IT Management  >   Systems Operations  >   Security  >  

Data Storage Security

RSS Feed    Add to Google    Add to My Yahoo!
Data Storage Security Reports
IBM vs. EMC Data Protection Platforms: A Competitive Test and Evaluation Report
sponsored by TCM/IBM
WHITE PAPER: This white paper evaluates two commercially available storage solutions, EMC vs. IBM, in a backup and retrieval scenario and focuses on the throughput and scalability they both bring to the table. Read on to see what solution can provide you with the right data protection for your enterprise and can fulfill your performance and scalability needs.
Posted: 02 Nov 2015 | Published: 02 Nov 2015


Security in the Cloud: Tips on How to Protect Your Data
sponsored by Procore
WHITE PAPER: This white paper outlines the basics of cloud storage security and the capabilities to look for in providers to ensure data protection.
Posted: 27 Aug 2015 | Published: 05 Aug 2015


Enabling and Optimizing Hybrid IT Operations
sponsored by IBM
WHITE PAPER: This informative document offers advice on how to implement an intelligent hybrid IT security approach that will effectively protect your data. Read how best to incorporate a seamless, new generation of security services
Posted: 11 Sep 2015 | Published: 31 Jul 2015


The ABC's of Big Data
sponsored by NetApp
WHITE PAPER: This white paper considers the problems posed by the explosion of big data and provides a framework for evaluating new infrastructure requirements.
Posted: 13 Jun 2013 | Published: 31 Dec 2012


Enterprise File Sharing Without Giving Up Control of IT Functions
sponsored by Red Hat
WHITE PAPER: Read this white paper and discover how the Red Hat Gluster Storage solution enhances workforce productivity without handing over control of IT functions to public cloud service providers.
Posted: 29 Jun 2015 | Published: 27 Feb 2015

Red Hat

Is Your High-Value Data Safe?
sponsored by Imation Corp.
WHITE PAPER: This resource discusses how you can keep your most valuable data out of hackers' hands with a range of advanced technologies, including encryption and stronger authentication.
Posted: 19 Oct 2015 | Published: 19 Oct 2015

Imation Corp.

Is Your High-Value Data Safe?
sponsored by Imation Corp.
WEBCAST: This webcast discusses how you can build security architecture that safeguards your data at every stage of the data lifecycle.
Posted: 04 Sep 2015 | Premiered: Aug 27, 2015

Imation Corp.

Data Protection for SharePoint and Exchange: A guide for MSPs
sponsored by Kroll Ontrack, Inc.
EGUIDE: This E-Guide explores the evolution of backup functionalities in Exchange Server 2010 and offers step-by-step instructions for performing item-level recovery of SharePoint content.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Kroll Ontrack, Inc.

Cloud Storage: Key Questions to Ask Before Implementation
sponsored by IBM
WEBCAST: Today, many enterprises are turning to cloud storage which is an elastic, pay-as-you-go storage pool. However, there are a few things you should consider before jumping into a cloud system.
Posted: 25 Nov 2013 | Premiered: Sep 22, 2011


Endpoint Backup & Restore: Protect Everyone, Everywhere
sponsored by Code42
WEBCAST: Access now and watch Arek Sokol from the bleeding-edge IT team at Genentech/Roche explain how he leverages cross-platform enterprise endpoint backup in the public cloud as part of his company's global, "100% virtual" strategy.
Posted: 05 Jun 2014 | Premiered: Aug 2, 2013

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement