data integrity

Results 76 - 90 of 90Sort Results By: Published Date | Title | Company Name

Server Virtualization & Cloud Computing: Four Hidden Impacts on Uptime & Availability

Published By: Stratus Technologies     Published Date: Jun 04, 2009
Cloud computing allows companies to use IT resources as a service, taking advantage of shared applications, processing and storage managed within the cloud - either inside a private cloud at an internal data center, or in an external cloud at a service provider. Greater robustness of the virtualized servers supporting this new IT model will ensure a resilient cloud infrastructure capable of delivering "on-demand" access to users.
Tags : 
demand, stratus, cloud computing, virtualized, on demand, storage management, shared applications, cloud, x86, virtualization, server, disaster recovery, business agility, business continuity, it administration, failure, scalability, smp, symmetric multiprocessing, data integrity
    
Stratus Technologies

Best Practices and Applications of TLS/SSL

Published By: Symantec     Published Date: Oct 02, 2012
The most well-known example of the use of public key infrastructure has proven flexible enough to assist in authentication, encryption and data integrity.
Tags : 
tls/ssl, public, key, infrastructure, transport, layer, security, business technology
    
Symantec

Addressing Compliance Requirements for Privacy, Data Retention, and e-Discovery

Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Protecting individual and financial data, retaining data, and meeting e-discovery requirements are common compliance requirements across geographies and industries. Finding accurate, usable, and cost-effective solutions for meeting these requirements can make the difference between achieving compliance goals or leaving the organization vulnerable through unsecured use of sensitive data. Trend Micro Data Protection solutions for endpoint data leak protection, email encryption, and email archiving help organizations meet their compliance requirements – easily and cost-effectively.
Tags : 
trend micro, trend, information technology, security, security requirements, compliance, e-discovery, customer churn, litigation, fines, personally identifiable information, pii, pci, payment card industry, phi, protected health information, pfi, personal financial information, pfi access control, audit
    
Trend Micro, Inc.

Tips, Tools & Best Practices for Operational Data Quality

Published By: Trillium Software     Published Date: Jun 06, 2011
The fourth Web seminar in the series is titled "Tips, Tools & Best Practices" which shows how you can learn to deliver high performance data quality in real-time.
Tags : 
trillium software, operational data quality, odq, performance management, real-time transactions, high performance data quality, business processes optimization, information integrity, reusable data quality, application optimization, application performance management, business intelligence, data quality, data warehousing
    
Trillium Software

Beyond PCI Checklists: Securing Cardholder Data with Tripwire's Enhanced File Integrity Monitoring

Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
    
Tripwire

7 Guidelines for Hyper-Availability in the Digital Financial Services Enterprise

Published By: Veeam '18     Published Date: May 01, 2019
Financial services organisations face increasing pressure to comply with rapidly evolving regulatory requirements for data integrity and security. In addition, valuable stored data continues to grow at exponential rates. Meanwhile, customers expect around-the-clock access to their account information from their computers and mobile devices. In fact, many banks have developed customised mobile applications that enable 24/7/365 account transactions, including deposits and transfers of funds.
Tags : 
    
Veeam '18

Best Practices and Applications of TLS/SSL

Published By: VeriSign, Inc.     Published Date: Aug 03, 2011
This paper will explore how TLS works, best practices for its use, and the various applications in which it can secure business computing.
Tags : 
verisign, larry seltzer, best practices, ssl, tls, transport layer security, secure lockets layer, authentication, encryption, data integrity, extended validation, security policies
    
VeriSign, Inc.

Viavi Special Report: Network Tools Hold Critical Insight in Attack Remediation

Published By: Viavi Solutions     Published Date: Jan 04, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
    
Viavi Solutions

Viavi Special Report: Network Tools Hold Critical Insight In Attack Remediation

Published By: Viavi Solutions     Published Date: Apr 14, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
network security, security validation, technical security, cyber attacks, database security, it security, traffic analytics, data report
    
Viavi Solutions

Windows 10 Security and VMware AirWatch

Published By: VMware AirWatch     Published Date: Jul 19, 2017
Anytime, anywhere access to work is now a basic need for the modern workforce. Whether remote, in the field or in the office, workers are no longer physically connected to your network or data center. Today’s employees work in a digital workspace that features virtualized laptops, desktop and workstations; a variety of personal systems and smart devices that may be part of BYOD programs and a diverse app ecosystem with desktop, remote, mobile, SaaS and Universal apps. In this mobile-cloud world, new and unpredictable forms of malicious software continue to evolve. Traditional network security, perimeter protection and firewalls are no longer enough to combat these new threats to the corporate IT infrastructure and company data integrity.
Tags : 
    
VMware AirWatch

Wasabi Helps You Protect Your Amazon S3 Data with Secondary Storage for 1/5th the Price

Published By: Wasabi     Published Date: Oct 26, 2017
The recent Amazon S3 outage highlights the need for high-quality secondary storage and raises questions around dependence on a single-service provider. Wasabi offers a highly compelling alternative to Amazon S3 Cross Region Replication (CRR) allowing you to keep a live copy of your S3 data on Wasabi for a 1/5th the price of CRR. Fully compliant with S3, Wasabi also provides extreme data durability, integrity and security. In this tech brief we take you through Wasabi’s proposition of extreme savings with zero degradation in quality for secondary storage.
Tags : 
amazon s3, secondary storage, business-critical data, cloud storage, hot storage
    
Wasabi

Sending, Receiving, and Tracking Large Files Securely

Published By: YouSendIt     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report
    
YouSendIt

Improve Your Ability to Send, Receive, Track, and Collaborate on Large Files

Published By: YouSendIt     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report, compliance, privacy, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment
    
YouSendIt

Sending, Receiving, and Tracking Large Files Securely

Published By: YouSendIt, Inc.     Published Date: Nov 21, 2008
In this datasheet, discover how it’s now possible to send large files in a way that’s safer and more affordable than FTP, courier services, and email attachments.  Learn how to beat the security challenges that come with global collaboration and data sharing; avoid crippling data transfer problems like partial file delivery or network delays; and know where your file is every step of the way, from sendoff to final destination. Download your copy now.
Tags : 
cost of ownership, total cost of ownership, tco, authentication, authorization, encryption, file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report
    
YouSendIt, Inc.

Improve Your Ability to Send, Receive, Track, and Collaborate on Large Files

Published By: YouSendIt, Inc.     Published Date: Dec 02, 2008
Discover why sending large e-mail attachments and other digital files is becoming increasingly problematic.  Download this informative data sheet now to learn how FTP flaws can result in exposure; why large email attachments aren’t getting through; risks of delivering files via CD-ROM; and how new digital delivery developments make it possible to send large files, fast and securely.
Tags : 
file transfer, content delivery, digital content delivery, attachment, email, ftp, security, confidentiality, data security, data integrity, tracking, auditing, visibility, report, compliance, privacy, powerpoint attachment, mp3 attachment, jpeg attachment, photoshop attachment
    
YouSendIt, Inc.
Start   Previous    1 2 3 4     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.