Search Resources

Refine Search


Resource Library

Results for Data Protection


Most Recent Alphabetical

Secure Data from Unauthorized Access with Encryption Solutions from NetApp and SafeNet - White Paper

The ability to protect and store critical data is a major focus for today’s organizations. In order to guard against advanced threats in a complex and evolving climate of virtualization, cloud services, and mobility, organizations must increasingly take a data-centric approach to safeguarding their sensitive information.

Data Breach in the EU regulations - White Paper

Along with the recent passage of EU data breach regulation in the electronic communication sector, additional legislation concerning data protection and network and information security is being planned.

Global Encryption and Key Management Survey - White Paper

As organisations strive to mitigate the risks of devastating breaches and comply with relevant mandates, the use of encryption continues to expand. How are organisations contending with this demand, and what impact will the adoption of cloud services and virtualisation have on security approaches? This report draws on an extensive survey to provide a current look at the evolving use of encryption and key management.

Benefits of Migrating to StorageSecure - White Paper

In 2011, NetApp announced the end of availability of NetApp DataFort systems. As a result, DataFort customers will have some choices to make as to how they move forward.

Market Survey: Securing Sensitive Payment Information - White Paper

Securing Sensitive Data in VCE - ProtectV - White Paper

Companies are increasingly attracted to the unparalleled benefits that virtual data centers and cloud environments offer.

Authentication Best Practices - White Paper

A significant number of high profile security breaches have occurred recently, bringing the organizations affected to the front pages of the business press. These events have had a negative impact on the public image of these companies, and may also have a harmful effect on their business. These incidents have caused the CIOs of many companies to reevaluate their info-security strategy in general, while also placing specific focus on their user authentication and transaction security requirements.

(114 resources found) Page:   1 2 3 4 5 6 7 8 9 10