IT Management  >   Systems Operations  >   Security  >  

Data Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
Data Storage SecurityReports
 
Buyer's Checklist to Purpose-Built Storage for Virtual Servers
sponsored by SearchVirtualStorage.com
EBOOK: This Buyer's Checklist on Purpose-Built Storage for Virtual Servers describes how these storage systems differ from traditional arrays, provides insights into some of their unique features and offers guidance on evaluating, purchasing and deploying these storage systems.
Posted: 02 May 2014 | Published: 02 May 2014


Essential Data Protection and Disaster Recovery for Your Infrastructure
sponsored by Iron Mountain
DATA SHEET: Take a look at this exclusive resource to find out the key features of this vendor's backup solution, and calm your worries about implementing a successful disaster recovery solution.
Posted: 29 Jan 2014 | Published: 31 Dec 2011

Iron Mountain

Make Archiving an Enterprise Advantage
sponsored by EMC Corporation
WHITE PAPER: In this helpful white paper, uncover the best strategies for reducing expenses and removing IT storage complexity, including techniques like rationalizing application portfolios and decommissioning legacy systems.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

EMC Corporation

Reputational Risk and IT in the Digital Age
sponsored by IBM
WHITE PAPER: This white paper examines how security and business continuity can shape the reputation and value of your company in the digital age.
Posted: 26 Aug 2014 | Published: 31 Oct 2012

IBM

Case Study: Reducing DR Costs and Complexity
sponsored by IBM
CASE STUDY: Penn State Hershey's research and patient care centers rely on a huge volume of data, ranging from files generated by its imaging modality systems to patient records. Penn State Hershey turned to IBM's XIV storage system, which delivered the performance and availability to make their disaster recovery program feasible almost overnight.
Posted: 20 Nov 2013 | Published: 29 May 2012

IBM

A Practical Introduction to Enterprise Mobility Management
sponsored by Code42
WHITE PAPER: Check out this white paper to get a breakdown of how mobile device management (MDM) and mobile app management (MAM) can address today's challenges. Read on to get guidelines on how enterprise mobility management technology applies to your environment.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Code42

The Basics of Data Deduplication Solutions
sponsored by Dell Software
EGUIDE: This guide gives the basics of deduplication and focuses on how deduplication fits in with disaster recovery strategies. It also shows the advantages of hardware and software deduplication.
Posted: 20 Mar 2014 | Published: 20 Mar 2014

Dell Software

Case Study: SSB Wind Systems, End-To-End Service Mitigates Information Risks
sponsored by Iron Mountain
CASE STUDY: This short white paper discusses how one organisation transformed its data and records management processes through end-to-end off-site data protection and records management services.
Posted: 16 Oct 2013 | Published: 31 Dec 2012

Iron Mountain

Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: This short white paper explores 8 tips for safeguarding your business information in today's day and age.
Posted: 31 Jul 2013 | Published: 31 Jul 2013

Iron Mountain

Enterprise Data Backup - The Power of Recovery
sponsored by Rand Secure Data
WHITE PAPER: Explore this informative white paper to find out what is needed in a backup and restore solution to ensure that your data is safe, and how one vendor incorporates all these necessities into one, successful backup solution optimized for data security and recoverability.
Posted: 10 Mar 2014 | Published: 13 Jan 2014

Rand Secure Data
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement