Which of these would you find in Windows Task Manager?
How do you manage your data? In this video, you’ll learn the importance of creating security policies around data wiping, disposing of data, and data retention.
A common way to secure files and networks is through the use of access control lists. In this video, you’ll learn about ACLs and how they are used for network and file system security.
The state of a piece of data will assist in determining the best way to secure it. In this video, you’ll learn about securing data in-transit, at-rest, and in-use.
You can add additional security features by using hardware to assist with the encryption process. In this video, you’ll learn about trusted platform modules, hardware security modules, usb encryption, and hardware-assisted hard drive encryption.
If you want to keep your data safe, then you need to encrypt it. In this video, you’ll learn about encrypting full-disks, databases, individual files, removable media, and data on mobile devices.
Our data is becoming increasingly distributed, and our security strategies have changed to keep up with these dramatic changes. In this video, you’ll learn some best practices for protecting the data that week in the cloud and in our SAN.