December 2008 - (Free Research) With sophisticated key management, multiple integration options and a stateless architecture, SecureData enables enterprises to quickly secure their test and development application environments to ensure against the risk of data compromise.
October 2010 - (Free Research) Protecting sensitive and business-critical data is essential to a company’s reputation, profitability and business objectives. This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices.
April 2013 - (Free Research) This informative white paper introduces a data protection appliance that supports at rest data encryption designed to protect the most sensitive structured and unstructured data.
May 2008 - (Free Research) Data Encryption Expert fills the gaps in your data protection efforts as an affordable and easy to implement solution to difficult compliance requirements like encryption, access control, host protection and auditing.
October 2011 - (Free Research) If data is encrypted, health care providers are not subject to new, strict data breach notification laws. Server, storage and network encryption adds yet another layer of protection. So why do so many organizations avoid encryption? This presentation download will cover the basics of encryption and explain why its benefits outweigh its costs.
June 2010 - (Free Research) To properly protect the information at the database layer there are a number of comprehensive measures that need to be taken. With this paper Tanya Baccum, SANS Institute analyst, examines these measures for holistically protecting Oracle database from inside out.
October 2010 - (Free Research) This e-book, brought to you by SearchCompliance.com and SearchSecurity.com, discusses how to build a successful data protection strategy, as well as database security auditing tools, how to secure your mainframe, laptop encryption and more!
November 2009 - (Free Research) Tanya Baccum, SANS Institute analyst, discusses the importance of having an appropriate IT security strategy that mitigates risk to databases by introducing key steps and controls to effective database security.
May 2011 - (Free Research) In this FAQ Guide, David Chapa, senior analyst at the Enterprise Strategy Group, discusses some best practices for tape vaulting. Find out the costs of tape vaulting services, how offsite tape storage costs are determined, how to negotiate your SLAs, and whether or not you should encrypt your tapes before you ship them offsite.
August 2009 - (Free Research) The federal government’s push for electronic healthcare records has made compliance and data security even more pressing. This e-guide offers a look at where healthcare IT leaders should begin, and what they should watch out for as they move to embrace the HITECH Act, HIPAA and other initiatives.
January 2012 - (Free Research) The following five steps are some very effective ways to improve data security in a cost-effective manner and are the first steps toward readying an organization for more robust data protection measures such as data leak prevention (DLP).
May 2011 - (Free Research) Proper security of data backups doesn’t just happen. It requires thoughtful planning and careful controls. Given the implications of failure – reputational damage, direct costs, compliance issues, and sub-optimal business operations - companies owe it to themselves to take data backup security seriously.
September 2011 - (Free Research) Small and mid-sized businesses are a market that has been underserved by data protection software, appliances and online backup services until the last few years.Yet, these organizations have the same needs as large enterprises to protect their data. Full-time, dedicated IT resources are often beyond their means.
October 2010 - (Free Research) SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.
October 2011 - (Free Research) In order to maintain patient privacy while complying with HIPAA standards, medical records must be tightly protected and there must be a solid backup plan in place in the case of a data breach. In this e-guide, learn how to prevent data breaches as well as what to do should a safety breach occur.
November 2011 - (Free Research) It is ultimately up to each individual health care facility to determine the data backup options that best suit their needs, so long as the overall solution adheres to regulatory requirements.Access this e-guide for an overview of pros and cons of different types of backups.
September 2011 - (Free Research) This expert e-guide makes the case for data deduplication technology and outlines how it works, its advantages, different dedupe misconceptions and how it factors into disaster recovery strategies. Read on to learn more.
May 2011 - (Free Research) This SearchStorage.com E-Guide outlines best practices for building a cost-effective database infrastructure on SANs and how to ensure uptime in these Oracle, SAN environments. Read on to learn what it takes to deploy a scalable, efficient and cost-controlled database infrastructure.
March 2013 - (Free Research) In this E-Guide, discover what the experts are saying about database consolidation for Oracle -- how not to lose functionality, why to consolidate, and some best practices therein. Also included is an in-depth discussion of session schema management, as part of a series on Oracle database consolidation.
September 2008 - (Free Research) The purpose of this paper is to examine five specific risks to data security, showing where and how confidential data may be vulnerable - and how you can protect your business against these threats.