IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Disposal

RSS Feed    Add to Google    Add to My Yahoo!
Data Disposal Multimedia (View All Report Types)
 
Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


Modern Business Needs VDI to Soar
sponsored by VCE
VIDEO: Access this video to explore how VDI has changed over the years. Discover how a virtualization technology is partnering with a leading converged infrastructure solution to create a scalable, secure, high performing VDI solution and allowing for seamless transition into centrally managed, secure workspaces.
Posted: 11 Dec 2014 | Premiered: 11 Dec 2014

VCE

Penn State saves up to USD 300,000 per year by using IBM Endpoint Manager
sponsored by IBM
VIDEO: This exclusive video case study reveals the endpoint management solution Penn State University turned to in order to manage their heterogeneous distributed environments and reduce costs.
Posted: 30 Jan 2015 | Premiered: 30 Jan 2015

IBM

Manage and Protect Your Information with Information Governance
sponsored by OpenText
WEBCAST: This short video introduces information governance, a proven solution that makes it easy for your organization to maximize the value and minimize the risks of your information.
Posted: 13 Nov 2014 | Premiered: Nov 13, 2014

OpenText

Thrive, Survive or Perish - Compute Economics in the New Style of IT
sponsored by HP & Intel® (Processeur Intel® Xeon®)
WEBCAST: View this in-depth webcast to learn about the "new style" of IT and how you can leverage your staff to overcome the workload and data analytics pressures and obstacles presented today.
Posted: 29 Dec 2014 | Premiered: Nov 24, 2014

HP & Intel® (Processeur Intel® Xeon®)

Protect Your Customers' Data More Easily and Efficiently with a Company-Wide Backup Solution
sponsored by AVG Technologies
PRODUCT DEMO: Download this exclusive resource for a deal on an automated, company-wide backup solution.
Posted: 23 Dec 2014 | Premiered: 23 Dec 2014

AVG Technologies

Credit Union of Colorado Customer Testimonial
sponsored by CommVault
WEBCAST: This webcast to examines the management solution they decided to implement in order to achieve a true information management strategy and ensure recoverability and compliance.
Posted: 30 Dec 2014 | Premiered: Feb 14, 2014

CommVault

Zero Data Loss Recovery Appliance: Reinventing Database Protection
sponsored by Oracle Corporation
WEBCAST: View this informative webcast that dives deep into a recovery appliance that provides data protection for your always-on business. Learn about the unique benefits of this appliance, such as database protection as a service.
Posted: 05 Nov 2014 | Premiered: Nov 5, 2014

Oracle Corporation

Meet N-able Security Manager
sponsored by N-able Technologies
VIDEO: Access this brief video to learn about an industry-awarded and industry-leading anti-virus solution that meets the need of your business while still allowing you to remain profitable.
Posted: 23 Sep 2014 | Premiered: 25 Feb 2014

N-able Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement