Your Search returned 1 results from our Editorial content

Sort By
  • Close-button

    Enterprise Data Privacy

ENTERPRISE DATA PRIVACY

BlueTalon CEO sees sharp need for data-centric security...

Enterprise IT veteran Eric Tilenius believes the days of focusing exclusively on endpoint and perimeter controls are gone

   

Your Search returned 52 results from our White Paper Library

Sort By
  • Close-button

    Enterprise Data Privacy

Imperva

Patch Management

Closing the Window of Exposure with Database Virtual Patching...

IT organizations are searching for a more efficient approach that enables quicker deployment of security patches while ensuring the safety and productivity...


Imperva

Threat and Vulnerability Management

Managing Risk to Sensitive Data with SecureSphere

In this white paper we will explore the need to discover and classify sensitive data in enterprise databases.


Symantec Corporation

Project Management and Collaboration

Unlocking the value of the information economy

There is a dramatic gap between how important companies rate specific information strategies and how highly they rate their own performance.


IBM

Enterprise Application Integration (EAI)

Manage enterprise data with Integrated Data Management

To successfully harness organizational data to business goals and manage data and data-driven applications so they deliver business value, enterprises...


IBM

Data Privacy and Security

Closing the Data Privacy Gap: Protecting Sensitive Data...

The ideal data privacy solution must provide the necessary data masking techniques to satisfy the simplest and most complex policy requirements. These...


IBM

Data Privacy and Security

Forrester – Test Data Privacy is Critical to Meet Compliances...

Just because data is stored in a test or development environment does not release your firm from the responsibility to comply with privacy regulations....


BlackBerry

Mobile Applications

Secure Smartphone Apps: The Next Generation

This white paper addresses mobile applications and the potential security threats to corporate networks as well as provide security measures to take such...


BlackBerry

Mobile Applications

The CIO's Guide to Mobile Security

Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions...


Akamai

Cloud Computing Security

Leveraging Cloud Security to Weather Threatening Storms...

This paper assesses the current cyber threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving,...


Informatica

Systems Integration

Securing Your Cloud Based Data Integration - A Best Practices...

This paper identifies a five item checklist covering security related topics that need to be addressed during data integration to the cloud.


Previous 1 3 4 5 6

Blogs

Most Recent Comments

Resource Center

  • /view_company_report/775/aruba-networks
  • /view_company_report/419/splunk

Poll

Do you use any voice/digital assistants to help you work?