Electronic Security Reports

2 types of endpoint encryption to protect data
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Endpoint encryption can ensure data remains safe from unauthorized access when it is stored and transmitted to another endpoint. Two main approaches to endpoint encryption that companies can implement to protect data are full-disk encryption and file encryption.
Posted: 04 May 2022 | Published: 04 May 2022

TechTarget ComputerWeekly.com

10 Tips for Managing Security in the Cloud
sponsored by Dell, Inc. and Intel®
WHITE PAPER: With the cloud’s dynamic nature, IT professionals are often wary about how effective data security is in this type of environment. This white paper outlines the top 10 considerations to keep in mind when managing security in the cloud to ensure your business is protected.
Posted: 23 Nov 2011 | Published: 23 Nov 2011

Dell, Inc. and Intel®

Securely Implement and Configure SSL to Ward Off SSL Vulnerabilities
sponsored by GeoTrust, Inc.
EGUIDE: This expert e-guide describes the dangerous vulnerabilities that can arise from insecure Secure Socket Layer (SSL) usage, and details essential tips and strategies for properly implementing and configuring SSL in order to ensure Web security.
Posted: 27 Dec 2012 | Published: 19 Dec 2012

GeoTrust, Inc.

Best Practices for Mobile Device Management
sponsored by TechTarget Security
EGUIDE: This e-guide from SearchConsumerization.com explores best practices for mobile device management in the enterprise and why your strategy must evolve as the phone technology does.
Posted: 17 Feb 2012 | Published: 17 Feb 2012

TechTarget Security

Next Generation Enterprise WAN DMVPN
sponsored by Cisco Systems, Inc.
WHITE PAPER: Access this white paper that outlines steps for migrating from DMVPN to GET VPN, and learn about what benefits you stand to gain by doing so.
Posted: 11 Jul 2012 | Published: 11 Jul 2012

Cisco Systems, Inc.

Clearswift Government Communications 2.0
sponsored by Clearswift
WHITE PAPER: In this resource, explore the evolving trends in the public sector landscape, and what this means for information governance and security. Learn how crucial it is to prevent data leakage for the sake of regulations and citizens' trust.
Posted: 08 Nov 2013 | Published: 31 Aug 2013

Clearswift

Data Security vs. Performance: Balancing Competing Requirements with New Encryption Capabilities
sponsored by SEPATON
EGUIDE: This e-guide elaborates on new features and benefits of backup and recovery and explains why they are especially critical in IT environments with large volumes of data.
Posted: 27 Aug 2013 | Published: 27 Aug 2013

SEPATON

Oracle Database - The best choice for Siebel Applications
sponsored by Oracle Corporation
WHITE PAPER: This white paper covers the business and technology reasons behind customers' continued choice of Oracle Database for their Siebel Applications deployments.
Posted: 08 Jun 2011 | Published: 30 Apr 2010

Oracle Corporation

Five Windows 10 security risks that are easy to overlook
sponsored by vmware airwatch
EGUIDE: As more organizations upgrade from Windows 7, the time is right to think about how to create the perfect Windows 10 security setup. But before upgrading to Windows 10, understand these 5 security risks that are easy to overlook.
Posted: 27 Mar 2017 | Published: 17 Mar 2017

vmware airwatch

Top Mobile Data Protection Best Practices
sponsored by TechTarget Security
EGUIDE: Mobile data protection is an extremely relevant topic in this day and age. With people now combining their work phones with their personal phones, important data is at risk in multiple ways. Check out this expert E-Guide and learn about the top five ways to secure your phone and make sure your personal and work information stays yours.
Posted: 09 Nov 2011 | Published: 09 Nov 2011

TechTarget Security