Data security & protection

Data security & protection News

View All News

Data security & protection Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Data security & protection Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Protecting data on the go

    Ever since the dawn of the BYOD era, personal and business data have comingled. Enterprise security pros need to not only secure company-owned devices; they must also protect the business data that ends up, inevitably, on smartphones, tablets and laptops that the employees own and carry everywhere.

    This technical guide considers in depth two recent security concerns: the security risks created by insecure implementation of cloud backups by mobile and the phenomena known as BYOD mobile app data slurping. Then, in our concluding chapter, we consider the best means to approaching mobile data protection today. We cover how to approach creating a mobile application security program that employees will accept and follow. We also consider when and how to employ a mobile app reputation service, in order to weed out which apps are likely malicious. Specific tools for mobile protection -- mobile device management and mobile application management tools -- are also discussed.

    This technical guide provides a collection of information on the latest threats to mobile data as well as advice on how to ensure your enterprise has the best mobile app security possible. Continue Reading

  • Violin 6000 Series enterprise all-flash arrays

    The Violin 6000 Series is a family of all-flash arrays for enterprises running large virtual infrastructures, big data analytics and more. Continue Reading

  • Rank colocation companies with this checklist

    Use this checklist to make fair and comprehensive comparisons between colocation data center providers. Continue Reading

View All Evaluate

Manage Data security & protection

Learn to apply best practices and optimize your operations.

View All Manage

Problem Solve Data security & protection Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • How to thwart the risks presented by SaaS products

    Employees love the ease of downloading apps. But IT needs to be vigilant in providing workers with what they want while maintaining security over SaaS products. Continue Reading

  • Enterprise data security best practices mean IT teamwork

    Data center managers take on the burden of protecting the business's data assets. Discover the best strategies to deploy firewalls, encryption and other tactics. Continue Reading

  • Healthcare providers navigating mobile health data roadblocks

    Successful implementations of mobile technology in healthcare organizations depend on strong IT management, from security hardware and best practices, to protect patient data. This edition of Pulse addresses the challenges healthcare IT professionals face when deploying mobile healthcare applications.

    In the cover story, SearchHealthIT news writer Shaun Sutner takes a look at trends in healthcare mobile security, and how IT professionals deal with the specter of a data breach. "It's not a matter of if it's going to happen, but when," explains one CISO.

    Also in this issue: SearchHealthIT news writer Kristen Lee checks in with IT professionals, who tell her "we are absolutely terrified" by the breadth of the threats facing healthcare organizations. Find out what steps they're taking to overcome that fear in this issue of PulseContinue Reading

View All Problem Solve

-ADS BY GOOGLE

SearchSolidStateStorage

SearchVirtualStorage

SearchCloudStorage

SearchDisasterRecovery

SearchDataBackup

Close