IT Management  >   Systems Operations  >   Security  >  

Tape Security

RSS Feed    Add to Google    Add to My Yahoo!
Tape SecurityWhite Papers (View All Report Types)
 
CIO survey All's not well at endpoints
sponsored by HP Autonomy
WHITE PAPER: This white paper explores the current endpoint security landscape and gives tips to help strike a balance between user experience for mobile workers and security requirements and control for IT.
Posted: 12 Aug 2014 | Published: 05 Mar 2014

HP Autonomy

Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: Check out this short, two-page document to explore 8 tips for safeguarding your business information in today's day and age. Read on to fortify your data protection strategy with these tips, including: 1) structure your data, 2) assess and treat associated data risks, 3) ensure you have a disaster recovery plan and 5 more expert tips.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Iron Mountain

Protecting Vital Business Data from Natural Calamities
sponsored by Iron Mountain
WHITE PAPER: In this article, explore the case for business continuity and check out some stats proving how necessary a disaster recovery/business continuity plan is in today's treacherous physical and digital climates. Read on now to learn what to consider when making a DR/BC assessment and take the best actions to protect what's yours.
Posted: 30 Nov 2012 | Published: 16 Oct 2012

Iron Mountain

Regulatory Compliance and Operational Readiness: Complementary, But Never Synonymous
sponsored by Iron Mountain
WHITE PAPER: This resource reveals why passing audits and being able to recover are certainly complementary, but definitely not synonymous. View now to learn the difference between the two - and the regulatory compliance requirements you should be aware of - to maintain compliance in your data protection strategy.
Posted: 16 Jul 2013 | Published: 31 May 2013

Iron Mountain

Legal Issues of Cloud Forensics
sponsored by Global Knowledge
WHITE PAPER: This white paper asks 5 essential questions about cloud forensics, revealing key issues a company or forensic examiner might face when collecting information from the cloud.
Posted: 11 Apr 2013 | Published: 11 Apr 2013

Global Knowledge

Best Practices for Shared Infrastructure Data Storage in the Federal Government
sponsored by MicroTech & Netapp
WHITE PAPER: Read this white paper to discover how the U.S. Federal Government is consolidating and improving storage operations with emerging virtualization and cloud technologies, and discover how similar solutions can benefit your business.
Posted: 07 May 2012 | Published: 31 Dec 2011

MicroTech & Netapp

Protect Data in VMware-Based Environments with IBM Tivoli Solutions
sponsored by IBM
WHITE PAPER: This brief resource examines the challenges of traditional backup and storage approaches in virtual environments, and introduces a unified platform that enables your organization to meet these challenges and effectively store, analyze, manage, and protect data.
Posted: 07 Nov 2013 | Published: 31 Jul 2013

IBM

The Data Archive Challenge: What’s Your Game Plan?
sponsored by Horison Information Strategies
WHITE PAPER: Learn how you can overcome the challenges associated with effectively archiving information in today's data-intensive IT environments. Learn about different types of archiving strategies, discover an emerging method known as hierarchical storage management (HSM), receive a step-by-step guide for building a long-term, scalable data archive and more.
Posted: 15 Mar 2012 | Published: 15 Mar 2012

Horison Information Strategies

Generating Proven Business Value with EMC Next- Generation Back Up and Recovery
sponsored by EMC & Arrow
WHITE PAPER: This white paper explores a few next-gen backup and recovery solutions that have been easily and affordably deployed in companies across all industries.
Posted: 14 Jun 2013 | Published: 31 Oct 2011

EMC & Arrow

Beyond Deduplication Rethinking Data Protection
sponsored by Syncsort
WHITE PAPER: Check out this white paper for a look into the challenges associated with dedupe that are still plaguing administrators, and discover the direction deduplication may be headed in. Also learn today's best practices for establishing a successful backup and recovery strategy.
Posted: 26 Mar 2012 | Published: 26 Mar 2012

Syncsort
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement