IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Physical Data Destruction

RSS Feed    Add to Google    Add to My Yahoo!
Physical Data Destruction Reports
 
A Security Assessment of Android Full-disk Encryption
sponsored by ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 01 Aug 2016 | Published: 02 Aug 2016

ComputerWeekly.com

Top tips for securing big data environments
sponsored by IBM
WHITE PAPER: This white paper explains the unique challenges of securing big data, including: high volume, variety, and velocity making it difficult to ensure data integrity; sensitive data in repositories; and more.
Posted: 29 Nov 2012 | Published: 31 Oct 2012

IBM

Jericho Forum: Data Protection
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Data protection needs to provide stronger, more flexible protection mechanisms around the data itself, the Jericho Forum/Open Group argues in this report.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

ComputerWeekly.com

Dell ProSupport Mobility Services
sponsored by Dell, Inc.
DATA SHEET: Dell ProSupport Mobility Services can help ensure you have the access, security and support you need to help keep your business running virtually anywhere in the world.
Posted: 09 Jan 2009 | Published: 09 Jan 2009

Dell, Inc.

Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


E-Guide: What’s Out There Other Than Dedupe for Data Reduction Solutions?
sponsored by HPE and Intel®
ESSENTIAL GUIDE: This SearchDataBackup.com E-Guide discusses three data reduction solutions other than deduplication and how each works. Read on to learn more.
Posted: 12 Sep 2011 | Published: 12 Sep 2011

HPE and Intel®

Who's Reading Your Old Disk Drives? Mitigating Risk and Liability through Data Eradication
sponsored by PeakData Services, Inc.
WHITE PAPER: One area that is often overlooked when protecting an organization's data is the security of data stored on magnetic disk. This white paper discusses the various options available for ensuring the protection of information stored on disk.
Posted: 10 Sep 2007 | Published: 10 Sep 2007

PeakData Services, Inc.

Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

Dell ProSupport Certified Data Destruction
sponsored by Dell, Inc.
DATA SHEET: The Certified Data Destruction Service can give Dell customers - from small businesses to large public companies and government agencies - peace of mind that your sensitive data stored on a failed hard drive will not fall into the wrong hands.
Posted: 09 Jan 2009 | Published: 09 Jan 2009

Dell, Inc.

E-Guide: Optimizing Storage Efficiency Through Deduplication
sponsored by IBM
EGUIDE: Data reduction technologies like data deduplication and compression have been well integrated into backup systems with impressive results. Now those benefits are available for primary storage data systems. Learn how to initiate savings while weeding out unnecessary data. Read this guide to learn more.
Posted: 22 Dec 2010 | Published: 22 Dec 2010

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement