IT Management  >   Systems Operations  >   Security  >  

Storage Encryption

RSS Feed    Add to Google    Add to My Yahoo!
Storage EncryptionReports
 
Clabby Analytics: When Failures and Breaches Are NOT Options
sponsored by IBM
WHITE PAPER: The following research report describes how and why mainframes are different and preferred over different server architectures in the areas of microprocessor characteristics, systems design and related software. Click and learn why the mainframe is the "go-to" architecture when it comes to securing data and avoiding breaches.
Posted: 10 Jul 2014 | Published: 31 Mar 2014

IBM

How IBM Tivoli Storage Systems Save IBM Money
sponsored by IBM
VIDEO: This brief video shows how IBM harnessed its own storage manager solution to address data compression, data deduplication, and storage virtualization to help better manage data growth.
Posted: 10 Apr 2014 | Premiered: 31 Aug 2012

IBM

Ticking the Right Box: Compliant Archiving of Non-Public Personal Information
sponsored by Iron Mountain
WHITE PAPER: Explore this white paper to find out the choices you have in implementing physical asset confirmation audit practices.
Posted: 14 Jan 2014 | Published: 31 Dec 2013

Iron Mountain

Pay-as-you-Grow Data Protection for Small to Medium Businesses
sponsored by IBM
WHITE PAPER: There is a clearly identifiable need for today's storage administrators to refocus their approach toward a scalable data protection and recovery solution. Take a look at this white paper to learn about the data protection requirements for storage admins.
Posted: 21 Nov 2013 | Published: 28 Feb 2013

IBM

Top Five Benefits of Image-Based Backup
sponsored by Datto, Inc.
WHITE PAPER: This white paper explains the benefits of image-based backup over traditional methods. Image-based backup provides faster and more reliable data recovery and protection.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

Datto, Inc.

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Enabling Software Deduplication Across the Enterprise with HP Data Protector
sponsored by HP Autonomy
WHITE PAPER: This whitepaper dives deep into the topic of deduplication and outlines a solution that supports deduplication at any location to solve your data protection and backup woes. View now to learn more!
Posted: 12 Jun 2013 | Published: 29 Jun 2012

HP Autonomy

Case Study - Australia Institute of Management
sponsored by Nimble Storage
WHITE PAPER: This case study highlights the importance of updating IT systems to handle increased storage demands. It also explains how one organization was able to implement a shared storage solution that was designed to work in a virtualized environment.
Posted: 23 Apr 2014 | Published: 30 Apr 2013

Nimble Storage

Case Study: SSB Wind Systems, End-To-End Service Mitigates Information Risks
sponsored by Iron Mountain
CASE STUDY: This short white paper discusses how one organisation transformed its data and records management processes through end-to-end off-site data protection and records management services.
Posted: 16 Oct 2013 | Published: 31 Dec 2012

Iron Mountain

Protecting Technology Infrastructure: The Importance of Secure Access and Continuity Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper investigates mid-market continuity solutions drivers, deployment stages, and benefits and requirements. Its goal is to help IT managers understand the need for continuity solutions, benchmark their continuity journey against their peers, and evaluate how the right continuity solutions can address those needs.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett-Packard Company
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement