IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Disk Scrubbing

RSS Feed    Add to Google    Add to My Yahoo!
Disk ScrubbingMultimedia (View All Report Types)
 
Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


How to Eliminate Known Vulnerabilities with Patch Management
sponsored by Shavlik Technologies
PRODUCT DEMO: This exclusive IT download will let you try out a patch management solution that adds non-Microsoft third-party patch to Microsoft System Center Configuration Manager to maximize your investment in System Center and to reduce risks from unpatched third-party applications.
Posted: 13 Oct 2014 | Premiered: 13 Oct 2014

Shavlik Technologies

Java Insecurity: How to Deal with the Constant Vulnerabilities
sponsored by Lumension
WEBCAST: Access this on-demand webcast to hear from Randy Franklin Smith, from Ultimate Windows Security, as he discusses the wide-ranging Java security changes Oracle is promising to make. Also discover what you can do now to address Java security in your environment.
Posted: 06 Nov 2014 | Premiered: Nov 6, 2014

Lumension

Vulnerability Management: What you Need to Know to Prioritize Risk
sponsored by AlienVault
WEBCAST: This exclusive webcast covers the importance of prioritizing your vulnerabilities.
Posted: 10 Oct 2014 | Premiered: Oct 10, 2014

AlienVault

Risk & Compliance Monitoring
sponsored by Software AG
VIDEO: This exclusive video covers a platform-based solution with real-time analytics that can help you manage risk and stay compliant.
Posted: 07 Nov 2014 | Premiered: 07 Nov 2014

Software AG

Security Solutions for the Application Economy
sponsored by CA Technologies.
VIDEO: This video explores a leading solution for securing users's identities across all applications and devices.
Posted: 06 Nov 2014 | Premiered: 06 Nov 2014

CA Technologies.

SIEM missteps? Tips to Help you move Forward
sponsored by LogRhythm, Inc.
WEBCAST: Download this expert webcast now to learn about implementing the necessary practices for effective security information and event management use.
Posted: 24 Nov 2014 | Premiered: Nov 13, 2014

LogRhythm, Inc.

Demo: RSA Security Analytics: SIEM Use Case
sponsored by RSA
VIDEO: Watch this demo to discover RSA Security Analytics 10.4 in action as it solves a complex security information and event management (SIEM) use case.
Posted: 29 Oct 2014 | Premiered: 29 Oct 2014

RSA

How Often Should IT Security and Firewalls be Upgraded?
sponsored by Icomm Technologies
VIDEO: Download this exclusive video now to learn about important lifecycle consideration factors, like cost and firmware upgrades, and much more.
Posted: 30 Oct 2014 | Premiered: 30 Oct 2014

Icomm Technologies
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement