Database Encryption Reports

Oracle Database - The best choice for PeopleSoft Applications
sponsored by Oracle Corporation
WHITE PAPER: This white paper discusses the business and technology reasons behind customers' continued choice of Oracle Database for their PeopleSoft application deployments.
Posted: 08 Jun 2011 | Published: 30 Apr 2010

Oracle Corporation

After a Thorough Search and Exhaustive Testing of Device Control Solutions, Greenwood Academies Trust Chooses Lumension®
sponsored by Lumension
WHITE PAPER: This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Lumension

Exploring cloud Security as a Service options
sponsored by TechTarget Security
EGUIDE: There are a number of new cloud-based security products, to help mitigate today’s cloud computing risks. This tip examines Security-as-a-Service tools available and the key features that are most important in a cloud server security platform such as encryption, identity management, configuration and vulnerability management and more.
Posted: 21 May 2012 | Published: 21 May 2012

TechTarget Security

Data quality emerges from Covid-19 more critical than ever
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide: The public has been drenched in data during the Covid-19 pandemic. And the issue of the quality of that data has increasingly come to the fore.
Posted: 06 Aug 2021 | Published: 06 Aug 2021

TechTarget ComputerWeekly.com

Essential Enterprise Mobile Security Controls
sponsored by TechTarget Security
EGUIDE: How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.
Posted: 04 Jan 2013 | Published: 04 Jan 2013

TechTarget Security

Five Best Practices for Protecting Backup Data
sponsored by Iron Mountain.
WHITE PAPER: Backup encryption should be a key element in any security strategy. To achieve that goal, corporations should follow five best practices. This paper details them.
Posted: 30 Jun 2010 | Published: 30 Jun 2010

Iron Mountain.

CW APAC, June 2020: Trend Watch - data protection
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Asia-Pacific organisations see the importance of having good data protection practices, even as they are still grappling with organisational and operational challenges. In this handbook, Computer Weekly looks at the different levels of preparedness across the region and what firms can do to plug any gaps.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

TechTarget ComputerWeekly.com

Your data on the move: secure mobile devices in your network
sponsored by Vera
EGUIDE: In this e-guide, you will discover the proper methods to secure emerging enterprise hardware such as iPads, netbooks and more.
Posted: 15 Feb 2016 | Published: 12 Feb 2016

Vera

SQL Server Migration
sponsored by Dell and Microsoft SQL
EGUIDE: This E-Guide explores some of the basic steps to ensure a successful migration, as well as the features you'll want to take advantage of right away and 3 key tips for making the process smoother. Uncover some of the less popular - but no less important - changes to the latest version of SQL Server.
Posted: 30 Jun 2011 | Published: 29 Jun 2011

Dell and Microsoft SQL

Boost Cloud Security with Intel® AES-NI
sponsored by Intel
VIDEO: Including Intel® AES-NI in your cloud strategy reduces code size, execution cycles, and vulnerability to attacks while boosting performance.
Posted: 07 Apr 2011 | Premiered: 10 Mar 2011

Intel