IT Management  >   Systems Operations  >   Security  >  

Storage Encryption

RSS Feed    Add to Google    Add to My Yahoo!
Storage Encryption Reports
Best Practice Security in a Cloud-Enabled World
sponsored by IBM
WHITE PAPER: Access this white paper to learn about a straightforward approach to cloud security that will not only assist in mitigating the risks associated with cloud deployments and usage, but also improve and standardize your security posture and practices across all environments.
Posted: 29 Oct 2014 | Published: 31 Jul 2014


Webcast: Simplifying the Data Center with Hyper-Convergence
sponsored by Pivot3
WEBCAST: In this webcast, Bob O'Donnell, Founder and Chief Analyst at Technalysis Research, explains why hyper-convergence is now having a major impact on data centers and IT. Access this video to learn how hyper-converged infrastructures (HCI) are simplifying IT organization and the delivery of services.
Posted: 10 Sep 2015 | Premiered: Sep 10, 2015


Storage Magazine, August 2015
sponsored by
EZINE: Storage magazine's August 2015 issue explores building an on-prem cloud, looks at today's backup applications, and shares ways to improve the disaster recovery planning process.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

PlentyOfFish and SanDisk: A Perfect Match for Engineering Love
sponsored by SanDisk Corporation
WHITE PAPER: This case study outlines how the world's largest online dating site, PlentyOfFish was able to overcome its storage challenges by transitioning to an all-flash environment. Access this resource to master the cost containment and data performance problems in your organization.
Posted: 10 Sep 2015 | Published: 10 Sep 2015

SanDisk Corporation

7 Best Practices for Securing Hadoop
sponsored by IBM
WHITE PAPER: This white paper explores how to develop a data life-cycle-centric approach to Hadoop security by asking yourself five integral questions. Access now to learn the 7 step program to improving your security strategy.
Posted: 21 Apr 2015 | Published: 11 Apr 2014


A Solution to Storage Encryption Inefficiencies
sponsored by IBM
WHITE PAPER: This white paper introduces an innovative way to cut down on those inefficiencies and costs with a single encryption solution that protects your entire storage environment.
Posted: 30 Oct 2015 | Published: 30 Oct 2015


Simply StoreIT File and Application Sharing
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Read through this expert white paper to find out how this storage solution works to provide such superior service.
Posted: 16 Jan 2014 | Published: 30 Sep 2013

Hewlett Packard Enterprise

Case Study - Australia Institute of Management
sponsored by Nimble Storage
WHITE PAPER: This case study highlights the importance of updating IT systems to handle increased storage demands. It also explains how one organization was able to implement a shared storage solution that was designed to work in a virtualized environment.
Posted: 23 Apr 2014 | Published: 30 Apr 2013

Nimble Storage

Webinar: Protecting Critical SaaS Data Before It’s Too Late
sponsored by Spanning Cloud Apps
WEBCAST: This webinar goes through the best practices for SaaS data protection. Presented by industry experts, it touches on the key points for understanding how to ensure SaaS data protection and how to find the right provider.
Posted: 05 May 2014 | Premiered: Apr 1, 2014

Spanning Cloud Apps

Hitachi Content Platform Anywhere
sponsored by Hitachi Data Systems
WEBCAST: Watch this short webcast to discover fully integrated, on-premise solution for safe, secure file synchronization and sharing.
Posted: 25 Jun 2013 | Premiered: Jun 25, 2013

Hitachi Data Systems
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement