security | Security Best Practices | Security Industry | Security Management | Security Managers | Security Policies | Security Threats | Vulnerability Management

CDW Corporation


sponsored by CDW Corporation

WHITE PAPER - This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Posted: July 22, 2014 | Published: March 5, 2014

Get This Now
Topics:  Data Loss Prevention (DLP) | Data Security | IT Best Practices | IT Departments | IT Management | IT Managers | Malware | Phishing | Risk Management | Securities Industry | Security | Security Best Practices | Security Industry | Security Management | Security Managers | Security Policies | Security Spending | Security Threats | Spam | Spyware | Vulnerability Assessments | Vulnerability Management

CDW Corporation


sponsored by Acronis

WHITE PAPER - This solution brief highlights the challenges organizations feel in the face of IT consumerization and BYOD trends. It also mentions one solution that improves the productivity of mobile file sharing without sacrificing security or compliance.
Posted: July 21, 2014 | Published: March 31, 2014

Get This Now
Topics:  Compliance Best Practices | Data Security | File Sharing Protocols | Mobile Device Management | Mobile Device Management Software | Regulatory Compliance

Acronis


sponsored by Idera

WHITE PAPER - This white paper reveals the 5 unforgivable mistakes that could endanger the integrity, recoverability and security of the databases, including SQL Server, DMAs are supposed to protect.
Posted: July 21, 2014 | Published: July 21, 2014

Get This Now
Topics:  Backups | Data Security | Database Administrators | Database Management | Database Security | Databases | Security | SQL | SQL Server

Idera


1 - 15 of 2201 Matches


Partner with Us
Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other
What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics |
Business Intelligence Network Research Library Copyright © 1998-2014 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com