Data security & protection

Data security & protection News

View All News

Data security & protection Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Data security & protection Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Managed security service providers: Weighing the pros and cons

    Using a managed security service provider can be an appealing option to enterprises, but there are many factors to consider before making the move to outsourcing. Continue Reading

  • Protecting data on the go

    Ever since the dawn of the BYOD era, personal and business data have comingled. Enterprise security pros need to not only secure company-owned devices; they must also protect the business data that ends up, inevitably, on smartphones, tablets and laptops that the employees own and carry everywhere.

    This technical guide considers in depth two recent security concerns: the security risks created by insecure implementation of cloud backups by mobile and the phenomena known as BYOD mobile app data slurping. Then, in our concluding chapter, we consider the best means to approaching mobile data protection today. We cover how to approach creating a mobile application security program that employees will accept and follow. We also consider when and how to employ a mobile app reputation service, in order to weed out which apps are likely malicious. Specific tools for mobile protection -- mobile device management and mobile application management tools -- are also discussed.

    This technical guide provides a collection of information on the latest threats to mobile data as well as advice on how to ensure your enterprise has the best mobile app security possible. Continue Reading

  • Violin 6000 Series enterprise all-flash arrays

    The Violin 6000 Series is a family of all-flash arrays for enterprises running large virtual infrastructures, big data analytics and more. Continue Reading

View All Evaluate

Manage Data security & protection

Learn to apply best practices and optimize your operations.

  • Data governance in the digital age

    In the digital age, companies are generating, storing and maintaining a sometimes overwhelming amount of "big data." The trend has forced companies to alter -- and sometimes completely revamp -- information governance strategy. The constant threat of data breaches further complicates governance processes, while compliance rules require innovative methods to track and analyze information. All is not lost, however: With the right big data governance strategy, companies can make sure their information stays secure and compliant, while still taking advantage of the digital assets at their disposal. In this handbook, we’ll discuss the governance complications created by big data and employee mobility, and the latest information management strategies that help organizations adapt to increased storage needs, regulatory compliance mandates and security vulnerabilities unique to the digital age. Continue Reading

  • Proactive compliance opens new doors for efficiency

    Compliance initiatives are often prompted by legal or regulatory concerns, but a proactive approach is more likely to create return on investment. Continue Reading

  • How to protect corporate data from government surveillance

    News of government surveillance programs is appearing almost daily. Enterprises need to do what they can to protect corporate data from potential eavesdropping -- but how? Expert Kevin Beaver offers some best practices. Continue Reading

View All Manage

Problem Solve Data security & protection Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • How to thwart the risks presented by SaaS products

    Employees love the ease of downloading apps. But IT needs to be vigilant in providing workers with what they want while maintaining security over SaaS products. Continue Reading

  • Enterprise data security best practices mean IT teamwork

    Data center managers take on the burden of protecting the business's data assets. Discover the best strategies to deploy firewalls, encryption and other tactics. Continue Reading

  • Healthcare providers navigating mobile health data roadblocks

    Successful implementations of mobile technology in healthcare organizations depend on strong IT management, from security hardware and best practices, to protect patient data. This edition of Pulse addresses the challenges healthcare IT professionals face when deploying mobile healthcare applications.

    In the cover story, SearchHealthIT news writer Shaun Sutner takes a look at trends in healthcare mobile security, and how IT professionals deal with the specter of a data breach. "It's not a matter of if it's going to happen, but when," explains one CISO.

    Also in this issue: SearchHealthIT news writer Kristen Lee checks in with IT professionals, who tell her "we are absolutely terrified" by the breadth of the threats facing healthcare organizations. Find out what steps they're taking to overcome that fear in this issue of PulseContinue Reading

View All Problem Solve