IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Physical Data Destruction

RSS Feed    Add to Google    Add to My Yahoo!
Physical Data Destruction Multimedia (View All Report Types)
 
Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


Big Data Governance and Metadata Management
sponsored by Oracle Corporation
WEBCAST: View this webcast to learn how you can step up your data systems and manage Big Data effectively.
Posted: 24 Apr 2015 | Premiered: Apr 24, 2015

Oracle Corporation

Endpoint Security Benefits from Web-Based Platforms
sponsored by Absolute Software
WEBCAST: This brief webcasts highlights which features to look for in endpoint security technology. Tune in, and assess whether or not your current strategy has the following capabilities.
Posted: 07 May 2015 | Premiered: May 7, 2015

Absolute Software

An Inside Look at the Azure Active Directory
sponsored by Microsoft
VIDEO: In this video, learn about Microsoft's Azure Active Directory from a developer's standpoint and get a glimpse of the new identity features in Visual Studio 2015 that make it easy to secure applications with Azure AD
Posted: 01 May 2015 | Premiered: 01 May 2015

Microsoft

Using Backup Software For Secure, Offsite Data Protection
sponsored by Asigra
WEBCAST: Access this Q&A video to hear from Craig Cook, Director of OnDemand Services at Long View Systems, about why he chose Asigra for a secure backup solution that allowed the consulting and managed services provider to go to market with a cloud backup offering.
Posted: 07 Apr 2015 | Premiered: Aug 31, 2014

Asigra

Deliver Service Management and Unified Endpoint Management Software from a Single Platform
sponsored by FrontRange Solutions Inc.
VIDEO: This video discusses how IT can deploy service management and unified endpoint management software both on-premise and in the cloud from a single platform, allowing for greater automation and streamlined operations.
Posted: 20 Apr 2015 | Premiered: 13 Nov 2014

FrontRange Solutions Inc.

The State of Cloud Security: 2015 Survey Results
sponsored by CloudPassage
VIDEO: Join Holger Schulze, Founder of the Information Security Community on LinkedIn, Amrit Williams, CTO of CloudPassage, and Mitch Bishop, CMO for CloudPassage on this informative web seminar to learn what the current state of cloud security looks like.
Posted: 23 Apr 2015 | Premiered: 31 Mar 2015

CloudPassage

Understanding Today’s Global Privacy Requirements for Data Protection in the Cloud
sponsored by Druva Software
WEBCAST: Access this webinar to learn about changes in data privacy laws.
Posted: 02 Apr 2015 | Premiered: Apr 2, 2015

Druva Software

Roundtable Q&A with Forrester Research, Inc. and IBM
sponsored by IBM
VIDEO: Access this informative round table discussion to hear from security experts from Forrester and IBM about the top challenges and trends in data security. Learn how you can step up your security game to ensure your data is protected.
Posted: 12 Mar 2015 | Premiered: 12 Mar 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement