Data Base Encryption Reports

Managing Android devices in the enterprise
sponsored by TechTarget ComputerWeekly.com
EBOOK: This article in our Royal Holloway security series focuses on two approaches to securely managing Android mobile devices in the enterprise: mobile device management (MDM) and mobile application management (MAM).
Posted: 08 Feb 2021 | Published: 04 Aug 2016

TechTarget ComputerWeekly.com

A Case for IT Security: The Future of New EU Data Protection
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security. Read on to identify implications of new EU data protection rules, as well as examine the growing threat of ransomware and how to tackle it.
Posted: 15 Jan 2016 | Published: 19 Jan 2016

TechTarget ComputerWeekly.com

Tips for Finding a Compliant DaaS Platform and 3 Security Features to Look for in a Provider
sponsored by Nerdio
EGUIDE: Finding a compliant DaaS platform isn't always easy. Every organization has their own unique requirements when it comes to compliance and security needs. Use this e-guide to discover tips for finding a platform that meets your organization's needs, and discover 3 security features to look for in a provider.
Posted: 11 May 2017 | Published: 05 May 2017

Nerdio

Spectra Libraries with BlueScale Encryption
sponsored by Spectra Logic Corporation
WHITE PAPER: Spectra Logic offers the only truly integrated encryption option for data backed up to tape and other removable media: BlueScale Encryption. Continue reading to learn how encryption and key management is easy to implement with Spectra T-Series libraries.
Posted: 02 Mar 2011 | Published: 02 Mar 2011

Spectra Logic Corporation

E-Guide: Best Practices for Data Protection and Recovery in Virtual Environments
sponsored by EMC Backup and Recovery Solutions
EGUIDE: Data backup is a top priority at most organizations, but data protection in virtual environments can be especially complicated. In this expert eguide from SearchVirtualDataCentre.co.uk, get tips for doing just that. Find out how you can enhance your data protection strategy without compromising your virtual infrastructure.
Posted: 16 Jul 2010 | Published: 16 Jul 2010

EMC Backup and Recovery Solutions

Oracle Advanced Security with Oracle Database 11g Release 2
sponsored by Oracle Corporation
WHITE PAPER: This white paper examines how Oracle Advanced Security provides transparent, standards-based security that protects data through data-at-rest encryption, network encryption, and strong authentication services.
Posted: 08 Jun 2011 | Published: 31 Oct 2010

Oracle Corporation

Implementing Tokenization Is Simpler Than You Think
sponsored by First Data Corporation
WHITE PAPER: A surprisingly simple service-based approach makes implementing end-to-end encryption and tokenization in your payment environment simpler than you might think. In this white paper, learn about the 4 potential activities for a merchant to do in order to add the benefit of these technologies in a service-based scenario.
Posted: 15 Sep 2011 | Published: 15 Sep 2011

First Data Corporation

Essential Enterprise Mobile Security Controls
sponsored by TechTarget Security
EGUIDE: How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

TechTarget Security

Best Practices for Mobile Device Management
sponsored by TechTarget Security
EGUIDE: This e-guide from SearchConsumerization.com explores best practices for mobile device management in the enterprise and why your strategy must evolve as the phone technology does.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

TechTarget Security

Your data on the move: secure mobile devices in your network
sponsored by Vera
EGUIDE: In this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.
Posted: 15 Feb 2016 | Published: 12 Feb 2016

Vera