IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Tape Destruction

RSS Feed    Add to Google    Add to My Yahoo!
Tape Destruction White Papers (View All Report Types)
 
Who's Reading Your Old Disk Drives? Mitigating Risk and Liability through Data Eradication
sponsored by PeakData Services, Inc.
WHITE PAPER: One area that is often overlooked when protecting an organization's data is the security of data stored on magnetic disk. This white paper discusses the various options available for ensuring the protection of information stored on disk.
Posted: 10 Sep 2007 | Published: 10 Sep 2007

PeakData Services, Inc.

Data Deduplication: It’s not a question of if, rather where and when! What to Look for and What to Avoid
sponsored by Quantum Corporation
WHITE PAPER: This paper looks at the value of data de-duplication for optimizing data protection along with considerations about how to add it to your storage strategy most effectively.
Posted: 01 Oct 2010 | Published: 29 Sep 2010

Quantum Corporation

Drive Disposal Best Practices: Guidelines for Removing Sensitive Data Prior to Drive Disposal
sponsored by Seagate Technology
WHITE PAPER: When a hard drive is disposed, many times, the data is not fully removed - leading to serious consequences. This white paper provides guidelines and best practices to assist you in properly removing data on your hard drives prior to their disposal.
Posted: 13 Nov 2007 | Published: 01 Nov 2007

Seagate Technology

Taking Advantage of Multicore/Multiprocessor Technologies to Meet Today's Storage Needs
sponsored by Oracle India Pvt. Ltd
WHITE PAPER: This comprehensive white paper explores how Oracle's Sun ZFS Storage Appliances can perform complex processing for compression, deduplication, real-time storage analytics, and other advanced data services without slowing down I/O throughput and without costing more than competing solutions.
Posted: 17 May 2013 | Published: 24 Jun 2012

Oracle India Pvt. Ltd

Avoiding Self-Inflicted Security Breaches through Hard Drive Decommissioning
sponsored by Ensconce Data Technology, Inc.
WHITE PAPER: Download this white paper and discover how to help your client prevent financial loss, irreparable damage to the company's reputation, as well as civil and criminal liability for directors with an effective hard drive decommissioning solution.
Posted: 09 Nov 2006 | Published: 01 Jul 2006

Ensconce Data Technology, Inc.

Today's State of Endpoint Protection & Management
sponsored by Absolute
WHITE PAPER: Unravel these 5 endpoint protection myths that are preventing your organization from attaining total endpoint visibility.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Absolute

Building a Hybrid Cloud: Your Guide with Bluemix
sponsored by IBM
WHITE PAPER: Access this white paper to discover why a hybrid cloud approach is best for the future of integrated IT service delivery. Delve into three deployment models, and discover which best meets your application needs and provides the resiliency to deliver predictable, continuous service.
Posted: 17 Feb 2017 | Published: 17 Feb 2017

IBM

Better Collaboration Tools to Satisfy Both Employees and IT
sponsored by Box
WHITE PAPER: There's been an ongoing stigma associated with blocking collaboration tools due to security risks. Access this resource now to gain insight into how you can reinvent IT to enable effective enterprise collaboration and drive productivity without compromising.
Posted: 23 Feb 2017 | Published: 22 Feb 2017

Box

HOW TO SOLVE DATA RESIDENCY, PRIVACY, AND SECURITY ISSUES IN THE CLOUD
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Learn how to satisfy not only cloud regulations by establishing data residency, addressing privacy issues, and keeping it secure, but also the need to control and manage your cloud presence.
Posted: 23 Feb 2017 | Published: 22 Feb 2017

TOPICS:  Security
Symantec & Blue Coat Systems

Busting the Myth of the Malware “Silver Bullet”
sponsored by Intel Security
WHITE PAPER: This white paper explores how to architect an anti-malware and endpoint security toolbox that relies on coordinating multi-layer, sophisticated defense. Discover which technologies can be connected to bolster your security posture, and learn about 3 critical layers of defense for keeping up with modern threats.
Posted: 16 Feb 2017 | Published: 16 Feb 2017

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement