Database Encryption Reports

Jargon buster guide to GDPR
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this guide, we provide the 10 most important things you need to know about GDPR, and a jargon-buster explanation for some of the key terminology.
Posted: 08 Feb 2021 | Published: 31 Mar 2017

TechTarget ComputerWeekly.com

How Deduplication Fits into Your Data Backup Plan
sponsored by TechTarget Data Backup
EBOOK: This exclusive E-Book provides insight into the things you must consider about the way dedupe is performed as well as the ways in which it integrates with other data protection processes such as replication, encryption/compression and archiving.
Posted: 03 May 2013 | Published: 03 May 2013

TechTarget Data Backup

Cover Your SaaS!
sponsored by BitGlass
WHITE PAPER: This white paper reveals the top 5 cloud security solutions to invest in to best protect your virtualized assets.
Posted: 17 Jun 2014 | Published: 17 Jun 2014

BitGlass

A Full-Service Network With Secure, Encrypted Communications
sponsored by Cisco Systems, Inc.
WHITE PAPER: In this guide, discover how to design a full-service network with secure, encrypted communications with VPN technology.
Posted: 30 Dec 2013 | Published: 30 Dec 2013

Cisco Systems, Inc.

The Legal Obligations for Encryption of Personal Data in United States, Europe, Asia and Australia
sponsored by Vormetric
WHITE PAPER: This white paper defines the global legal obligations and financial services laws that require data encryption.
Posted: 10 Jun 2014 | Published: 31 May 2014

Vormetric

E-Guide: Minimize enterprise data exposure inside and outside the organization
sponsored by IBM
EGUIDE: This expert e-guide provides data masking best practices and explains how to implement an effective strategy for reducing the risk of data exposure from inside and outside the organization.
Posted: 27 Sep 2011 | Published: 27 Sep 2011

IBM

Killing Data
sponsored by Voltage Security, Inc.
WHITE PAPER: Traditional perimeter-based security controls are no longer effective as today’s threat landscape continues to evolve and cybercriminals become more skillful and advanced. This Forrester Research resource examines how encrypting data – both in motion and at rest – is a more effective way to keep up with determined cybercriminals.
Posted: 10 Feb 2012 | Published: 10 Feb 2012

Voltage Security, Inc.

Data Loss Prevention: RFP Technology Decisions
sponsored by TechTarget Security
EBOOK: This expert IT decisions checklist examines the crucial role that data loss prevention systems play in today's organizations' security strategies. Read on and also find out which critical questions you need to ask when looking for a solution.
Posted: 25 Sep 2014 | Published: 25 Sep 2014

TechTarget Security

Top Mobile Data Protection Best Practices
sponsored by TechTarget Security
EGUIDE: Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

TechTarget Security

Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
sponsored by GeoTrust, Inc.
EGUIDE: This expert e-guide describes the dangerous vulnerabilities that can arise from insecure Secure Socket Layer (SSL) usage, and details essential tips and strategies for properly implementing and configuring SSL in order to ensure Web security.
Posted: 27 Dec 2012 | Published: 19 Dec 2012

GeoTrust, Inc.