IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Physical Data Destruction

RSS Feed    Add to Google    Add to My Yahoo!
Physical Data Destruction Multimedia (View All Report Types)
 
Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


Five Tips to Make your Data Protection Strategy more proactive
sponsored by Intel Security
WEBCAST: Gain critical albeit little-known tips & tactics to make your data protection strategy more proactive as analysts from the Foundstone Services' Detection and Response team deliver and an in-depth technical discussion on data loss prevention (DLP) policies, implementations, and deployments.
Posted: 17 May 2016 | Premiered: Apr 1, 2016

Intel Security

Increase productivity in a mobile world
sponsored by HPE and Intel®
WEBCAST: Supporting mobility is the key ingredient to increase employee productivity. Discover the challenges you face in implementing an effective mobile strategy and the 4 key steps to increase productivity.
Posted: 03 Jun 2016 | Premiered: Jun 3, 2016

HPE and Intel®

Ensuring Disaster Recovery and Business Continuity Through Hybrid Cloud
sponsored by Equinix
WEBCAST: Data storage experts discuss the benefits of leveraging agile and cost-effective hybrid cloud disaster recovery (DR) solutions to protect important data. Access now to see how hybrid cloud DR can enable your enterprise to reduce RTO and RPO, recovery full systems or individual files, and more.
Posted: 16 May 2016 | Premiered: Apr 18, 2016

Equinix

Addressing Cybersecurity in Healthcare Strategically
sponsored by Symantec Corporation
WEBCAST: What are the 3 major factors contributing to the increasing number of healthcare breaches? Find out what they are, and discover how you can best detect, respond and get ahead of threats as they are happening, and how you can best mitigate future attacks.
Posted: 23 May 2016 | Premiered: Apr 1, 2016

Symantec Corporation

Case study - Cherokee Investment Co.
sponsored by Citrix
VIDEO: Secure file sync and sharing is of high importance to every business. When a massive amount of information is being shared on a daily basis, maintaining security can seem like a full-time job. Watch this video now to learn how one investment company enabled secure file sharing and mobility to meet the collaboration needs of users.
Posted: 13 May 2016 | Premiered: 23 Feb 2015

Citrix

Encompass analytics and transaction processing with one platform
sponsored by IBM
WEBCAST: Infrastructure is vital to retrieving value from your data. Watch this brief video to learn about an end-to-end solution that brings analytics and transaction processing to your data, minimizing cost and complexity risk associated with moving data to another platform, and keeps everything you need in one platform.
Posted: 17 Jun 2016 | Premiered: Jun 30, 2015

IBM

Segmentation Beyond VLANs, Subnets, and Zones
sponsored by Illumio
WEBCAST: Uncover the issues that arise with managing software-defined networks and learn about a viable solution focusing on individual workloads utilizing virtual enforcement nodes, a policy computing engine, and plain language security policies. Listen in to learn more.
Posted: 15 Jun 2016 | Premiered: Jun 15, 2016

Illumio

Safeway Gains Visibility and Context into Attacks with Exabeam's Behavior Intelligence Solution
sponsored by Exabeam
VIDEO: User behavior analytics (UBA) is dynamic. It's imperative today to deal with the myriad of threats that organizations deal with daily. Accelerate your time to attack understanding, reduce response time and create a more efficient security operation with UBA.
Posted: 20 May 2016 | Premiered: 17 Feb 2015

Exabeam
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement