SAP Security Reports

MicroScope – January 2022: Squaring up to ransomware
sponsored by MicroScope
EZINE: In this issue, discover how to best fend off the ever-increasing threat of ransomware, learn what the next stage of the data warehouse could be, and find out what leading channel experts believe awaits the industry in the year ahead
Posted: 06 Jan 2022 | Published: 07 Jan 2022

MicroScope

Data protection: Not just about personal data and compliance
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.
Posted: 08 Feb 2021 | Published: 18 Apr 2017

TechTarget ComputerWeekly.com

CW APAC, April 2021: Trend Watch: IoT in India
sponsored by TechTarget ComputerWeekly.com
EZINE: In this handbook, focused on the internet of things in India, Computer Weekly looks at the country's potential as an IoT hotspot.
Posted: 26 Apr 2021 | Published: 26 Apr 2021

TechTarget ComputerWeekly.com

MicroScope – May 2022: Charging at SME security challenges
sponsored by MicroScope
EZINE: With cyber threats growing, SMEs have to improve their security position, and the channel is best placed to support that aim. Read all about improving security, how sustainability is more important than ever in channel conversations, and the impact of hybrid working
Posted: 29 Apr 2022 | Published: 06 May 2022

MicroScope

Data Masking Best Practices for Copying Sensitive Data Into Non-Production Environments
sponsored by Oracle Corporation
WHITE PAPER: Download this paper to learn data masking best practices and enable your organization to safely use production data for development, testing, and sharing with out-source or off-shore partners, without risking a sensitive data breach.
Posted: 05 Dec 2011 | Published: 05 Dec 2011

Oracle Corporation

Server Optimization, Hardware and Virtualization
sponsored by DELL TECHNOLOGIES AND MICROSOFT
EGUIDE: In this expert e-guide, find out how to optimize SQL Server with the right choices for hardware, storage devices, and virtualization. Inside, find articles on: what not to do when purchasing hardware; if solid-state storage devices are worth the cost; hardware and risk considerations for an inevitable virtualization initiative.
Posted: 10 Jan 2012 | Published: 09 Jan 2012

DELL TECHNOLOGIES AND MICROSOFT

Your Personal Web Attack Survival Guide
sponsored by Imperva
WHITE PAPER: This white paper explains the latest hactivist and cybercriminal methods of attack, and presents a 7-step guide you can use to safeguard your website from attack.
Posted: 20 Feb 2014 | Published: 31 Dec 2013

Imperva

Implementing Database Security and Auditing - Authentication and Password Security
sponsored by IBM
EBOOK: In order to secure your database, you need an authentication process to identify users before allowing any activities. In this chapter, explore the authentication process and learn best practices for authentication and user account management.
Posted: 17 May 2011 | Published: 17 May 2011

IBM

Presentation Transcript: Disaster Recovery Planning and Security for the IT Industry
sponsored by IBM
PRESENTATION TRANSCRIPT: The biggest security issues are the ones that you don’t know about – and the reality is many businesses don’t truly know where they stand. Check out this presentation transcript from a SearchDisasterRecovery.com webcast to learn about today’s biggest security concerns and best practices for protecting your IT center.
Posted: 17 May 2011 | Published: 17 May 2011

IBM

Big data in the cloud: How to reduce data center infrastructure costs
sponsored by TechTarget Cloud Computing
WHITE PAPER: How can cloud computing help companies in the new world of big data? This expert handbook looks at some possible answers to this question.
Posted: 14 Oct 2013 | Published: 14 Oct 2013

TechTarget Cloud Computing