IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Physical Data Destruction

RSS Feed    Add to Google    Add to My Yahoo!
Physical Data DestructionMultimedia (View All Report Types)
 
Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


How to Consolidate Identities for Office 365 and Cloud Access
sponsored by Radiant Logic, Inc.
WEBCAST: This webcast offers top, simple recommendations on how to extend existing identity and access management strategies to the cloud.
Posted: 18 Apr 2014 | Premiered: Apr 18, 2014

Radiant Logic, Inc.

Security and Compliance Best Practices for SaaS Providers
sponsored by CloudPassage
WEBCAST: This webcast reviews the latest trends in software architectures and delivery models, along with the issues software-as-a-service (SaaS) providers must take into consideration when developing security measures.
Posted: 02 Apr 2014 | Premiered: Apr 2, 2014

CloudPassage

Understand and Counter Insider Threats with Behavioral Analytics
sponsored by Hewlett-Packard Company
WEBCAST: This in-depth resource explores how to combat insider threats and what you can do to prevent them from causing devastating attacks.
Posted: 25 Feb 2014 | Premiered: Nov 14, 2013

Hewlett-Packard Company

A Day in the Life of a CIO
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive guide explores a day in the life of a CIO, highlighting their role in the enterprise and what they can do to enhance their IT productivity.
Posted: 03 Apr 2014 | Premiered: 03 Apr 2014

Cisco Systems, Inc.

Strength Through Integration: Securing the Mobile Enterprise
sponsored by Cisco Systems, Inc.
VIRTUAL ENVIRONMENT: This interactive webpage outlines some top security concerns for the growing mobile landscape and what you can do to best prevent cyber-attacks on your mobile devices.
Posted: 04 Apr 2014 | Premiered: 22 Jan 2014

Cisco Systems, Inc.

How-to Build High Performance Security for the Software-Defined Data Center
sponsored by Trend Micro
WEBCAST: This crucial webcast discusses how your organization can build a high-performance security strategy for the virtualized data center, outlining what kind of solutions to look for, what common challenges you might run into, and how to get the most from your virtualized environments.
Posted: 14 Apr 2014 | Premiered: Apr 9, 2014

Trend Micro

Endpoint Data Management: Protecting the Perimeter of the Internet of Things
sponsored by Code42
WEBCAST: This crucial webcast discusses how your organization can protect its perimeter and keep your endpoint data safe.
Posted: 21 Apr 2014 | Premiered: Apr 21, 2014

Code42

Email Security – Virtual Appliance
sponsored by Cisco Systems, Inc.
WEBCAST: This webcast features an email security virtual appliance that helps you better detect, predict, and prevent today's more targeted attacks.
Posted: 22 Apr 2014 | Premiered: Apr 22, 2014

Cisco Systems, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement