RESEARCH CONTENT:
This article in our Royal Holloway Information Security series examines the implication of the state's collection of Internet Connection Records under the Investigatory Powers Act 2016.
EGUIDE:
How will you defend your organization from the threats posed by mobile devices? This expert E-Guide will help you understand the tools and controls you should be implementing to maintain security and protect sensitive data.
WEBCAST:
This exclusive video discusses a simple and flexible encryption solution that protects you data from the desktop to the cloud without impacting performance or productivity.
EGUIDE:
This expert e-guide makes the case for data deduplication technology and outlines how it works, its advantages, different dedupe misconceptions and how it factors into disaster recovery strategies. Read on to learn more.
WHITE PAPER:
This case study focuses on one organization that implemented device control to better manage its sensitive data across all endpoints and removable devices without any worry.
WHITE PAPER:
This white paper discusses how third party enhancements focused on security, archiving, and encryption can provide more capable, granular services than Microsoft offers in Office 365.
WHITE PAPER:
Backup encryption should be a key element in any security strategy. To achieve that goal, corporations should follow five best practices. This paper details them.
EGUIDE:
This expert e-guide explains how the limited scalability of source and target-based deduplication can lead to bottlenecks when large volumes of data are backed up. Learn how global deduplication can eliminate these bottlenecks through load balancing and get examples of these types of offerings in the marketplace.
WHITE PAPER:
As a proactive measure, the NIST has recommended that organizations eliminate 1024-bit RSA certificates in favor of stronger keys. Learn about the upcoming change in key lengths and find tips for managing your transition to using stronger certificates.