Data Base Encryption Reports

CW APAC, June 2020: Trend Watch - data protection
sponsored by TechTarget ComputerWeekly.com
EZINE: Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
Posted: 08 Feb 2021 | Published: 11 Jun 2020

TechTarget ComputerWeekly.com

7 NAS encryption best practices to protect data
sponsored by TechTarget ComputerWeekly.com
EBOOK: NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

TechTarget ComputerWeekly.com

May Technical Guide on PCI DSS Guidance
sponsored by TechTarget Security
EGUIDE: This technical guide, brought to you by SearchSecurity.com offers a global perspective on the various technologies available for organizations to meet the stringent requirements of the Payment Card Industry Data Security Standards (PCI DSS). View now to explore PCI DSS guidance for encryption, tokenization and virtualization technologies.
Posted: 08 May 2012 | Published: 07 May 2012

TechTarget Security

Top Mobile Data Protection Best Practices
sponsored by TechTarget Security
EGUIDE: Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

TechTarget Security

TechTalk Presentation Transcript: Analyst Jon Toigo discusses tape media today
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: In this transcript of a Jon Toigo video, learn about tape's usefulness in areas like disaster recovery and archiving, and learn about options for tape encryption and best practices for optimizing your tape performance.
Posted: 11 Feb 2013 | Published: 11 Feb 2013

Iron Mountain

Data Loss Prevention: RFP Technology Decisions
sponsored by TechTarget Security
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

TechTarget Security

Data Security vs. Performance: Balancing Competing Requirements with New Encryption Capabilities
sponsored by SEPATON
EGUIDE: This e-guide elaborates on new features and benefits of backup and recovery and explains why they are especially critical in IT environments with large volumes of data.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

SEPATON

In Control at Layer 2: A Tectonic Shift in Network Security
sponsored by SafeNet, Inc.
WHITE PAPER: This crucial white paper discusses the shift of encryption within Layer 2, examining the drivers behind it and how you can best apply encryption to get the most protection for your critical data.
Posted: 15 Nov 2013 | Published: 15 Nov 2013

SafeNet, Inc.

IT in Europe - May 2012
sponsored by TechTarget Security
EZINE: While network access control (NAC) technology seemed to disappear into the great beyond just a year ago, it is ready to resurface with a vengeance. However, the technology will need to resurge with better controls, especially as the consumerisation of IT and bring your own device (BYOD) trends overtake the enterprise.
Posted: 22 Jun 2012 | Published: 15 Jun 2012

TechTarget Security

10 Tips for Managing Security in the Cloud
sponsored by Dell, Inc. and Intel®
WHITE PAPER: With the cloud’s dynamic nature, IT professionals are often wary about how effective data security is in this type of environment. This white paper outlines the top 10 considerations to keep in mind when managing security in the cloud to ensure your business is protected.
Posted: 23 Nov 2011 | Published: 23 Nov 2011

Dell, Inc. and Intel®