IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Physical Data Destruction

RSS Feed    Add to Google    Add to My Yahoo!
Physical Data Destruction White Papers (View All Report Types)
 
Who's Reading Your Old Disk Drives? Mitigating Risk and Liability through Data Eradication
sponsored by PeakData Services, Inc.
WHITE PAPER: One area that is often overlooked when protecting an organization's data is the security of data stored on magnetic disk. This white paper discusses the various options available for ensuring the protection of information stored on disk.
Posted: 10 Sep 2007 | Published: 10 Sep 2007

PeakData Services, Inc.

Avoiding Self-Inflicted Security Breaches through Hard Drive Decommissioning
sponsored by Ensconce Data Technology, Inc.
WHITE PAPER: Download this white paper and discover how to help your client prevent financial loss, irreparable damage to the company's reputation, as well as civil and criminal liability for directors with an effective hard drive decommissioning solution.
Posted: 09 Nov 2006 | Published: 01 Jul 2006

Ensconce Data Technology, Inc.

Drive Disposal Best Practices: Guidelines for Removing Sensitive Data Prior to Drive Disposal
sponsored by Seagate Technology
WHITE PAPER: When a hard drive is disposed, many times, the data is not fully removed - leading to serious consequences. This white paper provides guidelines and best practices to assist you in properly removing data on your hard drives prior to their disposal.
Posted: 13 Nov 2007 | Published: 01 Nov 2007

Seagate Technology

Data Deduplication: It’s not a question of if, rather where and when! What to Look for and What to Avoid
sponsored by Quantum Corporation
WHITE PAPER: This paper looks at the value of data de-duplication for optimizing data protection along with considerations about how to add it to your storage strategy most effectively.
Posted: 01 Oct 2010 | Published: 29 Sep 2010

Quantum Corporation

Taking Advantage of Multicore/Multiprocessor Technologies to Meet Today's Storage Needs
sponsored by Oracle India Pvt. Ltd
WHITE PAPER: This comprehensive white paper explores how Oracle's Sun ZFS Storage Appliances can perform complex processing for compression, deduplication, real-time storage analytics, and other advanced data services without slowing down I/O throughput and without costing more than competing solutions.
Posted: 17 May 2013 | Published: 24 Jun 2012

Oracle India Pvt. Ltd

5 Data Management Tips to Build a Successful Multi-Cloud Strategy
sponsored by Veritas
WHITE PAPER: Many organizations are utilizing a multi-cloud strategy but without proper data management, this environment can increase costs and business risk. Learn how to maximize the benefits of the multi-cloud environment through these 5 data management tips.
Posted: 13 Oct 2017 | Published: 28 Apr 2017

Veritas

GDPR Strategy Guide
sponsored by Veritas
WHITE PAPER: The GDPR obliges businesses to understand and map how personal data flows throughout their organization in the form of Article 30 record. Jump start your compliance journey with this Veritas GDPR Strategy Guide to Article 30 creation.
Posted: 13 Oct 2017 | Published: 13 Oct 2017

Veritas

2017 Veritas GDPR Report Chapter 1
sponsored by Veritas
WHITE PAPER: According to the Veritas 2017 GDPR Report, 86% of organizations worldwide are concerned that a failure to adhere to the upcoming GDPR could have a major negative impact on their business.
Posted: 17 Oct 2017 | Published: 17 Oct 2017

Veritas

A Practical Guide for GDPR Compliance
sponsored by Smarsh
WHITE PAPER: GDPR is coming fast and complying with the regulation is not optional. In this research report, discover why GDPR is important, the essential requirements of it, and a checklist for GDPR compliance.
Posted: 06 Oct 2017 | Published: 31 Jul 2017

Smarsh

Threat Intelligence Evaluator's Guide
sponsored by AlienVault
WHITE PAPER: One of the most critical weapons that can be used in cyber defense is threat intelligence. This white paper reveals a threat intelligence guide to help you evaluate service providers, so that you can pick which is best for you in preventing, detecting, and responding to emerging threats.
Posted: 18 Oct 2017 | Published: 18 Oct 2017

AlienVault
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement