IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Disk Destruction

RSS Feed    Add to Google    Add to My Yahoo!
Disk DestructionWhite Papers (View All Report Types)
 
Iron Mountain Customers Share Compliance, Litigation and Discovery Best Practices
sponsored by Iron Mountain
WHITE PAPER: This paper showcases how customers of the world's largest records management consulting practice address their own compliance and discovery requirements with the help of this company's intellectual property, practical advice and best practices. Read on to access short testimonials and descriptions of the services available.
Posted: 24 Aug 2012 | Published: 24 Aug 2012

Iron Mountain

Regulatory Compliance and Operational Readiness: Complementary, But Never Synonymous
sponsored by Iron Mountain
WHITE PAPER: This resource reveals why passing audits and being able to recover are certainly complementary, but definitely not synonymous. View now to learn the difference between the two - and the regulatory compliance requirements you should be aware of - to maintain compliance in your data protection strategy.
Posted: 16 Jul 2013 | Published: 31 May 2013

Iron Mountain

Guide to Improving Your Tape Storage Practices
sponsored by Iron Mountain
WHITE PAPER: Proper security of data backups doesn’t just happen. It requires thoughtful planning and careful controls. Given the implications of failure – reputational damage, direct costs, compliance issues, and sub-optimal business operations - companies owe it to themselves to take data backup security seriously.
Posted: 13 May 2011 | Published: 13 May 2011

Iron Mountain

Convenient, Compliant, and Cost-effective Information Destruction
sponsored by Iron Mountain
WHITE PAPER: 56% of organizations’ sensitive or confidential information is still contained on paper documents. Discover the advantages of adding a secure shredding strategy to your information destruction program and gain the peace of mind that your company’s information is safe, even after it’s been destroyed.
Posted: 14 Jun 2012 | Published: 01 Jun 2012

Iron Mountain

Data Deduplication: It’s not a question of if, rather where and when! What to Look for and What to Avoid
sponsored by Quantum Corporation
WHITE PAPER: This paper looks at the value of data de-duplication for optimizing data protection along with considerations about how to add it to your storage strategy most effectively.
Posted: 01 Oct 2010 | Published: 29 Sep 2010

Quantum Corporation

Avoiding Self-Inflicted Security Breaches through Hard Drive Decommissioning
sponsored by Ensconce Data Technology, Inc.
WHITE PAPER: Download this white paper and discover how to help your client prevent financial loss, irreparable damage to the company's reputation, as well as civil and criminal liability for directors with an effective hard drive decommissioning solution.
Posted: 09 Nov 2006 | Published: 01 Jul 2006

Ensconce Data Technology, Inc.

Who's Reading Your Old Disk Drives? Mitigating Risk and Liability through Data Eradication
sponsored by PeakData Services, Inc.
WHITE PAPER: One area that is often overlooked when protecting an organization's data is the security of data stored on magnetic disk. This white paper discusses the various options available for ensuring the protection of information stored on disk.
Posted: 10 Sep 2007 | Published: 10 Sep 2007

PeakData Services, Inc.

Taking Advantage of Multicore/Multiprocessor Technologies to Meet Today's Storage Needs
sponsored by Oracle India Pvt. Ltd
WHITE PAPER: This comprehensive white paper explores how Oracle's Sun ZFS Storage Appliances can perform complex processing for compression, deduplication, real-time storage analytics, and other advanced data services without slowing down I/O throughput and without costing more than competing solutions.
Posted: 17 May 2013 | Published: 24 Jun 2012

Oracle India Pvt. Ltd

Drive Disposal Best Practices: Guidelines for Removing Sensitive Data Prior to Drive Disposal
sponsored by Seagate Technology
WHITE PAPER: When a hard drive is disposed, many times, the data is not fully removed - leading to serious consequences. This white paper provides guidelines and best practices to assist you in properly removing data on your hard drives prior to their disposal.
Posted: 13 Nov 2007 | Published: 01 Nov 2007

Seagate Technology

Presentation Transcript: Emailing Archiving: Why Your Emails Need Protection and Preservation-Today
sponsored by Insight
WHITE PAPER: This exclusive resource examines the best practices and key factors of email security, as well as an in-depth look at the benefits associated with this solution. Read on to learn more.
Posted: 30 Oct 2014 | Published: 30 Oct 2014

Insight
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement