White Papers by Topic: Data security

Resources available: 45

Out with the old, in with the 'new normal'

The old standards in IT, marked by costly, inflexible infrastructures, just don’t work in today’s hyper-demanding and dynamic business world. It’s time for a 'new normal' marked by lower costs, user self-service, streamlined processes, better security and increased flexibility. Underlying it all is a fresh approach to virtualization.

Profiting from PCI Compliance

Working together, the major payment card providers have developed a set of data security standards and created a council for enforcing them. Although the Payment Card Industry Data Security Standard (PCI DSS) has become a global requirement, many organizations are lagging in compliance. For many companies, regulatory compliance can already be an overwhelming and confusing area to navigate, and the need to comply with the PCI DSS might feel like yet another burden.

Secure And Compliant Collaboration And Cccess

This white paper discusses how the need for faster access to resources can enable more effective collaboration but can also create significant security and compliance challenges. The paper then describes how IBM offers an adaptable, business-driven, holistic approach to security that addresses the different risk domains across organizations.

Tape Fallacies Exposed

Tape storage continues to play a vital role for data protection. David Hill of the Mesabi Group sheds light on the most common misperceptions.

Disk and Tape Square Off Again

Discover the total cost of storing data long term in SATA disk and in an LTO-4 tape system.

Securing Sensitive Information

Learn more about data security, encryption and an LTO tape drive encryption user story.

Network Security Overwatch Layer: Smarter Protection For the Enterprise

Read this IDC paper for background on today's threat ecosystem with an overview of network security threats, the impact of the threats on enterprises, and the operational challenges faced by IT.

Why Your Small Business Needs a Real Server

Enjoy the protection of having a consistent way to back up data so that critical information survives individual desktop crashes or laptop losses.

Integrated Security for Broad Protection, Swift Response

Find out the cost savings and protection benefits that are achieved when you take a methodical approach to closing your security gaps.

The Security Paradox

The First Global Study that Quantifies the Cost of Reactive Versus Proactive Security in a Midsize Organization

©1994-2014 Infoworld, Inc.