IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Tape Destruction

RSS Feed    Add to Google    Add to My Yahoo!
Tape Destruction Multimedia (View All Report Types)
 
Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

Cloud-Based Cybersecurity for Industrial IoT Apps
sponsored by Bayshore Networks
VIDEO: In this video, watch Bayshore Networks' Founder & Chief Scientist Francis Cianfrocca present a demo of the Bayshore IT/OT Gateway software blocking a targeted cyberattack on an industrial machine and learn how to create a secure industrial IoT.
Posted: 30 May 2017 | Premiered: 30 Nov 2016

Bayshore Networks

Security in a Mobile First World
sponsored by AVST
WEBCAST: Watch this webcast to learn mobile practices that will provide your business with secure mobile communications.
Posted: 14 Feb 2017 | Premiered: Dec 15, 2016

AVST

Master the Internet of Things
sponsored by VMware
WEBCAST: The Internet of Things (IoT) is ready to change the world, but it has a list of challenges to tackle. Watch this video to learn how you can use a single management platform that enables you to make the most of your IoT investment and overcome those challenges.
Posted: 30 May 2017 | Premiered: Aug 30, 2016

VMware

Ivanti Workspace Management - Secure and Optimize the Citrix Workspace
sponsored by Citrix Ready
WEBCAST: Attend this webinar to find out how the Ivanti products can help protect and secure Citrix desktops against ransomware, control application usage, reduce the number of Citrix images, and personalize users environments regardless of how they access their desktop. Accelerate your move to Citrix platforms and the Citrix cloud with Ivanti solutions.
Posted: 26 Jun 2017 | Premieres: Jul 20, 2017

Citrix Ready

Webinar: The Value of Extended Reality Technologies to Business
sponsored by Dell EMC - Workstation
WEBCAST: Tune in as experts reveal the value of augmented, virtual, and mixed reality, and evaluate their potential business impact. See how companies are developing both internal and customer facing applications with these technologies, and benchmark your success with AR, VR, and MR against them.
Posted: 13 Apr 2017 | Premiered: Apr 7, 2017

Dell EMC - Workstation

Protecting Sensitive Corporate Data Against the Full Spectrum of Mobile Risk
sponsored by Lookout
WEBCAST: Download this webcast to discover a full EMM platform that will protect sensitive corporate data against the full spectrum of mobile risks, from software vulnerabilities to behavior and configuration threats.
Posted: 26 Jun 2017 | Premiered: Jun 6, 2017

Lookout

Helping Companies Stay Secure with Machine Data
sponsored by Splunk
VIDEO: Watch this interview with Splunk CEO Douglas Merritt to learn about how his analytics program can help protect your organization by delivering analytics from all sectors of your business, creating a hybrid view of on-prem and cloud systems, and more.
Posted: 24 May 2017 | Premiered: 09 Feb 2017

Splunk

SWOT Assessment: IBM B2B Cloud Services
sponsored by IBM
WEBCAST: Discover the strengths, weaknesses, opportunities, and threats of IBM B2B Cloud Services in this Ovum analysis.
Posted: 20 Jan 2017 | Premiered: Jan 20, 2017

TOPICS:  IT Management
IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement