IT Management  >   Systems Operations  >   Security  >  

Disk Security

RSS Feed    Add to Google    Add to My Yahoo!
Disk SecurityReports
 
Enterprise Mobility: A Checklist for Secure Containerization
sponsored by Code42
WHITE PAPER: Containerization is a security method that separates enterprise applications and data from personal applications and data. This white paper explains the pros and cons of various approaches to containerization.
Posted: 08 Jul 2014 | Published: 08 Jul 2014

Code42

Share, Store, Sync, and Secure Data on any Device Anywhere
sponsored by Citrix and Microsoft
DATA SHEET: ShareFile is a secure data sync and sharing service that allows IT to mobilize all enterprise data and empower user productivity anywhere. Download today's featured data sheet to review all the key functions and benefits that can be reaped from this technology.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Citrix and Microsoft

Royse Wells of International Paper shares his enthusiasm for the latest storage management advances
sponsored by IBM
WEBCAST: TSM has developed a groundbreaking new graphical tool which allows you to predict if and when a backup is going to fail. Watch this quick 1 minute video to learn more about this tool from users who know best.
Posted: 26 Nov 2013 | Premiered: Mar 5, 2013

IBM

Evaluating Cloud Data Backup Services and Modern Trends
sponsored by Carbonite
EGUIDE: This expert e-guide explores the trends that will affect the backup and data protection market in the near future. Additionally, it examines cloud data backup services that are available today.
Posted: 07 Jul 2014 | Published: 07 Jul 2014

Carbonite

Modernizing Backup for Today's Virtual Environments
sponsored by IBM
WEBCAST: There are some challenges that accompany choosing to implement application servers. To fix this problem, the organization recommends deploying a storage manager for virtual machines. m
Posted: 22 Nov 2013 | Premiered: Mar 14, 2013

IBM

Protect Your IT System with Next Generation Security
sponsored by IBM
WHITE PAPER: Read through this exclusive white paper to find out about data breaches and what you can do to protect yourself, as well as three real-life examples of what can happen when your IT systems are attacked.
Posted: 21 Jan 2014 | Published: 31 Oct 2012

IBM

Enhanced Data Protection for Virtualized Environments
sponsored by VMware, Inc.
WHITE PAPER: This white paper highlights the benefits of implementing a backup and recovery solution that's built for virtualization when dealing with a virtual environment. It also explains where traditional backup and recovery approaches fall short.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

VMware, Inc.

Make Archiving an Enterprise Advantage
sponsored by EMC Corporation
WHITE PAPER: In this helpful white paper, uncover the best strategies for reducing expenses and removing IT storage complexity, including techniques like rationalizing application portfolios and decommissioning legacy systems.
Posted: 13 Aug 2014 | Published: 13 Aug 2014

EMC Corporation

Wherever it Goes, Data on Employee Endpoint Devices Demands Corporate Protection
sponsored by Code42
WHITE PAPER: Check out this white paper to learn your options for delivering better backup and security for the data stored on your workforce's devices. You'll also learn how you can deliver an architecture that scales with market/client demand and empowers you with business-grade tools – without sacrificing the experience of the end user.
Posted: 07 Jul 2014 | Published: 30 May 2014

Code42

Protecting Technology Infrastructure: The Importance of Secure Access and Continuity Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper investigates mid-market continuity solutions drivers, deployment stages, and benefits and requirements. Its goal is to help IT managers understand the need for continuity solutions, benchmark their continuity journey against their peers, and evaluate how the right continuity solutions can address those needs.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement