IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Disk Destruction

RSS Feed    Add to Google    Add to My Yahoo!
Disk Destruction Multimedia (View All Report Types)
 
Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

The State of Cloud Security: 2016 Survey Results
sponsored by CloudPassage
WEBCAST: Discover the top cloud adoption trends, security challenges, and paths to stronger protection confidence. In this webcast, view expert analysis of the key findings of 2016 for cloud security, including top security concerns in cloud adoption, the most effective security technologies to protect data in the cloud, and more.
Posted: 19 Jul 2016 | Premiered: Jul 19, 2016

CloudPassage

Webcast: Ongoing Management of Data Gravity
sponsored by Equinix
WEBCAST: With IT staff overworked, business leaders will sometimes go around protocol and seek 3rd party apps to keep their customers satisfied. However, this practice encourages app sprawl making it harder to manage your hybrid cloud environment. Watch part 3 of Croteau's presentation to see how to manage hybrid cloud and control app sprawl.
Posted: 14 Jul 2016 | Premiered: Jun 27, 2016

Equinix

Modernize and Simplify the Data Center with All-Flash
sponsored by EMC
WEBCAST: Witness how an all-flash solution with a dual active controller system that provides optimal performance, density, and cost. This simplified, flexible, modern flash solution can provide your enterprise with faster backup and recovery, integrated copy data management, built in encryption, and more.
Posted: 07 Jun 2016 | Premiered: Jun 7, 2016

EMC

The Top Five Requirements for Secure Enterprise File Sync and Sharing
sponsored by Citrix
WEBCAST: Before you consider a file sync and share solution for your organization, you need to make sure you can provide secure IT oversight. Go in-depth with four more critical requirements that'll ensure easy flexibility, integration, solid user experience and support for a modern workspace.
Posted: 28 Jun 2016 | Premiered: Jun 16, 2016

Citrix

Rapid Response Retainer Services
sponsored by Verizon
VIDEO: Discover the multiple functionalities and protections available to enterprises that embrace security retainer services for IT security.
Posted: 06 Jun 2016 | Premiered: 28 May 2015

Verizon

Introduction to Amazon's Desktop-as-a-Service Platform
sponsored by Amazon Web Services
VIDEO: Discover how managed desktops-as-a-service enables users to securely access the documents, applications, and resources they need with the device of their choice. You'll learn how you can deliver a high-quality desktop experience to any user.
Posted: 02 Jun 2016 | Premiered: 26 Feb 2016

Amazon Web Services

7 Best Practices to Secure Your Data on AWS
sponsored by Rackspace
WEBCAST: This webinar features two AWS-certified professionals who will help you understand how to secure your data on the AWS platform. They will discuss seven best practices for securing data at rest and how those strategies can decrease your risk of a catastrophic data leak.
Posted: 18 Jul 2016 | Premiered: Jun 15, 2016

Rackspace

22 Ways Global Firms are Increasing Security in 2016 Webcast Part 1
sponsored by Intel Security
WEBCAST: This webcast reviews security initiatives in order of their popularity for deployment. Access now to gain a quick understanding of both widely deployed technologies as well as insights into newer technologies that may impact enterprise information security.
Posted: 01 Jul 2016 | Premiered: Jun 1, 2016

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement