IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Physical Data Destruction

RSS Feed    Add to Google    Add to My Yahoo!
Physical Data Destruction White Papers (View All Report Types)
8 Criterias to Consider When Bringing eDiscovery In-House
sponsored by Zylab International, Inc.
WHITE PAPER: This white paper presents 8 factors to consider before pulling the trigger on bringing eDiscovery into your on-premises environment.
Posted: 25 Sep 2015 | Published: 02 Sep 2015

Zylab International, Inc.

Taking Advantage of Multicore/Multiprocessor Technologies to Meet Today's Storage Needs
sponsored by Oracle India Pvt. Ltd
WHITE PAPER: This comprehensive white paper explores how Oracle's Sun ZFS Storage Appliances can perform complex processing for compression, deduplication, real-time storage analytics, and other advanced data services without slowing down I/O throughput and without costing more than competing solutions.
Posted: 17 May 2013 | Published: 24 Jun 2012

Oracle India Pvt. Ltd

Drive Disposal Best Practices: Guidelines for Removing Sensitive Data Prior to Drive Disposal
sponsored by Seagate Technology
WHITE PAPER: When a hard drive is disposed, many times, the data is not fully removed - leading to serious consequences. This white paper provides guidelines and best practices to assist you in properly removing data on your hard drives prior to their disposal.
Posted: 13 Nov 2007 | Published: 01 Nov 2007

Seagate Technology

Who's Reading Your Old Disk Drives? Mitigating Risk and Liability through Data Eradication
sponsored by PeakData Services, Inc.
WHITE PAPER: One area that is often overlooked when protecting an organization's data is the security of data stored on magnetic disk. This white paper discusses the various options available for ensuring the protection of information stored on disk.
Posted: 10 Sep 2007 | Published: 10 Sep 2007

PeakData Services, Inc.

Avoiding Self-Inflicted Security Breaches through Hard Drive Decommissioning
sponsored by Ensconce Data Technology, Inc.
WHITE PAPER: Download this white paper and discover how to help your client prevent financial loss, irreparable damage to the company's reputation, as well as civil and criminal liability for directors with an effective hard drive decommissioning solution.
Posted: 09 Nov 2006 | Published: 01 Jul 2006

Ensconce Data Technology, Inc.

Data Deduplication: It’s not a question of if, rather where and when! What to Look for and What to Avoid
sponsored by Quantum Corporation
WHITE PAPER: This paper looks at the value of data de-duplication for optimizing data protection along with considerations about how to add it to your storage strategy most effectively.
Posted: 01 Oct 2010 | Published: 29 Sep 2010

Quantum Corporation

Compliance Made Easy
sponsored by HyTrust
WHITE PAPER: This resource introduces a comprehensive solution that can mitigate the risks of the virtualized infrastructure and support compliance with relevant regulatory requirements, including PCI, HIPAA and more.
Posted: 06 Oct 2015 | Published: 10 Aug 2015


Four Essential Fundamentals to Increasing Agility in the Cloud
sponsored by Commvault
WHITE PAPER: Access this white paper to learn about the 4 key elements that should be implemented to help your enterprise efficiently manage data protection and recovery operations. Read on to see how you can achieve a single point of control for both your on-premise and cloud-based data and improve your overall data protection.
Posted: 30 Sep 2015 | Published: 30 Sep 2015


Best Practices for Managing Archive Migrations
sponsored by QUADROtech
WHITE PAPER: This white paper outlines best practices for managing archive migrations. Read on to learn about the three biggest concerns that organizations face during data migrations and how to overcome them.
Posted: 01 Oct 2015 | Published: 01 Oct 2015


Enterprise Security in Asia 2015: The Ugly, The Bad & The Good
sponsored by F5 Networks
WHITE PAPER: This white paper reveals the truth about cybersecurity in Asia including a 52% surge in breaches and the emerging sophisticated schemes from hackers. View now to learn which attacks are most popular and how to avoid being the next data breach victim.
Posted: 01 Oct 2015 | Published: 13 Jan 2015

F5 Networks
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement