IT Management  >   Systems Operations  >   Security  >  

Secure Data Storage

RSS Feed    Add to Google    Add to My Yahoo!
Secure Data Storage Reports
Webcast: How Innovations in IT are Revolutionizing Physical Security
sponsored by Pivot3
WEBCAST: This webcast discusses these leading-edge IT technologies with regards to the unique needs of video surveillance and physical security
Posted: 09 Sep 2015 | Premiered: Sep 9, 2015


Security in the Cloud: Tips on How to Protect Your Data
sponsored by Procore
WHITE PAPER: This white paper outlines the basics of cloud storage security and the capabilities to look for in providers to ensure data protection.
Posted: 27 Aug 2015 | Published: 05 Aug 2015


Case Study: Blast Performance with Flash
sponsored by Pure Storage
WHITE PAPER: This case study showcases a company's adoption of flash storage to free up data center space previously occupied by several legacy disk arrays. Read on to find out how to improve the speed and reliability of your organization with this storage solution, as well as scale customer analytics.
Posted: 14 Sep 2015 | Published: 14 Sep 2015

Pure Storage

Storage Magazine, August 2015
sponsored by
EZINE: Storage magazine's August 2015 issue explores building an on-prem cloud, looks at today's backup applications, and shares ways to improve the disaster recovery planning process.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

Fast Track Storage: Accelerating VM Backup
sponsored by Veeam Software
WHITE PAPER: Read this white paper to find out which backup and replication solution this well-known car manufacturing company selected to ensure their virtual data's safety.
Posted: 15 Jan 2014 | Published: 31 Jan 2011

Veeam Software

Storage anywhere and everywhere: dealing with the challenges of data fragmentation
sponsored by Mimecast
WHITE PAPER: Are we in danger of losing control of business information? This white paper outlines issues associated with information requirements and possible solutions.
Posted: 19 Dec 2014 | Published: 30 Jun 2013


Examining the Top Competitors of Converged Infrastructure Services
sponsored by Pivot3
WHITE PAPER: In this guide, you will learn why organizations are looking to adopt and implement converged infrastructure environments, as well as get an overview of the converged infrastructure providers, including a 10-point vendor comparison.
Posted: 08 Sep 2015 | Published: 31 Dec 2014


Introduction to Better Disk Backup for Virtual Machines
sponsored by VMware, Inc.
WHITE PAPER: This white paper gives  an overview of the architecture, deployment, configuration and management of vSphere Data Protection, a backup and recovery solution for VMware, from VMware.
Posted: 25 Apr 2014 | Published: 13 Nov 2013

VMware, Inc.

Why Data Deduplication Should Matter to You
sponsored by HPE and Intel®
WHITE PAPER: Deduplication is no longer considered as simply being part of "smarter storage," but can instead be seen throughout the data protection process. In this white paper, learn about the many benefits of deploying an overall data protection system, and find out why it's worth to adopt deduplication fully within your data protection strategy.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

HPE and Intel®

Finding a modernized data backup solution for health care
sponsored by HP & Intel®
EGUIDE: This e-guide from demonstrates how Continuous Data Protection (CDP) offers a backup and recovery approach that is well-suited to health care. Learn about the different types of CDP solutions and decide whether it's a step in the right direction for your organization.
Posted: 01 Aug 2013 | Published: 13 May 2013

HP & Intel®
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement