Data Audits Reports

GDPR: Risk, opportunity and what it means for security professionals
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: This article in our Royal Holloway information security series explains why GDPR is necessary, what it means for security professionals, and how they can approach GDPR in a positive way.
Posted: 08 Feb 2021 | Published: 10 May 2018

TechTarget ComputerWeekly.com

UK police unlawfully processing over a million people's data on Microsoft 365
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The roll-out of Microsoft 365 to dozens of UK police forces may be unlawful, because many have failed to conduct data protection checks before deployment and hold no information on their contracts.
Posted: 08 Feb 2021 | Published: 21 Dec 2020

TechTarget ComputerWeekly.com

The Hidden Costs of "Free" Database Auditing Comparing the Total Cost of Ownership of Native Database Auditing Vs. Imperva Securesphere
sponsored by Imperva
PRODUCT LITERATURE: Read this white paper to learn more about alternate solutions that cost less and prevent unexpected hidden expenses.
Posted: 24 Jul 2007 | Published: 01 Jul 2007

Imperva

Big Data in Motion: Getting The Data To Where It’s Needed
sponsored by TechTarget App Architecture
EBOOK: Big data is great, but how do you get it all to the analytical engines? Read this white paper to learn how to start getting big data to where it's needed.
Posted: 25 Jan 2013 | Published: 31 Dec 2012

TechTarget App Architecture

Tax Revenue Management and Economic Vitality
sponsored by IBM
WHITE PAPER: This whitepaper offers essential advice for governments looking to maximize their resources while increasing their capabilities. Read on to see how analytics could be the answer, offering deeper value from your tax revenue streams.
Posted: 10 Nov 2015 | Published: 10 Nov 2015

IBM

AppDetective
sponsored by Application Security, Inc.
TRIAL SOFTWARE: Try this IT download today and see how it can help increase your company's overall security by locating, examining and fixing security holes within your network. Try Application Security's easy to use and deploy AppDetective tool today.
Posted: 17 Nov 2006 | Premiered: 01 Mar 2006

Application Security, Inc.

Setting the Stage for the Data Governance: A CIO's Guide
sponsored by IBM
EGUIDE: In this e-guide, brought to you by searchCIO.com, read about the five preconditions for success. Also, technology law expert Jeffrey Ritter discusses the increased focus on information governance strategy and how businesses should approach corporate information governance in the digital age.
Posted: 05 Aug 2013 | Published: 05 Aug 2013

IBM

5 Ways Hosting Providers Prepare Clients for PCI 3.0
sponsored by INetU Inc.
WHITE PAPER: This guide provides tips on how hosting providers can help clients comply with PCI 3.0. Read on to learn how you can find the right hosting provider for the needs of your organization.
Posted: 04 Apr 2014 | Published: 31 Dec 2013

INetU Inc.

Mobile Data Security Essentials for Your Changing, Growing Workforce
sponsored by CREDANT Technologies
WHITE PAPER: Download this white paper and learn about the four key requirements for implementing an effective and flexible, enterprise-class mobile security solution to secure your mobile data and devices.
Posted: 15 Feb 2007 | Published: 01 Feb 2007

CREDANT Technologies

The Business Case for Data Access Governance
sponsored by Varonis
WHITE PAPER: This white paper offers a comprehensive look at the many challenges data access management present the IT administrator in the enterprise environment. Learn more about the core issues and possible solutions to consider that address each one.
Posted: 01 Sep 2007 | Published: 31 Aug 2007

Varonis