IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Disposal

RSS Feed    Add to Google    Add to My Yahoo!
Data Disposal White Papers (View All Report Types)
 
Avoiding Self-Inflicted Security Breaches through Hard Drive Decommissioning
sponsored by Ensconce Data Technology, Inc.
WHITE PAPER: Download this white paper and discover how to help your client prevent financial loss, irreparable damage to the company's reputation, as well as civil and criminal liability for directors with an effective hard drive decommissioning solution.
Posted: 09 Nov 2006 | Published: 01 Jul 2006

Ensconce Data Technology, Inc.

Taking Advantage of Multicore/Multiprocessor Technologies to Meet Today's Storage Needs
sponsored by Oracle India Pvt. Ltd
WHITE PAPER: This comprehensive white paper explores how Oracle's Sun ZFS Storage Appliances can perform complex processing for compression, deduplication, real-time storage analytics, and other advanced data services without slowing down I/O throughput and without costing more than competing solutions.
Posted: 17 May 2013 | Published: 24 Jun 2012

Oracle India Pvt. Ltd

Data Deduplication: It’s not a question of if, rather where and when! What to Look for and What to Avoid
sponsored by Quantum Corporation
WHITE PAPER: This paper looks at the value of data de-duplication for optimizing data protection along with considerations about how to add it to your storage strategy most effectively.
Posted: 01 Oct 2010 | Published: 29 Sep 2010

Quantum Corporation

Who's Reading Your Old Disk Drives? Mitigating Risk and Liability through Data Eradication
sponsored by PeakData Services, Inc.
WHITE PAPER: One area that is often overlooked when protecting an organization's data is the security of data stored on magnetic disk. This white paper discusses the various options available for ensuring the protection of information stored on disk.
Posted: 10 Sep 2007 | Published: 10 Sep 2007

PeakData Services, Inc.

Drive Disposal Best Practices: Guidelines for Removing Sensitive Data Prior to Drive Disposal
sponsored by Seagate Technology
WHITE PAPER: When a hard drive is disposed, many times, the data is not fully removed - leading to serious consequences. This white paper provides guidelines and best practices to assist you in properly removing data on your hard drives prior to their disposal.
Posted: 13 Nov 2007 | Published: 01 Nov 2007

Seagate Technology

How Eurostar Managed Their Mobile Data, Increased Productivity & Reduced Cost
sponsored by Wandera
WHITE PAPER: Eurostar needed its mobile workforce to have access to the tools and data required for work while managing the associated costs. Being an international company, employees were travelling abroad on a daily basis so data roaming bills were excessive. Learn how they reduced bills by 40%, increased roaming productivity, and more.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

Wandera

NSS Labs Advanced Endpoint Protection Test Report
sponsored by McAfee, Inc.
WHITE PAPER: NSS Labs performed an independent and rigorous test of the McAfee Endpoint Security v10.5 product to see how it stacks up against the competition. This report provides detailed information about this product and its security effectiveness.
Posted: 18 Apr 2017 | Published: 14 Feb 2017

McAfee, Inc.

5 Ways to Make the Most of Your VMware Data Protection
sponsored by Veritas
WHITE PAPER: Learn five ways to simplify and transform the protection of your VMware physical and cloud environments.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

TOPICS:  IT Management
Veritas

Maximizing Data Protection in Your Hyper-V Environment
sponsored by Veritas
WHITE PAPER: Discover how to achieve near 100% backup and recovery success rates in a Hyper-V environment.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

TOPICS:  IT Management
Veritas

Some Deduplication Solutions Skimp on Security – Yours Doesn't Have To
sponsored by Dell EMC
WHITE PAPER: This white paper highlights must-have data security features deduplication should encompass. Access this resource now and learn about encryption capabilities that back up and protect data being replicated from one system to another, while preserving deduplication bandwidth.
Posted: 14 Apr 2017 | Published: 14 Apr 2017

Dell EMC
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement