Resources Home

Alpha List

Search by Keywords

Browse by Topic

Get RSS Updates!

Information Technology > Data Tools > Data Recovery - Security

Browse through our extensive list of free Data Recovery - Security magazines, white papers, downloads and podcasts to find the titles that best match your skills; Simply complete the application form and submit it. All are absolutely free to professionals who qualify.

Sort by: Popularity | Title | Release Date

SAP HANA® Backup and Recovery using Pure Storage® Snapshots One of the cornerstones of Pure Storage® design principles is simplicity...
The Road to SAP HANA How can you modernize and deliver on-demand services while keeping your existing SAP landscape optimized and your risks..
Protect Your Data From Ransomware With These 5 Steps By downloading this free guide, you agree to receive regular updates on the latest cool..
Secure and Control Data across All Mobile Endpoints Learn how CREDANT's Mobile Guardian Enterprise solution delivers advanced mobile data..
6 Questions For a Prospective Cloud Service Provider Develop a strategy for how to select the right vendor for your business...
Discovering the Unknown: Reducing the Risk of Unauthorized Access to Enterprise Applications and Resources Learn how to maintain an..
Breakthrough Data Recovery for IBM AIX Environments How new technologies are making data protection, recovery and high availability easier..
Revinetix backup and recovery solutions make protecting city data simple and affordable for Overland Park, Kansas Learn how Overland Park,..
Google Apps Advanced Security Configuration & Compliance - The Complete Guide Security configuration & compliance beyond the basics...
5-Step Guide For GDPR Compliance: A Guide For Constructing Your Planning Timeline Use this 5-point plan to prepare your own systems to meet..
Symantec DLP for Tablets: An Intelligent Security Decision DLP solutions designed specifically for tablets and other tablets may provide the..
Ensuring PCI Compliance with Identity and Access Management Learn from an industry expert how to comply with the Payment Card Industry Data..
11 Practical Steps to Reduce the Risks of Zero-Day Attacks This paper explains the dangers of zero-day attacks and why traditional defenses..
The Benefits of AIX Data Replication in IBM HACMP Cluster Management Implementations Learn how technological advances in AIX high..
Selecting Encryption for 'Data at Rest' in Back-End Systems Learn why decisions about security solutions need to be made in a specific..
Full Data Encryption2 Full Disk without the Risk...
Clearing the Path to PCI DSS Version 2.0 Compliance Learn streamlining processes for protecting cardholder data...
Securing Hadoop: Security Recommendations for Hadoop Environments This research paper lays out a series of recommended security controls for..
The Shortcut Guide to Understanding Data Protection from Four Critical Perspectives What Corporate Business Leaders Need to Know about Data..
PCI 3.0 Compliance Guide In this guide, learn how PCI-DSS 3.0 effects your deployment and maintenance of PCI compliant networks using..
Mobile Data Security Essentials for Your Changing, Growing Workforce Mobile data encryption should not stand-alone. Learn four essentials to..
How a Cyber Threat Group Exploited Governments and Commercial Entities for Over a Decade This special report is a starting point to help an..
Insider's Guide To Minimizing The Impact of Ransomware: 6 Step Plan for Comprehensive Data Protection Ransomware attacks have become..
4G Failover for Business Continuity: Maximizing Revenue and Minimizing Business Risk to Your Brand While short outages are common, longer..
How to Write a Privacy Policy for Your Website By downloading this free guide, you agree to receive regular updates on the latest cool apps,..
Complying with PCI DSS Requirements with DataStax and Vormetric Discover a comprehensive data security solution that is also PCI DSS..
5 Things You Need to Know about Security and UC The decision to invest in new technology should never be taken lightly...
Providing Reliable Hosted Exchange for a Fortune 500 Financial Sector Customer Learn how Apptix seamlessly migrated nearly 15,000 users in..
How to Maximize the Business Value of Data with PCIe Flash Array Architecture Help customers prioritize data based on their unique..
Preparing for The New World of Data Privacy In today's changing global landscape of data privacy, it's important to know the key issues to..
Cracking the Confusion: Encryption and Tokenization for Data Centers, Servers, and Applications Should you encrypt everything?..
Data Security for Retail Customers – Perceptions, Expectations and Potential Impacts Over the past few years, the personal information of..
Best Practices for Handling a Data Breach It only takes one stolen laptop, one employee's USB stick, one hacker, one virus, or one careless..
Reduce Your Breach Risk Learn about file integrity monitoring for PCI Compliance and Data Security...
For Data Security Professionals - Adventures in Secure Mobile Email Native iOS and Android email clients don't support much in the way of..
Enterprise Full Disk Encryption Buyer's Guide Lock down all data on a computer using full disk encryption, rendering it unreadable on lost..
Secure Corporate Data with Policy-Based Intelligent Encryption Hear about CREDANT's next-generation encryption solution, offering better..
Internal Controls in an FCPA Compliance Program Learn why you should take the results of your risk assessment tools and design a robust..
50 Minutes and 500 Dollars: Real World Solutions for PCI DSS Don't be an easy cyber target - get started with security and compliance in..
Managing BitLocker with SafeGuard Enterprise Full-disk encryption is rapidly becoming a standard security solution, like antivirus or spam..
A Detailed Look at Data Replication Options for DR Planning Explore the different approaches for integrating data replication into your DR..
Enterprise Resiliency & Application Recovery Real life chronicle of two IT Departments during Hurricane Sandy...
Advances in Endpoint Data Security: New Technology to Meet Security, Operations and Compliance Needs Advances in Endpoint Data Security...
Cyber Security Threat Report: A View From the Front Lines Take a look at the cyber threat landscape as reported from investigations in more..
The CISO's Guide to Machine Learning and UBA A Technical Resource for Security Professionals...
The Executive Guide to Data Loss Prevention Reported data breaches increased by nearly 50 percent in 2008 and industry and regulatory..
Encryption as an Enterprise Strategy In the last 10 years, the number of data breaches has grown dramatically...
Next-Generation Disaster Recovery and Availability Technologies for AIX and IBM i (i5/OS) on IBM Power Systems Review the technology..
Comprehensive Review of Security and Vulnerability Protections for Google Apps Find out how Google protects and secures your company's..
Fixing Your Dropbox Problem How the right data protection strategy can help...
Continuous Security Monitoring (CSM) Learn what CSM is, how to implement it, and discover the most applicable use cases...
2016 Global Encryption Trends Study This report, published in February 2016, provides in-depth information about the evolving role of..
Lost Customer Information: What Does a Data Breach Cost Companies? Organizations lose confidential customer information more frequently than..
Who's Snooping on Your Email? Email poses the highest risk for accidental data exposure, breaches of privacy, or non-compliance with data..
Protection for Every Enterprise: How BlackBerry Security Works Get an IT-level review of BlackBerry® Security, addressing data leakage..
Vormetric Cloud Encryption Gateway: A Technical Overview This paper provides a technical overview of the product, detailing the most..
Combining the Flexibility of Public-Cloud Apps with the Security of Private-Cloud Data for the Finance Industry Learn how financial..
Achieving ROI from Your PCI DSS Investment Find opportunities to leverage PCI DSS compliance efforts to produce greater long-term return on..
Seven Virtualization DR Myths As IT departments across the world move more virtualization and virtual technologies into their datacenters,..
Why the Threat of Downtime Should Be Keeping You Up at Night Learn how to easily protect your security systems and keep them running 24/7...
IT Security Alerts: How Many is Too Many? Assess the current state of your alert process and start to improve your organization's management..
Achieving ROI from Your PCI Investment Organizations invest considerable financial and technical resources obtaining PCI DSS Compliance. Why..
Leveraging In-house eDiscovery Technology for Protecting Data Privacy, Enabling IP Protection, and Controlling Sensitive Data This paper..
6 Modern Security Tools for Windows 8 By downloading this free guide, you agree to receive regular updates on the latest cool apps, product..
Enterprise Backup and Recovery Methodologies for Oracle Overcome the unique back up and recovering challenges Oracle environments can..
Backing Up Servers to the Microsoft Cloud Discover how Microsoft Azure Backup is well suited for both small and large organizations...
Professional Hadoop Solutions--Free Sample Chapter The go-to guidebook for deploying Big Data solutions with Hadoop..
The Client Mandate on Security Like most other organizations, law firms face new challenges every day when protecting their confidential..
The Cyber Security Playbook: What Every Board Of Directors Should Know Before, During, And After An Attack. This playbook is a starting..
Aberdeen Group: Selecting Encryption for 'Data at Rest' in Back-End Systems What risks are you trying to address?..
The Numbers Game: How Many Alerts is too Many to Handle? This report details the survey results of all aspects of alert management -..
Backing Up Servers to the Microsoft Cloud Discover how Microsoft Azure Backup is well suited for both small and large organizations...
The State of Resilience & Optimization on IBM Power Systems (System i and System p) Read this review to learn the data protection, recovery..
2016 Data Threat Report Learn trends in Encryption & Data Security...
Fujitsu Helps Increase Productivity in Healthcare Learn about mobility solutions that provide exceptional usability, excellent performance,..
Guide: IP Telephony Network Evaluation and Risk Assessment Learn how to perform an evaluation of your network capabilities and potential..
QTS Data Security Secures Sensitive Data in the Cloud QTS Data Security -- Securing data-at-rest more effectively than full disk encryption,..
The New Encryption Generation: Closing the Gap Get the Complete Story on Encryption...
Windows 10 Migration Guide: Reduce Complexity, Streamline Process How to leverage endpoint data protection to ease OS migrations...
Meeting Vulnerability Scanning Requirements for PCI Learn the scanning requirements for PCI-DSS to achieve compliance...
Google Apps Admins: Get Peace of Mind Learn how to protect your Google Apps domain with this 13-step game plan...
Regulations and Standards: Where Encryption Applies Organizations of all sizes face a number of industry and regulatory compliance mandates...
Endpoint Security Strategies: Part II Aberdeen Group's endpoint data protection benchmark report identifies successful strategies,..
Vormetric Encryption Gateway and Platform Strategy This report offers analysis of the Vormetric Data Security Platform strategy...
Disk-based Backup & Recovery: Making Sense of Your Options Learn about several methods for incorporating disk into your backup and recovery..
IT Leaders: Have You Done Everything You Can to Prevent a Data Breach? The fact is, today, if you're not on offense, you're on defense in..
Authentication, Encryption & Tracking Technologies: The benefits of Utilizing Hybrid Technologies for Asset Protection Mitigate the risk..
The Future of Backup as a Data Protection Strategy Five questions you need to ask when determining what's best for your data...
Securing Your Network from the Inside Outlines common causes of security threats and how adding a portable layer of protection can help to..
IT Guide to Mac Backup for Business How to Include Macs in Your Laptop Backup and Data Protection Plans...
Enterprise Backup and Recovery Methodologies for Oracle Evaluate the pros and cons of Oracle's own backup and recovery applications and..
Data Replication and CDP for IBM AIX Environments Learn the essentials of continuous data protection (CDP) and more...
Store You Shop At Get Hacked? Here's What To Do By downloading this free guide, you agree to receive regular updates on the latest cool..
When Mobile Device Management Isn't Enough Explore common methods of data loss that cannot be prevented through MDM alone...
Securosis: Cracking the Confusion: Encryption and Tokenization This report from Securosis cuts through the confusion to help you pick the..
Mobile Security Essentials for a Dynamic Workforce Outlines four key requirements for implementing effective and flexible enterprise-class..
Why Midsize Organizations Need Business Continuity/Disaster Recovery Even More than Enterprises Do It is counterintuitive to accept that..
Reduce Your Breach Risk with File Integrity Monitoring Learn how to reduce your risk with file integrity monitoring for PCI DSS compliance..
After A Data Breach: Managing Identity Theft Effectively Life can seem surreal for identity victims...
PCI Compliance for Dummies Get the facts on PCI Compliance and learn how to comply with the PCI Data Security standard...
Resilience & Optimization on IBM Power Systems: Surveys of IBM i and AIX Users Read this review of the data protection and recovery..
High Availability on IBM System i (AS/400) - An Introduction Get more value out of your business-critical AS/400 and iSeries systems!..
Android Application Security Essentials: Chapter 5 - Respect Your Users If you are a developer, architect, manager or technologist looking..
Enterprise Full Disk Encryption Buyer's Guide This security technology locks down all laptop and desktop data if a system is lost or stolen...
Hyperconvergence: The Stepping-Stone to the Software-Defined Data Center Learn how hyperconvergence provides flexible, agile and dynamic..
Storage Source Magazine This newly premiered publication is a one-stop source for storage strategies and management, offered exclusively by..
Mobile Security: More than Just Encryption Outlines four key requirements for implementing an effective and flexible enterprise-class mobile..
Five Reasons Why Smaller Organizations Should Consider System i (AS/400) High Availability Learn why true High Availability and Disaster..
MongoDB Performance with Vormetric Transparent Encryption In enterprises around the world, data volumes have been undergoing explosive..
Key Management for Dummies Read this complimentary guide to managing the widespread use of encryption to secure valuable and sensitive data...
IT Audit Checklist: Information Security Use this step-by-step guide to conduct a productive audit of your existing enterprise security...
Achieving Rapid Data Recovery for IBM AIX Environments Read how EchoStream for AIX leverages CDP technology to support instantaneous..
Next Gen Firewall and UTM Buyers Guide Implementing and managing a network protected by point solutions is far from simple. But complete..
Understanding Your Encryption Footprint: Your Reliance on Security and Trust Encryption has been adopted extensively across the extended..
Encryption Buyers Guide How does Sophos SafeGuard Encryption meet your data protection requirements? How do we stack up against McAfee..
Cloud-Based Enterprise Backup Full-System Backup for All of Your Corporate Data...
Compromised Users and Hosts - Detection with Behavioral Analytics Attacks involving compromised users and hosts are notoriously difficult to..
A Detailed Look at Data Replication Options for Disaster Recovery Planning Provides a technical overview and high level considerations for..
Microsoft Data Protection Manager 2010 Administration - Free Chapter from Microsoft Data Protection Manager 2010 DPM Overview provides an..
Who Leads in WLAN Security? Comparative evaluation of vendor offerings and positioning in the WLAN security market, including security issue..
Payment Card Trends and Risks for Small Merchants Learn about the top data risks faced by smaller businesses, and why PCI compliance is..
A Comprehensive Mobile Threat Assessment Find out what FireEye researchers uncovered when they analyzed more than 7 million iOS and Android..
Solution Brief - Consolidated Backups Learn how a centralized backup to disk solution can alleviate the risks associated with distributed..
How to Make a Case for Investing in an Integrated Cyber Security Platform This white paper demonstrates the ROI of FireEye as a Service to..
Long Term Data Retention: 5 Key Considerations Managing backup and recovery in today's environment is a multi-dimensional challenge with..
PCI Compliance & Security in a Franchise Model This white paper explores the dangers posed by non-compliance with Payment Card Industry Data..
5 Essential Steps to Sustainable PCI DSS Compliance Learn how to focus an organization's efforts for the best, most cost-effective results...
A Summary of Russia's Threat in Cyberspace This paper looks at an Advanced Persistent Threat (APT) group engaged in espionage against..
Quantifying the Value of Software Asset Management Discover how a SAM solution can drive real benefits and cost savings to your organization...
Meeting Data Residency and Compliance Challenges in Global Enterprises This paper examines information privacy and data residency solutions..
Protect Yourself and Your Company from Advanced Cyber Attacks This self-assessment is designed to point you in the right direction as you..
Uninterrupted Internet: Maximizing Revenue and Minimizing Business Risk with 3G/4G Failover Whether your businesses are connected to the..
Fixing the Top 5 Compliance and Security Challenges in Hospitality Best practices for hotels, restaurants and retail businesses...
5 Critical Considerations for Enterprise Cloud Backup Framework for evaluating cloud backup solutions to ensure adequate security...
Lockdown: Secure Your Data With True Crypt By downloading this free guide, you agree to receive regular updates on the latest cool apps,..
KVM over IP and Financial Data Security Gain valuable insight into how to achieve information security in the advent of Sarbanes-Oxley Act...
50 Uses For Live CDs By downloading this free guide, you agree to receive regular updates on the latest cool apps, product reviews, and..
Prescription for Essential Data Protection and Security Learn how a secure wireless networking solution reliably maintains critical data..
Copyright © 2017 NetLine Corporation. All rights reserved.
750 University Avenue | Suite 200 | Los Gatos, CA 95032
By submitting a request, your information is subject to TradePub.com's Privacy Policy.
Resources: | FAQ | Legal Notices