This IDC White Paper takes a look at the specific business value associated with using Data Domain systems as part of rapidly evolving backup and data...
This white paper explains how to implement effective encryption to ensure your organization reduces costs and liability. Discover four top encryption points...
Big Data is not only a challenge for customer-facing organizations—but for security teams as well. See why and how to overcome it in this paper.
This paper looks at concerns attributed to log management and explains how to collect and store logs securely.
“Is this email a phish or is it legitimate?” It’s a the question that is being asked more and more often. See how to work it out.
Featuring survey results of 100 senior IT executives in Japanese enterprises, this paper analyses the gap between perceptions of Web security and the reality....
This eBook from Rapid7explores the different kinds of user-based risks in today's corporate environment.
This IDC paper outlines challenges with virtualized IT environments and how to address these issues.
This paper guides you through the necessary steps to test and evaluate Veeam Backup & Replication storage snapshots.
This paper looks at covers the use of FPE and tokenization for field-level data protection, as well as both static and real-time data masking
Phil Muncaster reports on China and beyond