IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Tape Destruction

RSS Feed    Add to Google    Add to My Yahoo!
Tape DestructionReports
 
Convenient, Compliant, and Cost-effective Information Destruction
sponsored by Iron Mountain
WHITE PAPER: 56% of organizations’ sensitive or confidential information is still contained on paper documents. Discover the advantages of adding a secure shredding strategy to your information destruction program and gain the peace of mind that your company’s information is safe, even after it’s been destroyed.
Posted: 14 Jun 2012 | Published: 01 Jun 2012

Iron Mountain

Gartner: Reducing storage costs
sponsored by ComputerWeekly.com
ANALYST BRIEF: Gartner research director, Valdis Filks, offers tips to help businesses get to grips with escalating storage costs.
Posted: 16 Mar 2012 | Published: 16 Mar 2012

ComputerWeekly.com

Jericho Forum: Data Protection
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: Data protection needs to provide stronger, more flexible protection mechanisms around the data itself, the Jericho Forum/Open Group argues in this report.
Posted: 18 Jan 2013 | Published: 18 Jan 2013

ComputerWeekly.com

Guide to Improving Your Tape Storage Practices
sponsored by Iron Mountain
WHITE PAPER: Proper security of data backups doesn’t just happen. It requires thoughtful planning and careful controls. Given the implications of failure – reputational damage, direct costs, compliance issues, and sub-optimal business operations - companies owe it to themselves to take data backup security seriously.
Posted: 13 May 2011 | Published: 13 May 2011

Iron Mountain

Dell ProSupport Mobility Services
sponsored by Dell, Inc.
DATA SHEET: Dell ProSupport Mobility Services can help ensure you have the access, security and support you need to help keep your business running virtually anywhere in the world.
Posted: 09 Jan 2009 | Published: 09 Jan 2009

Dell, Inc.

Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


E-Guide: What’s Out There Other Than Dedupe for Data Reduction Solutions?
sponsored by HP and Intel
ESSENTIAL GUIDE: This SearchDataBackup.com E-Guide discusses three data reduction solutions other than deduplication and how each works. Read on to learn more.
Posted: 12 Sep 2011 | Published: 12 Sep 2011

HP and Intel

Who's Reading Your Old Disk Drives? Mitigating Risk and Liability through Data Eradication
sponsored by PeakData Services, Inc.
WHITE PAPER: One area that is often overlooked when protecting an organization's data is the security of data stored on magnetic disk. This white paper discusses the various options available for ensuring the protection of information stored on disk.
Posted: 10 Sep 2007 | Published: 10 Sep 2007

PeakData Services, Inc.

Drive Disposal Best Practices: Guidelines for Removing Sensitive Data Prior to Drive Disposal
sponsored by Seagate Technology
WHITE PAPER: When a hard drive is disposed, many times, the data is not fully removed - leading to serious consequences. This white paper provides guidelines and best practices to assist you in properly removing data on your hard drives prior to their disposal.
Posted: 13 Nov 2007 | Published: 01 Nov 2007

Seagate Technology

Avoiding Self-Inflicted Security Breaches through Hard Drive Decommissioning
sponsored by Ensconce Data Technology, Inc.
WHITE PAPER: Download this white paper and discover how to help your client prevent financial loss, irreparable damage to the company's reputation, as well as civil and criminal liability for directors with an effective hard drive decommissioning solution.
Posted: 09 Nov 2006 | Published: 01 Jul 2006

Ensconce Data Technology, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement