IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Disk Scrubbing

RSS Feed    Add to Google    Add to My Yahoo!
Disk Scrubbing Multimedia (View All Report Types)
 
Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


App Refactoring: How to Extend Application Virtualization
sponsored by StarMobile
WEBCAST: In this webcast, Todd Bryburger from StarMobile joins Brian Madden to discuss app refactoring, and how to extend application virtualization to capitalize on all enterprise mobility spaces.
Posted: 30 Jul 2015 | Premiered: Jul 30, 2015

StarMobile

Micro-Segmentation with NSX – New Value for VCE
sponsored by VMware
WEBCAST: This video discusses deploying micro-segmentation inside of your virtual network.
Posted: 20 Aug 2015 | Premiered: Aug 20, 2015

VMware

Secure Your Printers and Eliminate Wasteful Costs
sponsored by Nuance
WEBCAST: This brief webcast explores how to reign in printing services in the organization to protect enterprise data. View now to discover how to stop data leaks before they happen and how to eliminate help desk tickets.
Posted: 27 Jul 2015 | Premiered: Feb 13, 2015

Nuance

Mobile Threat Management - Detecting and Preventing App Attacks
sponsored by IBM
WEBCAST: In this brief webcast, you will learn how to detect, analyze, and prevent mobile threats against the enterprise.
Posted: 11 Aug 2015 | Premiered: Jul 29, 2015

IBM

Building an IT Infrastructure for SAP HANA with Dell and Red Hat
sponsored by Red Hat, Dell and SAP
WEBCAST: This webcast discusses how you can retailor your IT infrastructure and architecture to meet the needs of SAP HANA and speed up your business.
Posted: 12 Aug 2015 | Premiered: Jul 31, 2015

Red Hat, Dell and SAP

Healthcare Data Security in the Private Cloud
sponsored by BlueBox
WEBCAST: This brief webcast explores how one healthcare organization, BioIQ, configured their private cloud architecture to protect sensitive medical data. View now to learn how the private cloud can protect sensitive data at rest and more.
Posted: 28 Aug 2015 | Premiered: Jul 22, 2015

BlueBox

2015 Information Security Trends: What's Next?
sponsored by Cyveillance, Inc.
WEBCAST: This webinar examines what information security and threat analysts can expect in 2015. Topics will include using threat intelligence before and after data breaches, information sharing, the Internet of Things, and the role of the CISO.
Posted: 15 Jul 2015 | Premiered: Feb 26, 2015

Cyveillance, Inc.

Why Layered Security May Not Be Enough
sponsored by Malwarebytes Corporation
PODCAST: This podcast explores why the typical layered security approach is full of holes and outlines steps you can take fill these holes.
Posted: 20 Aug 2015 | Premiered: Jul 27, 2015

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement