IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Disk Destruction

RSS Feed    Add to Google    Add to My Yahoo!
Disk DestructionMultimedia (View All Report Types)
 
Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


The Data Center Life Cycle
sponsored by APC by Schneider Electric
VIDEO: Schneider Electric helps you focus on the Data Centre Life Cycle to keep your business agile to innovate and move forward. From assessing to designing and building and operating the data centre, Schneider works alongside you through the lifecycle as many times as you need to go through it.
Posted: 04 Nov 2014 | Premiered: 06 Nov 2013

APC by Schneider Electric

How important is it to have a secure and reliable web application infrastructure?
sponsored by Akamai Technologies
WEBCAST: This exclusive webcast takes an in-depth look at a web security solution that was able to deliver rock solid security without risking performance or cost. View now and take the first step towards a safer enterprise network.
Posted: 10 Nov 2014 | Premiered: Nov 10, 2014

Akamai Technologies

Java Insecurity: How to Deal with the Constant Vulnerabilities
sponsored by Lumension
WEBCAST: Access this on-demand webcast to hear from Randy Franklin Smith, from Ultimate Windows Security, as he discusses the wide-ranging Java security changes Oracle is promising to make. Also discover what you can do now to address Java security in your environment.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

Your Number One IT Security Tip is...
sponsored by Icomm Technologies
VIDEO: Tune in to this exclusive video now to learn the top tip for IT managers whose businesses are still likely vulnerable to attack.
Posted: 31 Oct 2014 | Premiered: 31 Oct 2014

Icomm Technologies

How to Detect System Compromise and Data Exfiltration
sponsored by AlienVault
WEBCAST: This exclusive webcast will show you how cyber criminals target your vulnerabilities and offers a demo of a unified security management platform to help you combat these attacks.
Posted: 09 Oct 2014 | Premiered: Oct 9, 2014

AlienVault

Simplified Third-Party Patching for Microsoft System Center with Shavlik
sponsored by Shavlik Technologies
WEBCAST: This exclusive webcast explores a solution that expands Microsoft System Center Configuration Manager's patching capabilities to cover third-party applications.
Posted: 14 Oct 2014 | Premiered: Oct 14, 2014

Shavlik Technologies

The Data Center Life Cycle: Operation Services
sponsored by APC by Schneider Electric
VIDEO: Offering scalable services, you can choose between vendor management for one point of contact off-site, managed maintenance for a dedicated Schneider professional in your data centre, or the popular facility operations option to employ a full time in-house staff.
Posted: 04 Nov 2014 | Premiered: 06 Mar 2014

APC by Schneider Electric

Understanding the Ins & Outs of Java Vulnerabilities and What to do About it
sponsored by Lumension
WEBCAST: Many companies are calling for the death of Java, citing too many security vulnerabilities and risks to keep the platform sustainable. View this on-demand webcast to find out how to eliminate as much exploitable surface area as possible on your critical endpoints.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement