IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Disposal

RSS Feed    Add to Google    Add to My Yahoo!
Data Disposal Multimedia (View All Report Types)
 
Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


Modern Business Needs VDI to Soar
sponsored by VCE
VIDEO: Access this video to explore how VDI has changed over the years. Discover how a virtualization technology is partnering with a leading converged infrastructure solution to create a scalable, secure, high performing VDI solution and allowing for seamless transition into centrally managed, secure workspaces.
Posted: 11 Dec 2014 | Premiered: 11 Dec 2014

VCE

What's your Vision for the Future?
sponsored by CA Technologies.
VIDEO: Access this video to get a sense of what's ahead and find out how CA software and the mainframe will make ideas for the future into realities. You'll get insight into how this software and the mainframe will play a role in tomorrow's autonomous cars, applications for healthcare, and home automation.
Posted: 04 Nov 2014 | Premiered: 04 Nov 2014

CA Technologies.

Workload Automation SaaS to the rescue
sponsored by IBM
VIDEO: This video explains how workload automation can help automate both simple and complex business processes.
Posted: 04 Feb 2015 | Premiered: 07 Aug 2014

IBM

Rethinking the Paradigm of Advanced Threats
sponsored by SearchSecurity.com
VIRTUAL ENVIRONMENT: Peter Sullivan explores why enterprises are failing to detect Regin-style advanced threats, and discusses how to realign people, processes and technology to reduce the risk by giving enterprises a fighting chance.
Posted: 20 Jan 2015 | Premiered: 23 Jan 2015

SearchSecurity.com

How to Speed Up Detection of Advanced Attacks
sponsored by Threat Track Security
WEBCAST: This webcast provides guidelines for catching and stopping threats before they have time to do damage.
Posted: 16 Feb 2015 | Premiered: Dec 3, 2014

Threat Track Security

Your Chance to Test Drive a Comprehensive Security System
sponsored by AlienVault
SOFTWARE DEMO: This product demo gives you an opportunity to test drive a unified security management system.
Posted: 24 Feb 2015 | Premiered: 24 Feb 2015

AlienVault

Top 5 Vulnerability Management Mistakes
sponsored by Risk IO
WEBCAST: Download this important webcast now to learn about the top five most common vulnerability management mistakes.
Posted: 23 Jan 2015 | Premiered: Jan 23, 2015

Risk IO

Meet N-able Security Manager
sponsored by N-able Technologies
VIDEO: Access this brief video to learn about an industry-awarded and industry-leading anti-virus solution that meets the need of your business while still allowing you to remain profitable.
Posted: 23 Sep 2014 | Premiered: 25 Feb 2014

N-able Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement