Data Security White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
IT Management  >  Systems Operations  >  

Data Security

MORE SPECIFIC TOPICS:  Customer Privacy |  Data Destruction |  Data Encryption |  Data Loss Prevention (DLP)
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 1979 Matches
IBM FlashSystem Database Mirroring Best Practices
sponsored by IBM
White Paper: | Posted: 18 Apr 2014
Published:30 Apr 2013
Summary:This technical paper explores the best practices of database mirroring, which allows for a failover or recovery strategy as an economical approach to availability.
Get This Now
IBM

Download Unitrends Enterprise Backup for Hyper-V, Free for 30 days
sponsored by PHD Virtual
Software Demo: | Posted: 18 Apr 2014
Premiered:18 Apr 2014
Summary:This software trial download provides a fully functional enterprise data protection solution, featuring automated scheduling, forever incremental backups, global deduplication, instant recovery, archiving and more.
Get This Now
PHD Virtual

A Guide to Data Privacy for Business and IT Executives
sponsored by IntraLinks, Inc
White Paper: | Posted: 18 Apr 2014
Published:31 Dec 2013
Summary:This white paper explains the latest global government efforts in enforcing stronger data privacy laws. Click now to uncover 6 data protection recommendations to help you mitigate the risks of information sharing and prevent regulatory and market sanctions.
Get This Now
IntraLinks, Inc

Encryption Buyer's Guide
sponsored by Sophos, Inc.
White Paper: | Posted: 18 Apr 2014
Published:18 Apr 2014
Summary:This white paper offers 3 key questions to ask an encryption vendor to help you find a tool that best fits your business needs.
Get This Now
Sophos, Inc.

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
White Paper: | Posted: 18 Apr 2014
Published:31 Dec 2013
Summary:This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Get This Now
Apptix

Debunking the Myths: Cloud HA and DR
sponsored by SIOS Technology Corp
White Paper: | Posted: 18 Apr 2014
Published:18 Apr 2014
Summary:Take a look at this resource to uncover 5 DR and HA in cloud deployment myths, so you can reduce the risk of downtime and data loss, and save big bucks.
Get This Now
SIOS Technology Corp

Case Study - Firm foundations for an innovative hospital
sponsored by Bull
Case Study: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:This case study tells how one Belgian hospital group implemented a converged infrastructure and saw benefits in terms of productivity, efficiency and security
Get This Now
Bull

Take a Facts First Approach to E-Discovery
sponsored by Exterro
White Paper: | Posted: 17 Apr 2014
Published:31 Dec 2013
Summary:This white paper delves into the e-discovery challenges faced by today's enterprises and provides practical steps for applying a "facts first" approach that both exceeds court expectations and reduces discovery costs.
Get This Now
Exterro

The Most Powerful of Adversaries: NSA Programs and Techniques Provide Lessons in Data Privacy and Managing Enterprise Collaboration
sponsored by IntraLinks, Inc
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:This resource reveals best practices on how to protect intellectual property, especially from the U.S. National Security Agency (NSA) and other government actors, who have the power to exploit critical data.
Get This Now
IntraLinks, Inc

Data Privacy: Where Should I House My Data?
sponsored by IntraLinks, Inc
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:This white paper offers 6 top recommendations on how to keep your data protected in the cloud and compliant with varying regulatory mandates across country borders.
Get This Now
IntraLinks, Inc

Top 8 Secure Messaging Policy Best Practices
sponsored by TigerText, Inc.
White Paper: | Posted: 17 Apr 2014
Published:31 Dec 2013
Summary:In this white paper, explore 8 valuable recommendations on how to develop a secure text messaging policy to ensure data security and compliance.
Get This Now
TigerText, Inc.

Managing Complexity in Identity and Access Management
sponsored by RSA, The Security Division of EMC
Analyst Report: | Posted: 17 Apr 2014
Published:31 Aug 2013
Summary:This Ponemon Institute report sheds light on which level of complexity is best for an effective, yet easy-to-manage identity and access management (IAM) program.
Get This Now
RSA, The Security Division of EMC

Security based on trust not fear
sponsored by Qualys
White Paper: | Posted: 17 Apr 2014
Published:17 Apr 2014
Summary:This paper provides examples of how cloud services can be used to ensure Web applications and websites instill trust and confidence in the minds of customers.
Get This Now
Qualys

Channel Edge Reseller Program
sponsored by Webroot
White Paper: | Posted: 16 Apr 2014
Published:30 Aug 2013
Summary:This brief white paper explains why VARs, system integrators, and IT solution providers should sell and support an endpoint security solution from Webroot in order to provide customers with the best security possible.
Get This Now
Webroot

Channel Edge MSP Program
sponsored by Webroot
White Paper: | Posted: 16 Apr 2014
Published:30 Aug 2013
Summary:This white paper explains the new approach to endpoint security for MSPs from Webroot that ensures security while minimizing downtime, improving efficiency and cutting costs.
Get This Now
Webroot

1 - 15 of 1979 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com