Search Results for: security_tutorial

Designing a redundant backup solution
Access this expert E-Guide to learn about designing a redundant backup solution and transitioning from tape to a disk backup appliance. Read on to explore the evolving case for disk-based backup.

TechTarget Storage

Cloud Backup Tutorial: How to Leverage Cloud Backup Services
This expert e-guide highlights the pros and cons of cloud backup services, how cloud storage is changing data protection and disaster recovery, and more.

eFolder

Unified communications etiquette guide: What to know, what to avoid
This e-guide takes a close look at UC etiquette: what you should know and what you need to avoid. Uncover the different types of strategies, applications, platforms and models you’ll need to help your organization streamline business processes with collaborative communications.

TechTarget Security

Your UCaaS Checklist
Evaluating UCaaS providers and cloud-based products can be overwhelming, especially as market growth continues throughout 2018. Access this e-guide to uncover 3 areas of criteria when assessing UCaaS vendors and learn how to ensure top security measures are in place, so you can embrace the many inherent benefits of UCaaS.

Intermedia Net

Cross Site Scripting
This paper explains how cross-site scripting (XSS) vulnerabilities give attackers the capability to inject client-side scripts into the application. Read on to learn how to prevent these vulnerabilities.

Veracode, Inc.

The Anatomy of a Cross-Site Scripting Campaign
XSS attacks are not new. What makes this particular situation unique is the process the ADC used to uncover the attack. Read this paper to find out so much more about XSS attacks.

Imperva

The Expanding Tiered Storage Model
This tutorial discusses the expanding tiered storage model and the additional paybacks you can see from adding SSDs and cloud into the mix.

Dell Compellent

Mobile EndPoint Security and Management - Best Practices
Learn more about today's mobility concerns and how to address them in this mobile security and management E-Guide. Read on and discover more about issues to address, tools to use and steps to take.

TechTarget Security

Deduplication Backup Basics for Small Businesses
Data deduplication is one of the hottest and must-have technologies in the storage world today. For companies that haven't yet implemented dedupe into their backup systems, the interest is growing. Read this expert E-Guide to learn the dedupe backup basics for small businesses.

Symantec Corporation

Virtual Desktop Infrastructure Tutorial: Part 1
This tutorial can help minimize your storage/VDI problems by outlining VDI considerations prior to implementation.

DellEMC and Intel®