IT Management  >   Systems Operations  >   Security  >  

Secure Data Storage

RSS Feed    Add to Google    Add to My Yahoo!
Secure Data StorageReports
 
Enterprise Data Backup - The Power of Recovery
sponsored by Rand Secure Data
WHITE PAPER: This resource explores the role of recovery in data backup and security, and introduces a backup tool that delivers the key capabilities you need.
Posted: 18 Mar 2014 | Published: 18 Mar 2014

Rand Secure Data

Modern backup alternatives
sponsored by Dell Software
WHITE PAPER: This E-Guide talks about the need for new backup processes caused by rapidly expanding data and gives alternatives to the processes many organizations currently have in place.
Posted: 24 Feb 2014 | Published: 24 Feb 2014

Dell Software

Back Up Your Critical Cloud Data Before It’s Too Late
sponsored by Backupify
WHITE PAPER: This exclusive Forrester report highlights a new type of backup service to protect critical data in the cloud: cloud-to-cloud backup providers.
Posted: 20 Mar 2014 | Published: 04 Feb 2014

Backupify

The ABC's of Big Data
sponsored by NetApp
WHITE PAPER: This white paper considers the problems posed by the explosion of big data and provides a framework for evaluating new infrastructure requirements.
Posted: 13 Jun 2013 | Published: 31 Dec 2012

NetApp

Backup, Archiving, and Tape: Expert Recommendations For Improving Data Protection Efficiency
sponsored by Iron Mountain
EGUIDE: This e-guide elaborates on two recommended storage efficiency tactics and reveals other lesser known benefits they deliver. Explore common criticisms you may encounter as you leverage them and obtain expert perspectives on how they can be addressed.
Posted: 04 Mar 2014 | Published: 29 Aug 2013

Iron Mountain

Critical Need For Edge Data Protection
sponsored by CommVault Systems, Inc.
WHITE PAPER: This white paper highlights the challenges involved with protecting edge data. It also highlights a solution that is lightweight, easy-to-use, scalable and comprehensive.
Posted: 28 Feb 2014 | Published: 31 Jan 2012

CommVault Systems, Inc.

Protect Your IT System with Next Generation Security
sponsored by IBM
WHITE PAPER: Read through this exclusive white paper to find out about data breaches and what you can do to protect yourself, as well as three real-life examples of what can happen when your IT systems are attacked.
Posted: 21 Jan 2014 | Published: 31 Oct 2012

IBM

Clustered SAN enables seamless scaling and greater storage efficiency
sponsored by NetApp
WHITE PAPER: Storage systems today must match agility with proven, diversified I/O performance to satisfy an enterprise's changing needs. NetApp has benchmarked superior I/O performance in their FAS6240 Clustered SAN storage array, resulting in its ranking as Silverton Consulting's Enterprise OLTP Champion of Champions™ for 1Q-2013.
Posted: 14 Mar 2013 | Published: 28 Dec 2012

NetApp

Case Study: SSB Wind Systems, End-To-End Service Mitigates Information Risks
sponsored by Iron Mountain
CASE STUDY: This short white paper discusses how one organisation transformed its data and records management processes through end-to-end off-site data protection and records management services.
Posted: 16 Oct 2013 | Published: 31 Dec 2012

Iron Mountain

Unclutter Your Data Center With Consolidated Log Management
sponsored by VMware, Inc.
WHITE PAPER: In this white paper, explore a consolidated logging system to avoid the risks that may occur in a complex IT environment, and feel confident in running a reliable and secure virtual data center.
Posted: 17 Oct 2013 | Published: 13 Jun 2013

VMware, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement