Data Security White Papers, Videos, Webcasts, Podcasts and Case Studies

Java Development Research Library

 WHITE PAPERS   MULTIMEDIA 
SEARCH the Research Library: WHAT'S POPULAR
IT Management  >  Systems Operations  >  

Data Security

MORE SPECIFIC TOPICS:  Customer Privacy |  Data Destruction |  Data Encryption |  Data Loss Prevention (DLP)
 All   White Papers   Multimedia   IT Downloads 
Limit Results:
Sort by:
1 - 15 of 2218 Matches
ADDRESS VIRTUAL SERVER BACKUPS AND BYOD
sponsored by Symantec Corporation
eGuide: | Posted: 30 Jul 2014
Published:30 Jul 2014
Summary:This expert e-guide describes some of the data protection options available today that willaddress virtual server as well as BYOD challenges. It also explains the biggest challenges associated with various approaches as well as how the technologies address these problems.
Get This Now
Symantec Corporation

Symantec Data Center Security: Server & Server Advanced - Making Server Security Simpler
sponsored by Symantec
Resource: | Posted: 30 Jul 2014
Published:30 Jul 2014
Summary:This resource gives a completed breakdown of Symantec Data Center Security: Server and Server Advanced, which each provide security controls for physical and virtual servers.
Get This Now
Symantec

What's Behind a Cyber Attack?
sponsored by IBM
White Paper: | Posted: 29 Jul 2014
Published:30 Apr 2014
Summary:This white paper analyzes the shortcomings of many current approaches to breach investigation, and also introduces one solution to help organizations to defend against advanced persistent and internal threats.
Get This Now
IBM

How to Stay Compliant with PCI DSS Standards
sponsored by LogRhythm, Inc.
White Paper: | Posted: 29 Jul 2014
Published:29 Jul 2014
Summary:This white paper explores a solution that has plenty of experience in helping organizations improve their overall security and compliance standings while reducing costs.
Get This Now
LogRhythm, Inc.

BMO Harris Bank Case Study - Vendor Webcast
sponsored by EMC Corporation
Webcast: | Posted: 29 Jul 2014
Premiered:Jul 29, 2014
Summary:This video explains how BMO Harris Bank found a storage solution with easy access that provided them with immediate savings of $5 million a year. Watch to find out how you can deploy the same solution with an easy to use interface and quickly lower costs.
Get This Now
EMC Corporation

Simple Steps to Prevent Data Theft
sponsored by HID
White Paper: | Posted: 29 Jul 2014
Published:26 Jun 2014
Summary:This white paper talks about the recent data breaches that have happened in the retail and financial services sector recently and describes 4 steps that can be taken to prevent data theft.
Get This Now
HID

A Multilayered Defense Approach to Protect Your Organization's Data
sponsored by Symantec Corporation
White Paper: | Posted: 28 Jul 2014
Published:28 Jul 2014
Summary:This white paper details the types of attacks that enterprises commonly face, and it introduces a multilayered solution that could be a valuable investment for your organization in the face of these threats.
Get This Now
Symantec Corporation

Head to Head Comparison: Two Top Backup Solutions Face Off
sponsored by CA ARCserve
White Paper: | Posted: 28 Jul 2014
Published:28 Jul 2014
Summary:This white paper compares two backup/data recovery tools. It shows how each performs on a number of different areas including performance, costs, ease of use and more.
Get This Now
CA ARCserve

Enterprise Information Security in Transition
sponsored by IBM
White Paper: | Posted: 28 Jul 2014
Published:31 Oct 2012
Summary:This white paper boils the reasons behind current issues in the information security field down into four major causes, and also lays out a list of specific, detailed changes that need to be made to the enterprise security model for these core issues to be resolved.
Get This Now
IBM

Extending Security Intelligence with Big Data
sponsored by IBM
White Paper: | Posted: 28 Jul 2014
Published:31 Jan 2013
Summary:This white paper introduces a security solution that applies big data capabilities to help organizations to keep pace with today's advanced threats and prevent attacks before they happen.
Get This Now
IBM

The Top 8 Mobile Security Risks: How to Protect Your Organization
sponsored by BlackBerry
White Paper: | Posted: 28 Jul 2014
Published:28 Jul 2014
Summary:This white paper outlines the key issues CIOs need to be on top of right now to protect their organization, employees, and customers. Read on to find out the top 8 mobile security risks and how to maintain protection.
Get This Now
BlackBerry

Critical Capabilities for Security Information and Event Management
sponsored by IBM
Research Content: | Posted: 28 Jul 2014
Published:25 Jun 2014
Summary:Uncover the key findings from Gartner's research on SIEM technologies.
Get This Now
IBM

Web Application Firewalls vs. Next-Generation Firewalls
sponsored by Fortinet, Inc.
White Paper: | Posted: 28 Jul 2014
Published:28 Jul 2014
Summary:This white paper compares the ability of two different types of firewalls—Web Application Firewalls (WAFs) and Next-Generation Firewalls (NGFWs)—to protect web applications from security threats.
Get This Now
Fortinet, Inc.

Discover the Danger Behind the Heartbleed Bug
sponsored by Symantec Corporation
White Paper: | Posted: 28 Jul 2014
Published:21 Jul 2014
Summary:Discover the dangers lurking within the Heartbleed bug, and learn how your organization should respond to it.
Get This Now
Symantec Corporation

Firms Turn To Next-Generation Firewalls To Tackle Evolving IT Threats
sponsored by Fortinet, Inc.
White Paper: | Posted: 28 Jul 2014
Published:30 Apr 2014
Summary:This white paper summarizes a number of insights on current security challenges for enterprises and the ways that next-generation firewalls (NGFWs) are being applied as a solution.
Get This Now
Fortinet, Inc.

1 - 15 of 2218 Matches


Library Home | Advertise with Us | Partner with Us
 
Powered by Bitpipe
 
Java Development Research Library Copyright © 1998-2010 Bitpipe, Inc. All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.
Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.
webmaster@techtarget.com