IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Disk Scrubbing

RSS Feed    Add to Google    Add to My Yahoo!
Disk ScrubbingMultimedia (View All Report Types)
 
Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


Hitachi Solutions for Data Protection
sponsored by NTT Communications ICT Solutions and Hitachi Data Systems
VIDEO: Access this video to learn how Hitachi solutions for Data Protection address the challenges presented by exponential data growth and server virtualization. This demo also explains how Hitachi's unique approach leverages replication, backup and archive to overcome the most pressing data center challenges.
Posted: 30 Sep 2014 | Premiered: 23 Oct 2012

NTT Communications ICT Solutions and Hitachi Data Systems

Cisco Fast IT and Application Centric Infrastructure
sponsored by Cisco Systems, Inc.
VIDEO: Find out how you can connect your IT infrastructure and applications in order to improve business outcomes, while achieving a more accurate, better functioning infrastructure and a less complex and more efficient approach.
Posted: 24 Jul 2014 | Premiered: 30 Jun 2014

Cisco Systems, Inc.

Meet the N-able product family
sponsored by N-able Technologies
VIDEO: This video to gives you a brief overview of the N-central platform and capabilities. You'll also learn about the powerful modules that make this the leading RMM and MSP automation solution.
Posted: 23 Sep 2014 | Premiered: 08 Apr 2014

N-able Technologies

Data Breaches - Don't be a Headline!
sponsored by Absolute Software
WEBCAST: This webcast explains the aftermath of a data breach and what your organization can do to mitigate any risks surrounding data loss.
Posted: 19 Sep 2014 | Premiered: Sep 19, 2014

Absolute Software

Woolworths and Google: Innovating together
sponsored by Google
WEBCAST: Tune in to this in-depth webcast to learn how one company was able to implement widespread change within their business with the help of Google Apps for Business. Watch this webcast today, and discover how you can bring serious change to your organization and facilitate innovation within, with Google Apps for Business.
Posted: 19 Aug 2014 | Premiered: Jun 8, 2014

Google

Hit the Resource Management Jackpot: 4 Critical Success Factors for Project-Driven Resource Management
sponsored by Innotas
WEBCAST: Andy Jordan of Projects at Work discusses the 4 critical success factors for effective resource management and how to introduce these into your organization.
Posted: 13 Aug 2014 | Premiered: Feb 20, 2014

Innotas

Mobilizing Security Intelligence: LogRhythm's UX for Web and Tablet
sponsored by LogRhythm, Inc.
VIDEO: In this white paper, Seth Goldhammer, Director of Product Management, tours and showcases LogRhythm's new User Experience (UX) for Web and Tablet.
Posted: 31 Jul 2014 | Premiered: 21 Feb 2014

LogRhythm, Inc.

Live Demo: How to Detect a Cryptolocker Infection
sponsored by AlienVault
WEBCAST: This informative webcast explains how CryptoLocker, a type of ransomware, gains access to your computer, and how to use a Unified Security Management platform to monitor and detect these dangerous threats.
Posted: 23 Jul 2014 | Premiered: Jul 23, 2014

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement