IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Disposal

RSS Feed    Add to Google    Add to My Yahoo!
Data Disposal Reports
 
A Security Assessment of Android Full-disk Encryption
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 01 Aug 2016 | Published: 02 Aug 2016

ComputerWeekly.com

Top tips for securing big data environments
sponsored by IBM
WHITE PAPER: This white paper explains the unique challenges of securing big data, including: high volume, variety, and velocity making it difficult to ensure data integrity; sensitive data in repositories; and more.
Posted: 29 Nov 2012 | Published: 31 Oct 2012

IBM

Five Myths About Encrypted SSDs
sponsored by Micron Technology
RESOURCE: Encryption of stored data is widely accepted as an effective and efficient way to protect sensitive information on self-encrypting drives (SEDs). However, there are numerous myths and misconceptions still prevalent. Check out this blog post and discover the truth behind the 5 most prevalent myths revolving around encrypted SSDs.
Posted: 21 Nov 2016 | Published: 21 Nov 2016

Micron Technology

Jericho Forum: Data Protection
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Data protection needs to provide stronger, more flexible protection mechanisms around the data itself, the Jericho Forum/Open Group argues in this report.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

ComputerWeekly.com

Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

E-Guide: What’s Out There Other Than Dedupe for Data Reduction Solutions?
sponsored by HPE and Intel®
ESSENTIAL GUIDE: This SearchDataBackup.com E-Guide discusses three data reduction solutions other than deduplication and how each works. Read on to learn more.
Posted: 12 Sep 2011 | Published: 12 Sep 2011

HPE and Intel®

Avoiding Self-Inflicted Security Breaches through Hard Drive Decommissioning
sponsored by Ensconce Data Technology, Inc.
WHITE PAPER: Download this white paper and discover how to help your client prevent financial loss, irreparable damage to the company's reputation, as well as civil and criminal liability for directors with an effective hard drive decommissioning solution.
Posted: 09 Nov 2006 | Published: 01 Jul 2006

Ensconce Data Technology, Inc.

Data Deduplication: It’s not a question of if, rather where and when! What to Look for and What to Avoid
sponsored by Quantum Corporation
WHITE PAPER: This paper looks at the value of data de-duplication for optimizing data protection along with considerations about how to add it to your storage strategy most effectively.
Posted: 01 Oct 2010 | Published: 29 Sep 2010

Quantum Corporation

Dell ProSupport Mobility Services
sponsored by Dell, Inc.
DATA SHEET: Dell ProSupport Mobility Services can help ensure you have the access, security and support you need to help keep your business running virtually anywhere in the world.
Posted: 09 Jan 2009 | Published: 09 Jan 2009

Dell, Inc.

Dell ProSupport Certified Data Destruction
sponsored by Dell, Inc.
DATA SHEET: The Certified Data Destruction Service can give Dell customers - from small businesses to large public companies and government agencies - peace of mind that your sensitive data stored on a failed hard drive will not fall into the wrong hands.
Posted: 09 Jan 2009 | Published: 09 Jan 2009

Dell, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement