51 Results for:DRM

  • Sort by: 

IBM Tivoli Storage Manager backup software tips

By Pierre Dorion 13 Apr 2009

IBM Tivoli Storage Manager (TSM) has been a popular data backup software product for more than 15 years. Learn about TSM implementation best practices, and how to troubleshoot common Tivoli Storage Manager issues. Read More

Map your data classification policy to controls effectively: How-to

25 Aug 2011

Data classification policy plays an important role in control implementation and effectiveness. We take a look at the involved parameters. Read More

Security Blog Log: The never-ending PatchGuard debate

26 Oct 2006

This week, security vendor fright over the Windows Vista PatchGuard feature permeates the blogosphere. Is Microsoft the boogeyman, or just misunderstood? Read More

Linux Malware Incident Response

31 Mar 2014

In this excerpt from Linux Malware Incident Response, authors Cameron Malin, Eoghan Casey and James Aquilina discuss volatile data collection methodology, steps and preservation. Read More

Upgrade your network: Network evolution and roadmap

17 Mar 2008

Network upgrades are essential to provide availability, reliability and security when you run voice and video on your data network. Read More

Tape encryption purchases Part Two: LTO-4 considerations

10 Oct 2007

This chapter covers specific considerations for LTO-4 tape drives. After that, you'll find a series of specifications to help compare vendor products. Read More

Security Bytes: George Mason U. hacked; new Trojans on the loose

10 Jan 2005

Hackers steal personal data of more than 30,000 members of George Mason University. Two new Trojans emerge. BMC Software buys a Parisian company. Read More

Springing leaks: Getting smart about data loss prevention

By Neil Roiter 01 Jun 2007

Companies are showing increased interest in data loss prevention (DLP) products, but they won't work well unless the business needs are understood and well defined. Read More

Rootkit and malware detection and removal guide

03 Jul 2007

This malware learning guide will provide several tips and tools on rootkit prevention, spyware and adware removal, antivirus tools, malware removal best practices and more. Read More

The importance of managing data assets

21 May 2009

Get an overview of data management and data lifecycle, learn how important managing data and data assets is and learn how to control data in this information management tutorial. Read More