Premium Content

Access "Data protection plans for complying with privacy laws"


Sponsored by &

This e-book, brought to you by and, discusses how to build a successful data protection plan, as well as how to use database security auditing tools, how to secure your mainframe, laptop encryption and more!  Access >>>

Table of contents

  • Build your data protection strategy
  • Database security auditing tools
  • How good is your mainframe?
  • Laptop lockdown: Encryption decisions

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

More Premium Content Accessible For Free

  • Technology tools, policies for a corporate compliance program

    At many organizations, departments operate in silos, with a lack of communication leading to redundant or inefficient processes. But business leaders...

  • Cloud computing risk management, governance and compliance

    Cloud computing risk management, governance and compliance processes are evolving as organizations increasingly turn to cloud services for storage, ...

  • Enterprise compliance and security: The ties that bind

    Enterprise compliance and security departments sometimes have a fractious relationship, the two essential functions struggling to establish common ...