IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Physical Data Destruction

RSS Feed   
Physical Data Destruction Multimedia (View All Report Types)
Ensuring proper data deletion or destruction of backup media
sponsored by Quantum Corporation
PODCAST: Kevin Beaver, information security consultant with Principle Logic LLC, discusses the importance of proper data deletion/destruction for backup media, data deletion options in the market today, and who really needs to be worried about data destruction in this recording.
Posted: 20 Aug 2009 | Premiered: Aug 20, 2009

Quantum Corporation

How Splunk Enables Fast Data Science for Cybersecurity Operations
sponsored by Splunk
WEBCAST: Discover how to bridge the gap between data scientists and security analysts to accelerate intelligence for cybersecurity operations. Plus, find out how Splunk's machine learning-enabled analytics provides a unified system for collecting, digesting, and querying data.
Posted: 12 Oct 2017 | Premiered: Sep 30, 2017


Accelerate Cloud Transformation
sponsored by Cloud Spectator, LLC
WEBCAST: Watch this video for a comprehensive cloud readiness framework to help map out where your organization stands and accelerate your transformation to the cloud.
Posted: 09 Mar 2018 | Premiered: Mar 9, 2018

Cloud Spectator, LLC

What Security People Want: Making DevSecOps Happen with Containers
sponsored by Aqua Security
WEBCAST: Securing containerized apps is necessary for protecting your organization. Explore this webcast to gain insight into securing applications and making DevSecOps happen with containers.
Posted: 09 Mar 2018 | Premiered: Mar 9, 2018

Aqua Security

Five Milestones to GDPR Success
sponsored by Proofpoint, Inc.
VIDEO: The GDPR has been put into place because of the constant data breaches hurting organizations today. Access this webcast to uncover steps to take to become GDPR compliant.
Posted: 06 Feb 2018 | Premiered: 06 Feb 2018

Proofpoint, Inc.

Video: Cloud Infrastructure on IBM Power Systems
sponsored by IBM
WEBCAST: Tuning into this video grants you access to see an infrastructure platform designed to support a variety of cloud models, including private, hybrid, and public cloud. You'll learn the advantages of using this purpose-built platform, featuring OpenStack-based management and open source automation.
Posted: 07 Mar 2018 | Premiered: Nov 30, 2017


IoT and the New Security Challenge
sponsored by Juniper Networks
WEBCAST: According to a Juniper Networks survey, 94% of enterprises are changing the way they think about security due to IoT. Explore this webcast to learn about IoT and the need to consider security within your organization's IoT strategy.
Posted: 19 Feb 2018 | Premiered: Feb 19, 2018

Juniper Networks

Getting Started with Secure DevOps
sponsored by Veracode, Inc.
WEBCAST: Find out how to extend the collaborative efforts between developers and IT operations to your security pros as well so that you can shift towards a DevSecOps culture and incorporate app security as early and often into the development lifecycle as you can.
Posted: 17 Jan 2018 | Premiered: May 25, 2017

Veracode, Inc.

Manage PC, Mobility and iOT with Unified Endpoint Management
sponsored by Citrix
WEBCAST: Watch this webcast to learn how you can deliver apps and data securely to users and how unified endpoint management (UEM) can help solve challenges of traditional client management in the context of the new digital workspace.
Posted: 12 Feb 2018 | Premiered: Feb 12, 2018


3 Life Hacks for Rationalizing your Application & Technology Portfolios
sponsored by Mega International
VIDEO: When streamlining your IT portfolio your goal is to free up budget for new initiatives, and you need an efficient method of doing so. This webcast covers three life hacks to help you work smarter, not harder, when engaging in an IT portfolio rationalization project.
Posted: 10 Jan 2018 | Premiered: 10 Jan 2018

Mega International

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement