February 14, 2011 - (Free Research) The Payment Card Industry (PCI) Data Security Standard (DSS) applies to any organization that processes, transmits or stores payment card transactions or cardholder information. PCI applies not only to retailers but also to any business that accepts a single payment card transaction, no matter the size or industry.
October 11, 2011 - (Free Research) In this week's Computer Weekly, we find out how mainframe technology that was meant to be dead and buried is finding innovative new applications. We analyse the challenges facing the government's largest deployment of agile software development, and our Buyer's Guide highlights the firms making the most of social media. Download the new issue now.
October 2010 - (Free Research) SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.
October 2010 - (Free Research) Over the past 18 months we have seen the irresistible rise of a new phenomenon, cloud computing. This term is given by the IT industry to a new business model for computing, one where capacity for computer, storage and networking can be dynamically acquired, on demand,and paid for according to usage.
Recovery Manager for SharePoint is an enterprise recovery solution that provides emergency access to all SharePoint content all the time. With Recovery Manager, any recovered content can be restored to any SharePoint instance or saved to a file system. Get your business-critical data back online before the entire server farm comes back.
September 2010 - (Free Research) Database Smart Flash Cache on Oracle Solaris and Oracle Enterprise Linux has the potential to offer considerable benefit to users of Oracle Database 11g Release 2 with disk-bound read-mostly or read-only workloads, through the simple addition of flash storage such as the Sun Storage F5100 Flash Array or the Sun Flash Accelerator F20 PCIe Card.
June 2010 - (Free Research) Financial institutions worldwide depend upon the credibility and security of Credit Market Analysis (CMA’s) products and services daily. CMA’s approach to market analysis creates large volumes of highly sensitive data that require secure management and storage. CMA has been running a Dell Compellent enterprise storage solution for over two years.
February 2011 - (Free Research) This paper discusses the basic requirements of the PCI DSS, with a focus on the administrative and technical elements of the program. It also reviews the validation requirements of the standard and potential sanctions for failure to comply.
February 2011 - (Free Research) This paper outlines some of the important considerations and best practices for encrypting data on tape, and is intended to help IT administrators make the right decision for their environment and their company’s data security needs. Read on to learn more today.
June 2009 - (Free Research) Read this white paper to learn about new and innovative techniques and solutions can be used to combat fraud, and how you can realize a true return on investment by reducing losses from fraud exposure and increasing operational efficiency within your fraud prevention process.
October 2011 - (Free Research) If data is encrypted, health care providers are not subject to new, strict data breach notification laws. Server, storage and network encryption adds yet another layer of protection. So why do so many organizations avoid encryption? This presentation download will cover the basics of encryption and explain why its benefits outweigh its costs.
February 2012 - (Free Research) Find out exactly how and why in this white paper. Discover best practices for determining what data is most important and should be encrypted, learn exactly how encryption works and receive a checklist of three critical aspects of any encryption plan. Read on to learn more.
September 2009 - (Free Research) Remote Encryption Management Software Development Kit (SDK) provides the tools to allow FDE or software based encrypted hard drives to be unlocked remotely out of band using vPro. This allows computers with vPro and encrypted hard drives to be managed out-of-band. Learn more about this SDK and download your free copy today.
August 2010 - (Free Research) Safeguarding data is critical for many organizations, but auditing data access activity to comply with regulatory standards can be a complex undertaking. As part of its initiative to simplify IT, the Dell IT group implemented the Guardium platform and database activity monitoring technology. Read this paper to learn so much more.