IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Disk Destruction

RSS Feed    Add to Google    Add to My Yahoo!
Disk Destruction White Papers (View All Report Types)
 
Data Deduplication: It’s not a question of if, rather where and when! What to Look for and What to Avoid
sponsored by Quantum Corporation
WHITE PAPER: This paper looks at the value of data de-duplication for optimizing data protection along with considerations about how to add it to your storage strategy most effectively.
Posted: 01 Oct 2010 | Published: 29 Sep 2010

Quantum Corporation

Taking Advantage of Multicore/Multiprocessor Technologies to Meet Today's Storage Needs
sponsored by Oracle India Pvt. Ltd
WHITE PAPER: This comprehensive white paper explores how Oracle's Sun ZFS Storage Appliances can perform complex processing for compression, deduplication, real-time storage analytics, and other advanced data services without slowing down I/O throughput and without costing more than competing solutions.
Posted: 17 May 2013 | Published: 24 Jun 2012

Oracle India Pvt. Ltd

Avoiding Self-Inflicted Security Breaches through Hard Drive Decommissioning
sponsored by Ensconce Data Technology, Inc.
WHITE PAPER: Download this white paper and discover how to help your client prevent financial loss, irreparable damage to the company's reputation, as well as civil and criminal liability for directors with an effective hard drive decommissioning solution.
Posted: 09 Nov 2006 | Published: 01 Jul 2006

Ensconce Data Technology, Inc.

Drive Disposal Best Practices: Guidelines for Removing Sensitive Data Prior to Drive Disposal
sponsored by Seagate Technology
WHITE PAPER: When a hard drive is disposed, many times, the data is not fully removed - leading to serious consequences. This white paper provides guidelines and best practices to assist you in properly removing data on your hard drives prior to their disposal.
Posted: 13 Nov 2007 | Published: 01 Nov 2007

Seagate Technology

Who's Reading Your Old Disk Drives? Mitigating Risk and Liability through Data Eradication
sponsored by PeakData Services, Inc.
WHITE PAPER: One area that is often overlooked when protecting an organization's data is the security of data stored on magnetic disk. This white paper discusses the various options available for ensuring the protection of information stored on disk.
Posted: 10 Sep 2007 | Published: 10 Sep 2007

PeakData Services, Inc.

Top 5 data centre trends to watch in 2015
sponsored by Dimension Data
WHITE PAPER: Access this white paper to explore what experts believe are the top trends to watch for data centers in 2015 and find out their expected impact on business.
Posted: 26 Feb 2015 | Published: 28 Nov 2014

Dimension Data

Forrester's Evaluation of Hosted Collaboration Service Providers
sponsored by NaviSite
WHITE PAPER: CIOs need to consider moving collaboration tools off-premises. Today, there is a burgeoning services sector that can deliver highly customized messaging, teaming, and real-time communication services for the enterprise. This report provides an overview of the market, giving CIOs a sense of the players, their capabilities, and their offerings.
Posted: 23 Feb 2015 | Published: 23 Feb 2015

NaviSite

Threat Trend: Threat Landscape Review
sponsored by Palo Alto Networks
WHITE PAPER: This exlusive security report identifies threats from malware over a wide array of applications by executing them in a virtual environment and observing their behavior. Read on to learn what was discovered, and what the new cybercrime trends are moving forward.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

Palo Alto Networks

PowerEdge VRTX—Simplicity, Efficiency and Versatility for ROBO and Small Office IT
sponsored by Dell, Inc. and Intel®
WHITE PAPER: This white paper explores an agile solutions platform for office IT. Read on to learn how this approach delivers simplified systems management that delivers simplicity, efficiency, and versatility for small and midsized offices.
Posted: 24 Feb 2015 | Published: 24 Feb 2015

Dell, Inc. and Intel®

[Security Identity Governance: Reduce Risk and Comply with Regulations
sponsored by IBM
WHITE PAPER: Access this white paper to discover how to effectively manage identities and application access while bringing together business operations and IT. Read on to learn how to bridge the gaps across compliance, and how this can reduce the risk of fraud, human error, and more.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement