IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Tape Destruction

RSS Feed    Add to Google    Add to My Yahoo!
Tape Destruction Multimedia (View All Report Types)
 
Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


Steps to Secure the Industrial Internet of Things
sponsored by Bayshore Networks
VIDEO: By taking the complex physical machinery of manufacturing and connecting it to your network, you can drive down costs and unlock new levels of insights into sensor data. However, more connected devices also means more risk. Watch this brief video to learn about IDC's steps for securing industrial IoT (IIoT).
Posted: 30 May 2017 | Premiered: 29 Nov 2016

Bayshore Networks

Become a Champion of PCI Compliance by Minimizing Your Attack Surface
sponsored by Centrify Corporation
PRODUCT DEMO: Don't miss your chance to download a free trial of a privileged identity management tool that will help you meet the latest PCI DSS regulatory requirements. Access now to receive guidance on the best deployment option for your business needs, technical support for the duration of the evaluation process, and more.
Posted: 28 Jun 2017 | Premiered: 28 Jun 2017

Centrify Corporation

Ivanti Workspace Management - Secure and Optimize the Citrix Workspace
sponsored by Citrix Ready
WEBCAST: Watch this webinar to find out how the Ivanti products can help protect and secure Citrix desktops against ransomware, control application usage, reduce the number of Citrix images, and personalize users environments regardless of how they access their desktop. Accelerate your move to Citrix platforms and the Citrix cloud with Ivanti solutions.
Posted: 26 Jun 2017 | Premiered: Jul 20, 2017

Citrix Ready

Secure Coding Practices: Avoid SQL Injection
sponsored by WhiteHat Security
WEBCAST: SQL injections are one of the most common web-based attacks that have the potential to destroy key databases. Watch this webcast to learn more about SQL injections, how attackers execute them in different coding languages like Java and C#, and how best to defend against them.
Posted: 26 Jul 2017 | Premiered: Dec 31, 2016

WhiteHat Security

A Q&A About a Data Visibility System for AWS
sponsored by Gigamon
WEBCAST: Does cloud migration really mean loss of visibility and control over your data? Get this question answered in this Q&A webcast as well as explore the ins and outs of an individual visibility program for cloud security in AWS.
Posted: 06 Apr 2017 | Premiered: Nov 22, 2016

Gigamon

The Impact of IoT in the Manufacturing Sector
sponsored by Aruba Networks
VIDEO: Watch this brief video to learn how to connect IoT data from sensors on disparate devices to a single, common platform that allows manufacturers to bolster security, integrate siloed data and workflows, collaboratively share insights across teams, and more.
Posted: 06 Jun 2017 | Premiered: 27 Feb 2017

Aruba Networks

SSD Reliability, Performance Aid Flash Storage Adoption
sponsored by IBM
WEBCAST: Solid-state storage is most often considered to improve performance, but SSD reliability concerns may be unnecessary.
Posted: 06 Apr 2017 | Premiered: Apr 6, 2017

TOPICS:  IT Management
IBM

Chalk Talk: Strategies for Hybrid Cloud Storage
sponsored by IBM
VIDEO: George Crump and Douglas O'Flaherty talk about why hybrid cloud provides the best cost, flexibility and scalability.
Posted: 06 Apr 2017 | Premiered: 06 Apr 2017

TOPICS:  IT Management
IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement