White Papers by Topic: Data security

Resources available: 40

IT Security by the Numbers: Calculating the Total Cost of Protection

Humorist Franklin P. Jones may have said it best: "When you get something for nothing, you just haven't been billed for it yet." These are wise words of warning for businesses counting on so-called "free" IT security software.

Overcome Your Cloud Security Woes

There is no one-size-fits-all version of cloud technology. Like many IT professionals, you're probably considering cloud computing in your organization, but you're also worried about keeping your data and assets secure.

Why You Need a Next-Generation Firewall

To stay ahead of the threats, it's time for IT to embrace next-generation firewalls

3 Big Data Security Analytics Techniques You Can Apply Now to Catch Advanced Persistent Threats

This technical white paper demonstrates how to use Big Data security analytics techniques to detect advanced persistent threat (APT) cyber attacks, and it shows how HP ArcSight applies these techniques to spot and stop attacks.

Long-Term Data Protection and Retention

IT organizations of all sizes contend with a growing data footprint with more data to manage, protect and preserve for longer periods of time.

Securing Data Stored On Tape With Encryption

With companies storing data for longer periods of time to meet compliance regulations and business best practices, the inherent risk of a data breach is growing significantly.

Simplifying Entry-Level Backup/Recovery

Every data center, whether enterprise or SMB, is currently experiencing a period of unprece-dented growth within their data storage environ-ment. Most are expanding their information capa-city by 50% to 70% annually, while many are doubling capacity in the same period. It is an absolute truth that storage requirements will continue to increase in 2010, and beyond.

Need a Long-Term Archive Solution?

Along with their iLayer software, Quantum has delivered an archive solution that reduces the total cost of ownership for the IT infrastructure while at the same time simplifying data protection. To learn more about the Scalar i6000, please read on.

How to Tell If You Need Secure, Managed File Transfer

If your organization is like most, you probably move more than a few files from place to place. With all this data flying around, how secure are your file transfers? This shortcut guide examines three real-world file transfer scenarios and provides the 10 business requirements you need to fulfill with any file transfer solution.

Common File Transfer Myths - Debunked

Misconceptions and bad assumptions related to file transfer are common. This paper will bust some of these myths by examining common misunderstandings, explaining where they came from-because many of them do, in fact, contain a nugget of truth-and seeing how they hold up to cold, hard facts.

©1994-2014 Infoworld, Inc.