IT Management  >   Systems Operations  >   Security  >  

Disk Security

RSS Feed    Add to Google    Add to My Yahoo!
Disk SecurityReports
 
IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Insight From The Iron Mountain Data Protection Predictors Study
sponsored by Iron Mountain
DATA SHEET: This concise data sheet reveals results from over 200 IT pros concerning data protection trends that likely will change in the next 1 to 3 years.
Posted: 05 Mar 2014 | Published: 05 Mar 2014

Iron Mountain

Introduction to ShareFile
sponsored by Citrix and Microsoft
VIDEO: In this short video, learn about a solution that allows you to easily share, sync, and store large files from any device, anywhere. Click through to find out how to be productive on the go safely and securely and also maintain full visibility and access.
Posted: 10 Jul 2014 | Premiered: 06 May 2014

Citrix and Microsoft

Data Deduplication: Types and Benefits
sponsored by Dell Software
EGUIDE: In this e-guide, learn from expert Rachel Dines, an analyst with Forrester Research, the differences between software and hardware backup deduplication, post process vs. inline deduplication as well as fixed and variable-block length dedupe.
Posted: 17 Sep 2014 | Published: 17 Sep 2014

Dell Software

Simplify file shares: HP Simply StoreIT Solutions for File Shares
sponsored by Hewlett-Packard Company
BROCHURE: Read through this informative white paper to discover which HP storage solution is appropriate for your business needs.
Posted: 15 Jan 2014 | Published: 30 Jun 2013

Hewlett-Packard Company

Top Reasons Why Customers Virtualize Their Desktops with VSPEX Proven Infrastructures
sponsored by EMC & Arrow
WHITE PAPER: Access this white paper today to learn the top reasons why so many customers virtualize their desktops with VSPEX proven infrastructures. Also, discover how to transform your end-user computing environment with simple, efficient, and flexible virtualization solutions.
Posted: 08 Oct 2013 | Published: 08 Oct 2013

EMC & Arrow

Securing Mobile Worker Data in the Age of IT Consumerization
sponsored by Code42
WHITE PAPER: This white paper highlights the benefits of consumerization and focuses on the challenges that it presents while also presenting a solution to handle those challenges.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

Code42

EMC Isilon Scale-Out NAS answers the PACS Storage Question
sponsored by EMC & Arrow
WHITE PAPER: This brief resource provides information on a solution that reduces costs and improves operational efficiency by consolidating image data from each department PACS into a single, unified independent storage solution.
Posted: 08 Apr 2014 | Published: 31 Oct 2012

EMC & Arrow

Unclutter Your Data Center With Consolidated Log Management
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, explore a consolidated logging system to avoid the risks that may occur in a complex IT environment, and feel confident in running a reliable and secure virtual data center.
Posted: 17 Oct 2013 | Published: 13 Jun 2013

VMware, Inc.

Data Protection for SharePoint and Exchange: A guide for MSPs
sponsored by Kroll Ontrack, Inc.
EGUIDE: This E-Guide explores the evolution of backup functionalities in Exchange Server 2010 and offers step-by-step instructions for performing item-level recovery of SharePoint content.
Posted: 25 Apr 2013 | Published: 25 Apr 2013

Kroll Ontrack, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement