IT Management  >   Systems Operations  >   Security  >   Data Security  >  


RSS Feed   
Degaussing White Papers (View All Report Types)
Avoiding Self-Inflicted Security Breaches through Hard Drive Decommissioning
sponsored by Ensconce Data Technology, Inc.
WHITE PAPER: Download this white paper and discover how to help your client prevent financial loss, irreparable damage to the company's reputation, as well as civil and criminal liability for directors with an effective hard drive decommissioning solution.
Posted: 09 Nov 2006 | Published: 01 Jul 2006

Ensconce Data Technology, Inc.

Taking Advantage of Multicore/Multiprocessor Technologies to Meet Today's Storage Needs
sponsored by Oracle India Pvt. Ltd
WHITE PAPER: This comprehensive white paper explores how Oracle's Sun ZFS Storage Appliances can perform complex processing for compression, deduplication, real-time storage analytics, and other advanced data services without slowing down I/O throughput and without costing more than competing solutions.
Posted: 17 May 2013 | Published: 24 Jun 2012

Oracle India Pvt. Ltd

Who's Reading Your Old Disk Drives? Mitigating Risk and Liability through Data Eradication
sponsored by PeakData Services, Inc.
WHITE PAPER: One area that is often overlooked when protecting an organization's data is the security of data stored on magnetic disk. This white paper discusses the various options available for ensuring the protection of information stored on disk.
Posted: 10 Sep 2007 | Published: 10 Sep 2007

PeakData Services, Inc.

Drive Disposal Best Practices: Guidelines for Removing Sensitive Data Prior to Drive Disposal
sponsored by Seagate Technology
WHITE PAPER: When a hard drive is disposed, many times, the data is not fully removed - leading to serious consequences. This white paper provides guidelines and best practices to assist you in properly removing data on your hard drives prior to their disposal.
Posted: 13 Nov 2007 | Published: 01 Nov 2007

Seagate Technology

Data Deduplication: It’s not a question of if, rather where and when! What to Look for and What to Avoid
sponsored by Quantum Corporation
WHITE PAPER: This paper looks at the value of data de-duplication for optimizing data protection along with considerations about how to add it to your storage strategy most effectively.
Posted: 01 Oct 2010 | Published: 29 Sep 2010

Quantum Corporation

Beyond the General Data Protection Regulation (GDPR) Executive Summary
sponsored by McAfee, Inc.
WHITE PAPER: As they face numerous regulations, enterprises believe data privacy can create a competitive advantage. But are they ready for the new GDPR enforcement? Here are the concerns and strategies of 800+ senior executives from industries around the world.
Posted: 12 Mar 2018 | Published: 12 Mar 2018

McAfee, Inc.

The Honeypot Project
sponsored by Armor
WHITE PAPER: As the cloud gains momentum, protecting sensitive data no longer means simply safeguarding on-premises infrastructure. Take a look at this resource to uncover the results from a real-world demonstration that shows the types of attacks targeting public cloud environments for small and midsized businesses.
Posted: 09 Mar 2018 | Published: 09 Mar 2018


Alleviate Technical Debt : A Practical Path to IT Modernization
sponsored by Red Hat
WHITE PAPER: There are several core approaches you can take to advance your IT modernization efforts, which this white paper closely examines. Read on to view these four pragmatic methods for structuring your initiatives, as well as discover a viable first step for your modernization path: UNIX-to-Linux migration.
Posted: 02 Mar 2018 | Published: 31 Dec 2016

Red Hat

A Cyberattack Target That's Only Getting Bigger
sponsored by enSilo
WHITE PAPER: Cybercriminals continuously target healthcare organizations as healthcare records have a significant resale value. This resource offers a strategy for protecting the privacy and integrity of healthcare information.
Posted: 01 Mar 2018 | Published: 01 Mar 2018

It's Time to Take a Proactive Approach to Threat Detection and Prevention
sponsored by IBM
WHITE PAPER: According to Ponemon, $3.62 million is the average total cost of a data breach. This resource offers a proactive approach to threat detection and prevention to avoid costly and damaging data breaches.
Posted: 09 Mar 2018 | Published: 09 Mar 2018


About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement