Hardware  >   Networking Hardware  >   Network Peripheral Hardware  >   Network Appliances  >  

Storage Encryption Appliances

RSS Feed    Add to Google    Add to My Yahoo!
Storage Encryption AppliancesReports
 
Modernizing Backup for Today's Virtual Environments
sponsored by IBM
WEBCAST: There are some challenges that accompany choosing to implement application servers. To fix this problem, the organization recommends deploying a storage manager for virtual machines. m
Posted: 22 Nov 2013 | Premiered: Mar 14, 2013

IBM

Architecting Storage in Virtualized Environments
sponsored by Nimble Storage
WHITE PAPER: This guide will show you how to lay the foundation for an efficient, easy-to-manage storage infrastructure in your virtualized environment.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

Nimble Storage

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Storage Magazine finds Dell top Enterprise NAS vendor
sponsored by Dell, Inc.
JOURNAL ARTICLE: Dive into this Storage magazine article to discover what Rich Castagna, editorial director of TechTarget's Storage Media Group, has to say about the 2 top dogs for NAS systems. Read on to see which vendor claimed the best enterprise-class NAS system, and which topped the midrange group in our 8th Quality Awards survey.
Posted: 04 Feb 2014 | Published: 31 Jan 2014

Dell, Inc.

Storage Solution: Manage Big Data Growth
sponsored by IBM
WHITE PAPER: This valuable resource explores the quandaries that are tied to data growth, and an efficient, scalable, and optimised storage solution.
Posted: 05 Feb 2014 | Published: 30 Nov 2013

IBM

Hitachi Unified Storage VM: All Flash Solution
sponsored by Hitachi Data Systems
WHITE PAPER: This white paper addresses the way all flash systems are helping storage pros handle the demands of their IT infrastructures. Read on to gain insight into 8 key features to look for when considering all flash system solutions.
Posted: 18 Feb 2014 | Published: 10 Jul 2013

Hitachi Data Systems

Family Data Sheet: HP 3PAR Storage software
sponsored by AdvizeX Technologies
DATA SHEET: This resource explores the various software options available on one leading vendor's solid state storage system that can increase storage efficiency, reduce administration time, offer advanced internal virtualization capabilities and much more.
Posted: 23 Aug 2013 | Published: 31 Dec 2012

AdvizeX Technologies

Quantum's Tiered Architecture and Approach to Data Protection
sponsored by Quantum Corporation
WHITE PAPER: This white paper highlights a tiered architecture and approach to data protection to match data value to storage costs over time.
Posted: 01 Apr 2014 | Published: 31 Jan 2014

Quantum Corporation

Storage Magazine: More Choices for Virtual Server Backups
sponsored by IBM.
EZINE: In this issue of Storage magazine, our experts share tips for choosing a VM backup app in today's market, reveal the results of our eighth Quality Awards for midrange arrays and much more!
Posted: 14 Nov 2013 | Published: 02 Sep 2013

IBM.

Endpoint Backup & Restore: Protect Everyone, Everywhere
sponsored by Code42
WEBCAST: Access now and watch Arek Sokol from the bleeding-edge IT team at Genentech/Roche explain how he leverages cross-platform enterprise endpoint backup in the public cloud as part of his company's global, "100% virtual" strategy.
Posted: 05 Jun 2014 | Premiered: Aug 2, 2013

Code42
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement