IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Data Disposal

RSS Feed   
Data Disposal White Papers (View All Report Types)
 
Taking Advantage of Multicore/Multiprocessor Technologies to Meet Today's Storage Needs
sponsored by Oracle India Pvt. Ltd
WHITE PAPER: This comprehensive white paper explores how Oracle's Sun ZFS Storage Appliances can perform complex processing for compression, deduplication, real-time storage analytics, and other advanced data services without slowing down I/O throughput and without costing more than competing solutions.
Posted: 17 May 2013 | Published: 24 Jun 2012

Oracle India Pvt. Ltd

Defining a Shared Responsibility Model for Amazon Web Services (AWS)
sponsored by Alert Logic
WHITE PAPER: In this e-book, discover a 5-step plan for using the AWS Shared Security Responsibility Model (SSRM) as a foundation for building a "cloud-first" cybersecurity defense plan.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

Alert Logic

The Government of Arlington Keeps Dreaming Thanks to IT Modernization
sponsored by Dell Technologies
WHITE PAPER: Arlington, Texas, a city of over 370,000 residents, proudly calls itself "The American Dream City." In this one pager, find out how the city used sophisticated strategy and governance practices to build an incredibly modernized IT infrastructure to help them live up to their name.
Posted: 07 Nov 2019 | Published: 07 Nov 2019

Dell Technologies

How to Avoid Disruption by Bridging the Resilience Gap
sponsored by Tanium
WHITE PAPER: As organizations grow increasingly complex, IT security teams struggle to remain resilient as they face internal and external pressures. A recent study was conducted to better understand the barriers to resilience and the tradeoffs faced by decision-makers. Read on to uncover the key insights and conclusions.
Posted: 22 Nov 2019 | Published: 22 Nov 2019

Tanium

CIS Critical Security Controls
sponsored by Splunk
WHITE PAPER: In this e-book, you'll learn what security professionals find suitable to support access controls. Discover ways to verify incoming data, execute the requirements needed, and support human activities associated with a control.
Posted: 15 Nov 2019 | Published: 31 Dec 2016

Splunk

Red Hat Ansible Tower Provides Powerful Automation to Simplify and Manage IT Systems
sponsored by Red Hat
WHITE PAPER: Dive into this report overview to take a closer look at the quantifiable – and unquantifiable – benefits of Red Hat Ansible Tower as a method for introducing powerful automation into IT systems management workflows.
Posted: 02 Dec 2019 | Published: 31 Jul 2018

Red Hat

The Journey of Security in a DevOps Environment
sponsored by F5 Networks
WHITE PAPER: To address the increasing demand for application delivery, organizations are adopting DevSecOps: combining the efficiency of DevOps with modern security practices. But how can security be incorporated without disturbing the development process? In this article, uncover the benefits of incorporating security into your DevOps environment.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

F5 Networks

Rise of the Machines: Transforming Cybersecurity Strategy for the Age of IoT
sponsored by Forescout
WHITE PAPER: Information technology (IT) & operational technology (OT) were, for a long time, regarded as two distinct areas within an organization. Now these two domains are interconnected, thanks to the Internet of Things (IoT) revolution.But what are these “things”, what do they have to say & are we listening? Read on to learn more.
Posted: 12 Nov 2019 | Published: 12 Nov 2019

Forescout

5 Ways Technology Can Transform Government Operations
sponsored by Smartsheet
WHITE PAPER: Government agencies notoriously face challenges of slow decision-making and complicated operations, which makes efficiency a distant dream. Download this whitepaper for a look at 5 phases of government operations IT can factor into for better end results.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

Smartsheet

Strengthen your Financial API Security
sponsored by Ping Identity Corporation
WHITE PAPER: This white paper highlights several areas of concern around API security within your financial enterprise, including access control, data governance and consent management, visibility into the activity of your applications, auditing and forensics. Read on to gain a deeper understanding of API security threats and how to build a solid defense.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Ping Identity Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement