1
  • Accredited methods of On-Site Data Destruction

    With the coming of the European Data Protection legislation later this year, what are the CESG accredited methods of data destruction and the implications of using companies who remove the assets from a clients site to carry out the data destruction and asset disposal off-site?

    Tigger015 pointsBadges:
  • How to handle data protection within an office and between offices

    How can I handle data protection within a privacy and security data transmitted within a single office and between the firms own office?

    patronela5 pointsBadges:
  • What’s the best way to save sensitive data in Windows 8?

    What's the best way of saving sensitive data to a local file in Windows 8? I'm developing a C# application that needs to store oAuth tokens/passwords. I've heard it was common in .NET to encrypt/decrypt data, but I don't have any experience with those mechanics. Is encryption still recommended or...

    ITKE344,995 pointsBadges:
  • Data protection options

    Data protection....I have been asked by a finance company to confirm my address which I did I was then asked to confirm my date of birth and I asked them to ask me another security question, they refused and the call ended. I am in the right to ask for another security question relating to data...

    english2810 pointsBadges:
  • What’s your top IT priority for 2013?

    In TechTarget's annual IT Priorities Survey of IT managers, data protection was #1 on respondents' list with over 56%. Server virtualization and network-based security take the next 2 spots. Do you agree with this list? If not, what's your top IT priority for 2013?

    Michael Tidmarsh29,685 pointsBadges:
  • Any applications to protect data on hard drives?

    I am wondering if there are any applications available in the market which would allow me to protect my hard drive data. Are there any tools which would prevent a hard drive from being accessible if it was removed from a computer and plugged into another computer or a portable hard drive case? I...

    Rizwandean120 pointsBadges:
  • Track confidential data being input to Windows Domain computers

    information being entered by any domain computer? We want to track confidential information and make sure it is not getting out of the company.

    Karl Gechlik9,860 pointsBadges:
  • SAP backup

    we are taking sap db backup using brbackup through data protection for SAP to TSM tapes....how can i restore these backup to new server?in this case ,file system backups also required to schedule?

    Jal5 pointsBadges:
  • Does Hyper-V/DPM offer Continuous Data Protection now or should we be considering a 3rd Party Vendor?

    Due to compliance regulations, Continuous Data Protection is critical to us. Does Hyper-V/DPM offer this now or should we be considering a 3rd Party Vendor? This question is from the 7/30 Microsoft Virtualization Chat on ITKnowledgeExchange.com

    ITKE344,995 pointsBadges:
  • Data protection features in SQL Server 2005

    Can you explain data protection features in SQL Server 2005?

    SQL Server Ask the Experts2,585 pointsBadges:
  • nCipher

    What platform does nCipher run on?

    Arfin285 pointsBadges:
1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

To follow this tag...

There was an error processing your information. Please try again later.

REGISTER or login:

Forgot Password?
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

Thanks! We'll email you when relevant content is added and updated.

Following