IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Disposal

RSS Feed   
Data Disposal Multimedia (View All Report Types)
 
Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


Remediant SecureONE
sponsored by Remediant
VIDEO: View this tutorial of Remediant SecureONE to uncover how the privileged access management solution works, how it operates without any agents, and how companies can get to scale quickly by using it.
Posted: 14 Aug 2020 | Premiered: 14 Aug 2020

Remediant

RE:IMAGINE Executive Briefing Session
sponsored by Habour IT
VIDEO: Tune into this RE:IMAGINE session to hear CIOs and leaders from powerhouse technology vendors—including Microsoft, NetApp, Palo Alto, and Cisco—as they discuss strategies for developing and executing against new IT challenges in a post-COVID world.
Posted: 26 Aug 2020 | Premiered: 26 Aug 2020

Habour IT

SailPoint Identity Now: Certification Creation
sponsored by SailPoint Technologies
VIDEO: Provisioning and revoking access to critical systems and data is essential to any effective identity and access governance program. This informational video provides an insider look at SailPoint’s Identity Now hub, designed to help access provisioners assign and view which users have access to which systems.
Posted: 28 Jul 2020 | Premiered: 28 Jul 2020

SailPoint Technologies

Addressing Enterprise Security Challenges
sponsored by Rackspace
VIDEO: In this webinar, you’ll hear from 2 keynote speakers. The first speaker is an AWS Specialist Solutions Architect who provides an in-depth analysis of the most pressing cybersecurity challenges for enterprises. The second speaker, an Principal Architect at Rackspace, takes over to discuss achieving operational efficiency in cloud environments.
Posted: 19 Aug 2020 | Premiered: 19 Aug 2020

Rackspace

Webinar: Succeeding at digital business in the new normal: why application and infrastructure monitoring is more essential than ever
sponsored by Dynatrace
WEBCAST: Monitoring demands have changed significantly this year. In fact, since the pandemic began, 57% have or expect increased strain on IT resources. Tune in as experts from 451 Research and Dynatrace discuss the pandemic’s impact on IT and DevOps environments and explore the best ways to overcome the monitoring challenges that have arisen.
Posted: 24 Aug 2020 | Premiered: Aug 24, 2020

TOPICS:  IT Management
Dynatrace

The Remote Workspace Evolution, Explained
sponsored by MTM Technologies
PODCAST: Tune in to this episode of The Disruptive Enterprise Podcast to hear host Marcus Holloway, president and CEO of MTM Technologies, and guest Karl Connolly, Chief Technologist for Enterprise Accounts at Ingram Micro, U.S., discuss the rapid evolution of remote working tools – and the considerations that accompany them.
Posted: 15 Jul 2020 | Premiered: Jul 15, 2020

TOPICS:  IT Management
MTM Technologies

Cysiv SOC-as-a-Service
sponsored by Cysiv
VIDEO: In this video, learn about CYSIV SOC-as-a-Service, that delivers the benefits of having your own 24/7 fully staffed SOC, without the costs and complexities of running your own.
Posted: 20 Jul 2020 | Premiered: 20 Jul 2020

Cysiv

The key implementation considerations for successful customer identity management
sponsored by Okta
VIDEO: In theory, effective identity and access management (IAM) is about knowing who needs access to what data, when. However, in practice, this can be more challenging than it sounds – especially when considering internal changes and new business partners. Watch this video to discover how to implement effective IAM.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

Okta

Threat Intelligence Driven Detect and Response Operations
sponsored by Bitdefender
WEBCAST: Cyber threat intelligence (CTI) is both a product and a process designed to equip users with actionable information regarding a threat, enabling to mitigate the impact. In this SANS webcast, join distinguished security experts as they further discuss incorporating CTI into your organizations threat detection, hunting and response program.
Posted: 23 Jul 2020 | Premiered: Nov 30, 2019

Bitdefender
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info