IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Physical Data Destruction

RSS Feed    Add to Google    Add to My Yahoo!
Physical Data Destruction Multimedia (View All Report Types)
 
Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


Evaluating Red Hat Virtualization
sponsored by Red Hat
SOFTWARE DEMO: Is your enterprise ready to securely and confidently virtualize mission-critical applications, while gaining unparalleled performance and scalability? Take advantage of this free trial of Red Hat Virtualization now to evaluate its compatibility with your organization.
Posted: 24 Jan 2017 | Premiered: 24 Jan 2017

Red Hat

Mobile Security In Action: How Enterprises Are Getting Ahead of Threats
sponsored by vmware airwatch
WEBCAST: Enterprises need to bolster their security programs to protect against new, unknown mobile threats, but understanding these risks requires visibility. Learn how Samsung is protecting its mobile employees, best practices for your own mobile security strategy, and more.
Posted: 19 Dec 2016 | Premiered: Dec 19, 2016

vmware airwatch

How SAIC Empowers Its Security Operations Center with Splunk
sponsored by Splunk
WEBCAST: In this webinar hear from Jonathan Jowers, SAIC chief security information officer as he discusses how SAIC powers its SOC and has improved its threat detection and investigations, while reducing costs and complexity. This webinar will also cover the best practices around IT security strategy, incident response, insourcing a SIEM, and more.
Posted: 09 Nov 2016 | Premiered: Nov 9, 2016

Splunk

Case Study: IT Automation at Allegiant Airlines
sponsored by Red Hat
VIDEO: Tune into this case study to see how Allegiant Airlines saves 10-15 man hours per week managing their Linux systems with an IT automation and configuration tool. Discover how to automate all systems simultaneously to empower DevOps initiatives within your enterprise.
Posted: 13 Jan 2017 | Premiered: 13 Jan 2017

Red Hat

The Essential Elements of a Modern B2B Architecture
sponsored by IBM
WEBCAST: B2B integration is vital for most companies. Consider these elements when evaluating your B2B architecture strategy.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Road Map: The Data Security and Privacy Playbook
sponsored by IBM
WEBCAST: Consider these five key characteristics when modernizing your legacy file transfer environment with MFT technology.
Posted: 28 Sep 2016 | Premiered: Sep 28, 2016

TOPICS:  IT Management
IBM

Capabilities for Security Information and Event Management
sponsored by Intel Security
WEBCAST: Compare critical capabilities across Security Information and Event Management vendors to choose the best SIEM solution.
Posted: 21 Sep 2016 | Premiered: Sep 21, 2016

TOPICS:  IT Management
Intel Security

Deutscher Wetterdienst's Flash Accelerated Weather Forecasts
sponsored by NetApp
VIDEO: See how DWD reduced weather forecast application response time from 15 seconds to 1 with NetApp All Flash FAS.
Posted: 26 Sep 2016 | Premiered: 26 Sep 2016

TOPICS:  IT Management
NetApp
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement