IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Degaussing

RSS Feed    Add to Google    Add to My Yahoo!
DegaussingReports
 
Guide to Improving Your Tape Storage Practices
sponsored by Iron Mountain
WHITE PAPER: Proper security of data backups doesn’t just happen. It requires thoughtful planning and careful controls. Given the implications of failure – reputational damage, direct costs, compliance issues, and sub-optimal business operations - companies owe it to themselves to take data backup security seriously.
Posted: 13 May 2011 | Published: 13 May 2011

Iron Mountain

Jericho Forum: Data Protection
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Data protection needs to provide stronger, more flexible protection mechanisms around the data itself, the Jericho Forum/Open Group argues in this report.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

ComputerWeekly.com

Gartner: Reducing storage costs
sponsored by ComputerWeekly.com
ANALYST BRIEF: Gartner research director, Valdis Filks, offers tips to help businesses get to grips with escalating storage costs.
Posted: 16 Mar 2012 | Published: 16 Mar 2012

ComputerWeekly.com

Convenient, Compliant, and Cost-effective Information Destruction
sponsored by Iron Mountain
WHITE PAPER: 56% of organizations’ sensitive or confidential information is still contained on paper documents. Discover the advantages of adding a secure shredding strategy to your information destruction program and gain the peace of mind that your company’s information is safe, even after it’s been destroyed.
Posted: 14 Jun 2012 | Published: 01 Jun 2012

Iron Mountain

Dell ProSupport Mobility Services
sponsored by Dell, Inc.
DATA SHEET: Dell ProSupport Mobility Services can help ensure you have the access, security and support you need to help keep your business running virtually anywhere in the world.
Posted: 09 Jan 2009 | Published: 09 Jan 2009

Dell, Inc.

E-Guide: Optimizing Storage Efficiency Through Deduplication
sponsored by IBM
EGUIDE: Data reduction technologies like data deduplication and compression have been well integrated into backup systems with impressive results. Now those benefits are available for primary storage data systems. Learn how to initiate savings while weeding out unnecessary data. Read this guide to learn more.
Posted: 22 Dec 2010 | Published: 22 Dec 2010

IBM

E-Guide: What’s Out There Other Than Dedupe for Data Reduction Solutions?
sponsored by HP and Intel
ESSENTIAL GUIDE: This SearchDataBackup.com E-Guide discusses three data reduction solutions other than deduplication and how each works. Read on to learn more.
Posted: 12 Sep 2011 | Published: 12 Sep 2011

HP and Intel

Drive Disposal Best Practices: Guidelines for Removing Sensitive Data Prior to Drive Disposal
sponsored by Seagate Technology
WHITE PAPER: When a hard drive is disposed, many times, the data is not fully removed - leading to serious consequences. This white paper provides guidelines and best practices to assist you in properly removing data on your hard drives prior to their disposal.
Posted: 13 Nov 2007 | Published: 01 Nov 2007

Seagate Technology

Dell ProSupport Certified Data Destruction
sponsored by Dell, Inc.
DATA SHEET: The Certified Data Destruction Service can give Dell customers - from small businesses to large public companies and government agencies - peace of mind that your sensitive data stored on a failed hard drive will not fall into the wrong hands.
Posted: 09 Jan 2009 | Published: 09 Jan 2009

Dell, Inc.

Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007

 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement