IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Degaussing

RSS Feed    Add to Google    Add to My Yahoo!
Degaussing White Papers (View All Report Types)
 
Who's Reading Your Old Disk Drives? Mitigating Risk and Liability through Data Eradication
sponsored by PeakData Services, Inc.
WHITE PAPER: One area that is often overlooked when protecting an organization's data is the security of data stored on magnetic disk. This white paper discusses the various options available for ensuring the protection of information stored on disk.
Posted: 10 Sep 2007 | Published: 10 Sep 2007

PeakData Services, Inc.

Drive Disposal Best Practices: Guidelines for Removing Sensitive Data Prior to Drive Disposal
sponsored by Seagate Technology
WHITE PAPER: When a hard drive is disposed, many times, the data is not fully removed - leading to serious consequences. This white paper provides guidelines and best practices to assist you in properly removing data on your hard drives prior to their disposal.
Posted: 13 Nov 2007 | Published: 01 Nov 2007

Seagate Technology

Data Deduplication: It’s not a question of if, rather where and when! What to Look for and What to Avoid
sponsored by Quantum Corporation
WHITE PAPER: This paper looks at the value of data de-duplication for optimizing data protection along with considerations about how to add it to your storage strategy most effectively.
Posted: 01 Oct 2010 | Published: 29 Sep 2010

Quantum Corporation

Avoiding Self-Inflicted Security Breaches through Hard Drive Decommissioning
sponsored by Ensconce Data Technology, Inc.
WHITE PAPER: Download this white paper and discover how to help your client prevent financial loss, irreparable damage to the company's reputation, as well as civil and criminal liability for directors with an effective hard drive decommissioning solution.
Posted: 09 Nov 2006 | Published: 01 Jul 2006

Ensconce Data Technology, Inc.

Taking Advantage of Multicore/Multiprocessor Technologies to Meet Today's Storage Needs
sponsored by Oracle India Pvt. Ltd
WHITE PAPER: This comprehensive white paper explores how Oracle's Sun ZFS Storage Appliances can perform complex processing for compression, deduplication, real-time storage analytics, and other advanced data services without slowing down I/O throughput and without costing more than competing solutions.
Posted: 17 May 2013 | Published: 24 Jun 2012

Oracle India Pvt. Ltd

Three Reasons a Secure Web Gateway is Vital for your Security Stance
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: According to IDC, by 2020 there will be 105.4 million mobile workers. With this hike, mobile and web security cannot be compromised. This white paper describes what a secure web gateway (SWG) offers and 3 main reasons it is a vital component of your layered defense strategy.
Posted: 09 Oct 2017 | Published: 09 Oct 2017

Symantec & Blue Coat Systems

Amazon Web Services: Risk and Compliance
sponsored by Amazon Web Services
WHITE PAPER: Key into this white paper to explore a basic approach to evaluating AWS controls as well as AWS-specific information around general cloud computing compliance questions.
Posted: 11 Oct 2017 | Published: 31 May 2017

Amazon Web Services

From Managing Desktops to Workspaces: A Practical Guide
sponsored by VMware
WHITE PAPER: Discover how using a unified platform for the provisioning, management, and policy enforcement of apps to devices across iOS, Android, and Windows will bolster digital workspace management. Read on to learn when to publish apps vs. providing entire desktops, and more.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

VMware

Amazon Web Services: Overview of Security Processes
sponsored by Amazon Web Services
WHITE PAPER: You may be wondering, "how does AWS help ensure that my data is secure?" This document delivers the answer to this question and is intended to provide an overview of the security processes involved with Amazon Web Services.
Posted: 16 Oct 2017 | Published: 31 May 2017

Amazon Web Services

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: In a recent Verizon study, there were 2,260 confirmed data breaches in 82 countries with 40% resulting directly from web app attacks. Gain a deeper understanding about app security and uncover 3 steps to reach AppSec maturity.
Posted: 04 Oct 2017 | Published: 04 Oct 2017

Veracode, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement