Data Security White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
IT Management  >  Systems Operations  >  

Data Security

MORE SPECIFIC TOPICS:  Customer Privacy |  Data Destruction |  Data Encryption |  Data Loss Prevention (DLP)
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 2188 Matches
ActivID® Threat Detection Service
sponsored by HID
White Paper: | Posted: 24 Jul 2014
Published:03 May 2013
Summary:Discover a threat detection service that uses revolutionary identification technology to protect against fraud and data breaches.  Read on to find out how it works in combating threats and the benefits of implementing a detection service.
Get This Now
HID

Securing Data at Rest with Encryption
sponsored by Amazon Web Services
White Paper: | Posted: 23 Jul 2014
Published:30 Nov 2013
Summary:This informative guide offers 3 different models for how encryption keys are managed and where they are used. Read on to learn about the different methods for encrypting your data at rest in AWS today.
Get This Now

Survey: Can Security in Higher Education Be Both Open and Secure?
sponsored by AlienVault
White Paper: | Posted: 23 Jul 2014
Published:30 Jun 2014
Summary:This report contains data collected by SANS regarding the successes and challenges that colleges and universities experience in protecting their environments from threats, and also provides advice for security professionals working in these environments to improve their tactics in this critical area.
Get This Now
AlienVault

Live Demo: How to Detect a Cryptolocker Infection - Vendor Webcast
sponsored by AlienVault
Webcast: | Posted: 23 Jul 2014
Premiered:Jul 23, 2014
Summary:This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Get This Now
AlienVault

Download a Free Trial of SQL Safe Backup
sponsored by Idera
Software Download: | Posted: 22 Jul 2014
Premiered:22 Jul 2014
Summary:Learn about the key features of SQL Safe Backup – and find out how you can gain access to a free trial.
Get This Now
Idera

Protecting Organizations Against Advanced Persistent Threats
sponsored by CDW Corporation
Video: | Posted: 22 Jul 2014
Premiered:21 May 2014
Summary:This helpful video provides an overview of advanced persistent threats (APTs) and identifies several best practices that organizations should keep in mind to identify vulnerabilities and enforce stronger security policies.
Get This Now
CDW Corporation

Combatting APTs with a Defense-in-Depth Security Approach
sponsored by CDW Corporation
White Paper: | Posted: 22 Jul 2014
Published:05 Mar 2014
Summary:This informative white paper contains critical information on why a defense-in-depth security approach has proven effective in protecting organizations' sensitive data from APTs.
Get This Now
CDW Corporation

Mobile File Sharing: Balancing Productivity, Security, and Control
sponsored by Acronis
White Paper: | Posted: 21 Jul 2014
Published:31 Mar 2014
Summary:This solution brief highlights the challenges organizations feel in the face of IT consumerization and BYOD trends. It also mentions one solution that improves the productivity of mobile file sharing without sacrificing security or compliance.
Get This Now
Acronis

5 DBA Mistakes That Can Cost You Your Job
sponsored by Idera
White Paper: | Posted: 21 Jul 2014
Published:21 Jul 2014
Summary:This white paper reveals the 5 unforgivable mistakes that could endanger the integrity, recoverability and security of the databases, including SQL Server, DMAs are supposed to protect.
Get This Now
Idera

Protecting Your Data and Network from Advanced Security Threats
sponsored by CDW Corporation
White Paper: | Posted: 18 Jul 2014
Published:18 Jul 2014
Summary:This white paper discusses one company's approaches to mobile security, cloud security, and malware protection and detection, and also provides a number of recommendations for improving your business's productivity, security, and peace of mind.
Get This Now
CDW Corporation

Enterprise Mobility & BYOD: Four Biggest Challenges— And How to Solve Them
sponsored by FrontRange Solutions Inc.
White Paper: | Posted: 18 Jul 2014
Published:18 Jul 2014
Summary:Discover four key challenges associated with enterprise mobility and how to solve them usingthe most effective EMM solution.
Get This Now
FrontRange Solutions Inc.

Top 5 Malware Trends for 2014 and How to Combat Them
sponsored by Webroot
White Paper: | Posted: 18 Jul 2014
Published:18 Jul 2014
Summary:This white paper describes the top five malware trends that are expected to grow throughout this year and the ways that your enterprise can protect its sensitive data.
Get This Now
Webroot

After Malware: The Next Mobile Security Battle - Expert Webcast
sponsored by Sophos, Inc.
Webcast: | Posted: 17 Jul 2014
Premiered:Jul 7, 2014
Summary:In this webcast, you will find that malware is here to stay, yet it's not the only threat that we need to be aware of. Watch now to understand the battle beyond malware, considering vulnerable applications, advanced adversaries, and the enemy within.
Get This Now
Sophos, Inc.

Your Guide to the Biggest Security Trends of 2014
sponsored by CDW Corporation
eGuide: | Posted: 17 Jul 2014
Published:28 Feb 2014
Summary:This guide discusses the security-related trends that you need to know about in 2014.
Get This Now
CDW Corporation

Exploring Secure File-Sharing in the Modern Enterprise
sponsored by Hightail
eGuide: | Posted: 16 Jul 2014
Published:16 Jul 2014
Summary:The following expert e-guide examines why so many companies fail to secure file-sharing policies and how this trend has affected the modern enterprise. Learn what poses the biggest threat to secure file-transfers as well as how organizations can stay compliant and prepare for accidents.
Get This Now
Hightail

1 - 15 of 2188 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com