IT Management  >   Systems Operations  >   Security  >  

Disk Security

RSS Feed    Add to Google    Add to My Yahoo!
Disk SecurityWhite Papers (View All Report Types)
 
Legal Issues of Cloud Forensics
sponsored by Global Knowledge
WHITE PAPER: This white paper asks 5 essential questions about cloud forensics, revealing key issues a company or forensic examiner might face when collecting information from the cloud.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Global Knowledge

Who's Got the Talent? Build an A-List Backup Team
sponsored by Iron Mountain
WHITE PAPER: The key to a successful disaster recovery strategy is planning. Read this white paper to learn about the importance of being proactive about potential problems, discover how you can properly rehearse for disaster and understand the importance of knowing who's in charge of what when the time comes. Read on for more.
Posted: 29 Feb 2012 | Published: 29 Feb 2012

Iron Mountain

Make storage stress-free
sponsored by Hewlett-Packard Limited
WHITE PAPER: Learn more about how you can resolve your storage challenges without increasing your budget or creating steep learning curves. Identify your key limitations by consulting this resource and learning where you can improve.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

Hewlett-Packard Limited

Ticking the Right Box: Compliant Archiving of Non-Public Personal Information
sponsored by Iron Mountain
WHITE PAPER: Explore this white paper to find out the choices you have in implementing physical asset confirmation audit practices.
Posted: 14 Jan 2014 | Published: 31 Dec 2013

Iron Mountain

Before You Renew With Your Legacy Backup Software
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper explores five questions to ask when choosing a backup solution. Discover key considerations that will enable you to make a smart and informed decision.
Posted: 29 Apr 2013 | Published: 29 Apr 2013

CommVault Systems, Inc.

Unclutter Your Data Center With Consolidated Log Management
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, explore a consolidated logging system to avoid the risks that may occur in a complex IT environment, and feel confident in running a reliable and secure virtual data center.
Posted: 17 Oct 2013 | Published: 13 Jun 2013

VMware, Inc.

Critical Need For Edge Data Protection
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper highlights the challenges involved with protecting edge data. It also highlights a solution that is lightweight, easy-to-use, scalable and comprehensive.
Posted: 28 Feb 2014 | Published: 31 Jan 2012

CommVault Systems, Inc.

IBM Smarter Storage, an integral part of IBM Smarter Computing
sponsored by CDW and IBM
WHITE PAPER: This guide gives information on a strategic approach to storage that allows for greater storage capabilities and greater efficiency over traditional approaches to storage. It also talks about the benefits of storage virtualization.
Posted: 28 Mar 2014 | Published: 30 Jun 2012

CDW and IBM

Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: This short white paper explores 8 tips for safeguarding your business information in today's day and age.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Iron Mountain

Managing Data through Replication: Avoiding Errors, Improving Access
sponsored by Dell Software
WHITE PAPER: Learn the ins and outs of data replication with this brief from the Center for Digital Government, and gain insight into how it works, what it offers and it's appeal to IT professionals.
Posted: 15 May 2014 | Published: 15 May 2014

Dell Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement