IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Degaussing

RSS Feed    Add to Google    Add to My Yahoo!
Degaussing Multimedia (View All Report Types)
 
Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

Cut Your IT Backlog by 50% in Minutes
sponsored by Intuit
WEBCAST: In this webcast, learn about the opportunities that cutting your IT backlog presents and how you can do it quickly. Explore the underlying issues behind shadow IT and IT backlogs, as well as the steps to implement a software option that can streamline IT.
Posted: 16 Dec 2015 | Premiered: Dec 16, 2015

Intuit

Improve Your Data Protection With a Backup Service Provider
sponsored by Carbonite
VIDEO: This webcast highlights the benefits of partnering with a backup service provider. Watch now to see how Carbonite can help improve your business continuity by providing you with the services you need for reliable data protection and backup.
Posted: 08 Dec 2015 | Premiered: 11 Aug 2015

Carbonite

Podcast: Cloud Access Security Brokers: Critical Capabilities
sponsored by BitGlass
PODCAST: This podcast will help you protect your network by providing prospective on the brokers specialized in guarding data over the cloud.
Posted: 13 Jan 2016 | Premiered: Jan 5, 2016

BitGlass

Office Move
sponsored by Dell, Inc. and IntelĀ®
VIDEO: In this lighthearted video, find out how one office move consisted of using Dell, Citrix, and Intel technology to help simplify the process. Watch now and you'll see how they were able to get systems up and running with very little work and time.
Posted: 22 Jan 2016 | Premiered: 22 Jan 2016

Dell, Inc. and IntelĀ®

PCI 3.0: Top 10 Ways PCI 3.0 Will Affect Your Application Security Program
sponsored by WhiteHat Security
WEBCAST: This recording of a live webcast provides a detailed description about how the newest PCI requirements will affect your application security program.
Posted: 01 Oct 2015 | Premiered: Dec 31, 2013

WhiteHat Security

Keep Data Safe, No Matter Who Tries to Look at It
sponsored by OptioLabs
VIDEO: This video explores the challenge of keeping prying eyes away from your sensitive data. Take a look and learn how face-recognition software can keep your data safe anywhere your end users work.
Posted: 07 Jan 2016 | Premiered: 07 Jan 2016

OptioLabs

What to Expect in 2016: Top 5 Predictions for Security and Access Control
sponsored by SecureAuth
WEBCAST: This informative webinar outlines the top 5 identity and access management trends for 2016. Tune in to learn what's on the horizon for IAM and take a closer look at next generation adaptive authentication so that you can stay a step ahead of the bad guys.
Posted: 24 Jan 2016 | Premiered: Jan 24, 2016

SecureAuth

How Enterprises Are Attacking the Cloud Security Challenge
sponsored by CloudPassage
WEBCAST: The aim of this webcast is to help you understand how data storage is changing and why we must change the way we secure it to ensure our data stays out of the wrong hands.
Posted: 15 Jan 2016 | Premiered: Dec 23, 2015

CloudPassage
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement