Data Protection

RSS
Data protection news, software and solutions, and analysis for IT professionals
  • White Paper

    Data Security Best Practices

    Posted May 23, 2013 - 10:37 am

    It's no surprise data protection is at the top of every IT checklist when it comes to file sharing and storage. Learn why file server attacks happen and best practices to avoid data intrusion for any business.
  • White Paper

    Oracle Cloud Solutions Knowledge Vault

    Posted May 23, 2013 - 10:36 am

    Visit this KnowledgeVault to access brief videos that explore the benefits of Oracle Cloud Solutions from three perspectives: Cloud Developers, Cloud Builders, and Line of Business Managers.
  • White Paper

    Simplifying Data Protection

    Posted May 23, 2013 - 10:36 am

    IT requires solutions that are not only simple to deploy, use and fit into their budgets, but most importantly ensure that systems are protected and met with the recovery time and points needed in the event of a disaster.
  • White Paper

    3 Considerations for MSPs Offering BC/DR Services

    Posted May 23, 2013 - 10:36 am

    Most SMBs do not have access to remote facilities for business continuity (BC) and disaster recovery (DR), creating an opportunity for MSPs to enter this rapidly growing market.
  • White Paper

    Ransomware: Hijacking Your Data

    Posted May 23, 2013 - 10:36 am

    Messages warning that your computer is locked and you need to pay to get back access are very commonplace today. SophosLabs takes an in-depth look at the ransomware variants, delivery mechanisms, and shows how you can protect your data.
  • White Paper

    Dell Active Infrastructure

    Posted May 23, 2013 - 10:35 am

    Dell Active Infrastructure is a makeup of modular and automated converged infrastructure solutions combing servers, storage, networking and infrastructure management into an integrated and optimized system.
  • White Paper

    Build Your IT Security Business Case

    Posted May 23, 2013 - 10:34 am

    In this latest whitepaper from Kaspersky Lab, you'll find useful facts, examples and business case arguments to help you get buy-in and commitment from your business.
  • Webcast

    Get an Integrated Approach to Data Management

    Posted May 23, 2013 - 10:33 am

    This KnowledgeVault Exchange is your one-stop resource center for designing a winning data management strategy with quantifiable top-line gains and bottom-line savings.
  • White Paper

    The eGuide to Data Movement and Governance: Helping Business Professionals Stay Up to Speed

    Posted May 23, 2013 - 10:32 am

    The purpose of this eGuide is to help you grasp the measures that can keep your organization on track to meet objectives and in line with regulations.
  • White Paper

    Streamlining Information Workflows

    Posted May 23, 2013 - 10:31 am

    In order to streamline your workflows effectively, you will need to properly align your file transfer solution with your business requirements.
  • White Paper

    Secure Data Streaming with Attachmate FileXpress

    Posted May 23, 2013 - 10:31 am

    The need for secure and managed file transfer when your business data in motion is a given. But what happens at the end of the line-in that uncertain space of time when the data just sits, waiting to be picked up?
  • White Paper

    Controlling the Cost of File Transfers

    Posted May 23, 2013 - 10:31 am

    This solution brief explains why something as seemingly simple and straightforward as a file transfer task turns into such a costly operation.
  • White Paper

    Your Data under Siege: Protection in the Age of BYODs

    Posted May 23, 2013 - 10:31 am

  • White Paper

    Your Data under Siege: Defeating the Enemy of Complexity

    Posted May 23, 2013 - 10:31 am

    Even if you have adequate antivirus protection, are there still holes in your IT security armor? Is lack of bandwidth to manage the growing list of threats, endpoints, and security systems making your organization vulnerable?
  • White Paper

    Security Empowers Business

    Posted May 23, 2013 - 10:30 am

    Every magazine article, presentation or blog about the topic seems to start the same way: trying to scare the living daylights out of you with horror stories, alarming statistics, and doomsday scenarios.
  • Twitter aims to become safer with two-step sign-in

    Posted May 22, 2013 - 6:56 pm

    Twitter, in a much-needed move to keep its users safer from cyberattacks, is introducing a more secure login process.
  • White Paper

    Business Assureance Technology Infographic

    Posted May 22, 2013 - 1:45 pm

    IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance.
  • White Paper

    Business Assureance Technology Infographic

    Posted May 22, 2013 - 12:30 pm

    IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance.
  • White Paper

    Business Assureance Technology Infographic

    Posted May 22, 2013 - 12:30 pm

    IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance.
  • White Paper

    Business Assureance Technology Infographic

    Posted May 22, 2013 - 12:30 pm

    IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance.
  • White Paper

    Business Assureance Technology Infographic

    Posted May 22, 2013 - 12:30 pm

    IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance.
  • White Paper

    Business Assureance Technology Infographic

    Posted May 22, 2013 - 12:30 pm

    IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance.
  • White Paper

    Application Security eGuide

    Posted May 21, 2013 - 9:45 am

    In this eGuide, CIO and sister publications CSO and InfoWorld bring you news, opinions, research and advice regarding the risks that enterprises face from lackluster application security, and steps that can be taken to improve IT defenses.
  • Security Manager's Journal: NAC deployment means better access control at last

    Posted May 20, 2013 - 6:14 am

    The deployment has already revealed a whole lot of devices that don't meet the criteria for getting on the corporate network.
  • Yahoo Japan says 22 million user IDs may have been stolen

    Posted May 20, 2013 - 12:07 am

    Yahoo Japan, the country's largest Web portal, said up to 22 million user IDs may have been leaked during a hack that was discovered last week.
Spotlight on ...
Online Training

    Upgrade your skills and earn higher pay

    Readers to share their best tips for maximizing training dollars and getting the most out self-directed learning. Here’s what they said.

     

    Learn more

Join today!

See more content
Ask a Question