IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Tape Destruction

RSS Feed   
Tape Destruction Multimedia (View All Report Types)
 
Darik's Boot and Nuke (DBAN)
sponsored by Sourceforge.net
TRIAL SOFTWARE: Darik's Boot and Nuke (DBAN) is a self-contained boot floppy that securely wipes the hard disks of most computers.
Posted: 01 Dec 2006 | Premiered: 09 Mar 2007


How to Improve Operational Efficiency with LM Intelligence
sponsored by LogicMonitor
VIDEO: In business terms, improving operational efficiency typically means to maximize outputs while minimizing inputs. This webinar provides an in-depth look at LogicMonitor’s LM intelligence capabilities, designed to help your organization improve its operational efficiency. Watch now for the full video.
Posted: 24 Jun 2021 | Premiered: 24 Jun 2021

TOPICS:  IT Management
LogicMonitor

Software demo: Early warning system for modern IT infrastructure monitoring
sponsored by LogicMonitor
SOFTWARE DEMO: Click to watch this demo video of an early warning system platform for modern IT infrastructure – which proactively prevents problems to minimize downtime and slowdowns that may negatively affect your organization.
Posted: 14 Jan 2021 | Premiered: 14 Jan 2021

LogicMonitor

Axis Security Video: Safely Delivering Simple, Secure and Managed 3rd Party Access
sponsored by Axis Security
VIDEO: VPNs, despite their long-standing rate of success in securing corporate networks, do not hold up in a remote world. In particular, offering third parties remote VPN access presents a major risk to your network. Watch this video by Axis Security to see how you can deliver secure access to third parties without their ever touching your network.
Posted: 11 Jan 2021 | Premiered: 09 Sep 2020

Axis Security

SolarWinds and the Supply Chain, the Threat We've Ignored for Too Long
sponsored by Interos
WEBCAST: The SolarWinds attacks caught the entire country off its guard. What can security teams learn from them? Access this webcast to hear from Robert Brese, a VP and Executive Partner at Gartner, as he joins cybersecurity leaders to discuss fundamental changes that must be implemented to address the SolarWinds nation-state supply chain attacks.
Posted: 23 Feb 2021 | Premiered: Dec 22, 2020

Interos

How to Mitigate the Risk of Ransomware Attacks
sponsored by Keeper Security Inc
VIDEO: Ransomware is becoming one of the most pervasive and consequential threats facing organizations. In this webinar, take a closer look at the key features and capabilities of the Keeper platform, designed to mitigate the risk of ransomware attacks.
Posted: 12 Oct 2020 | Premiered: 12 Oct 2020

Keeper Security Inc

Stay Healthy, Stay Secure, Work Remote
sponsored by Apcela
WEBCAST: In this webcast, join Mark Casey and Kunal Thakkar as they explore how different networking options like SASE, VPN, and SD-WAN make it easy for enterprises and their remote workers to protect their critical information without impacting their work.
Posted: 09 Oct 2020 | Premiered: Jul 31, 2020

Apcela

Data Access Governance - Supercharged With AI
sponsored by Concentric
WEBCAST: Data access governance is the relatively straightforward task of making sure that only the people who need to access sensitive business information can do so. Watch this video to learn more about the importance of data access governance and discover how you can identify, monitor, and protect sensitive business data with greater ease.
Posted: 09 Aug 2021 | Premiered: Aug 9, 2021

Concentric

CPP InVision Managed Services
sponsored by CPP Associates
VIDEO: Check out this short video to learn how you can cut IT service costs and drive innovation and revenue with CPP InVision Managed Services, with end-to-end IT managed services that expand the breadth and depth of your ongoing technology support, maintenance, and security.
Posted: 12 Jul 2021 | Premiered: 12 Jul 2021

CPP Associates

DevSecOps Framework – Technical Deep Dive
sponsored by WhiteHat Security
WEBCAST: Organizational infrastructure is becoming more and more vulnerable, and as a result, development teams are searching for ways to securely develop, build and deploy business-driving applications. So, what can these teams do to get started? They can begin by watching this webcast to learn the keys to a successful DevSecOps implementation.
Posted: 16 Nov 2020 | Premiered: Nov 16, 2020

WhiteHat Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences