IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Disk Destruction

RSS Feed   
Disk Destruction White Papers (View All Report Types)
 
Taking Advantage of Multicore/Multiprocessor Technologies to Meet Today's Storage Needs
sponsored by Oracle India Pvt. Ltd
WHITE PAPER: This comprehensive white paper explores how Oracle's Sun ZFS Storage Appliances can perform complex processing for compression, deduplication, real-time storage analytics, and other advanced data services without slowing down I/O throughput and without costing more than competing solutions.
Posted: 17 May 2013 | Published: 24 Jun 2012

Oracle India Pvt. Ltd

Sharpening the Edge: 5G Networks, Edge Computing, IoT and Their Implications on Cybersecurity for Service Providers
sponsored by Radware
WHITE PAPER: In this white paper, learn how to leverage automation and a new generation of software- and service-defined architectures to improve the digital experience for consumers and businesses alike, all the while providing a secure experience.
Posted: 21 Nov 2019 | Published: 21 Nov 2019

Radware

Take Care When Fighting Mobile Commerce Fraud
sponsored by LexisNexis® Risk Solutions
WHITE PAPER: Can you strengthen your defense without making a mess of customer experience? As cybercriminals are getting more sophisticated with their attacks, retailers of all sizes are asking themselves this question. In this white paper, explore what to consider when refining your mobile security strategy.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

LexisNexis® Risk Solutions

How to Address Privacy Regulations and Keep Your Data Safe
sponsored by IBM
WHITE PAPER: This white paper will provide a high-level overview of key data privacy trends and regulations — both current and soon-to-be enacted — along with conceptual frameworks organizations can reference to begin addressing these changes
Posted: 15 Nov 2019 | Published: 15 Nov 2019

IBM

Behavioral Biometrics: The Intelligent Safeguard Against Online Fraud
sponsored by Buguroo
WHITE PAPER: Behavioral biometrics can help users identify people by the unique way they interact with different devices, including computers (keyboard and mouse use), tablets or smartphones. Read on to learn how you can utilize behavioral biometrics techniques and AI deep learning algorithms to detect and predict cybercriminal activities at your organization.
Posted: 19 Nov 2019 | Published: 19 Nov 2019

Buguroo

Zero Trust Remote Access: An Evaluation Guide for Security and Network Architects
sponsored by Banyan Security
WHITE PAPER: Traditional perimeter security strategies are unable to keep up with the increasing demands of the modern workforce. Organizations should consider zero-trust models as a successor to remote access VPNs. Use this resource from Banyan as an evaluation guide as your organization integrates a zero-trust remote access security strategy.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Banyan Security

Looking to IT to Empower Your Business? Here are 6 Critical Factors You Must Consider
sponsored by Veeam Software
WHITE PAPER: Dive into this white paper to uncover the 6 areas of common ground between IT and business decision-makers when it comes to technology choices to ensure that investments not only address modern business challenges, but also solve them.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

Veeam Software

State of the Firewall
sponsored by FireMon
WHITE PAPER: While firewalls are a critical part of a holistic security approach, enterprises remain challenged by the lack of automation, network security complexity, and lack of overall network visibility. Recently, FireMon conducted research into how organizations are managing security challenges. Read on to uncover the key themes and findings.
Posted: 14 Nov 2019 | Published: 14 Nov 2019

FireMon

Preparing for a Data Breach: Not If, But When
sponsored by A-Lign
WHITE PAPER: When it comes to preparing for data breaches, companies should think in terms of “when” instead of “if” to ensure cybersecurity preparedness. In this white paper, Petar Besalev, Senior VP of Cybersecurity and Privacy Services at A-Lign, provides an overview of strategies and best-practices to help you prepare for a data breach.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

A-Lign

5 Emerging Trends in the Construction Industry
sponsored by Smartsheet
WHITE PAPER: Download this construction industry guide, which outlines 5 trends that can be addressed through IT tools that feature automated tasks and error free data.
Posted: 15 Nov 2019 | Published: 15 Nov 2019

Smartsheet
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement