IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Disk Destruction

RSS Feed   
Disk Destruction White Papers (View All Report Types)
 
Taking Advantage of Multicore/Multiprocessor Technologies to Meet Today's Storage Needs
sponsored by Oracle India Pvt. Ltd
WHITE PAPER: This comprehensive white paper explores how Oracle's Sun ZFS Storage Appliances can perform complex processing for compression, deduplication, real-time storage analytics, and other advanced data services without slowing down I/O throughput and without costing more than competing solutions.
Posted: 17 May 2013 | Published: 24 Jun 2012

Oracle India Pvt. Ltd

Minimizing Risk From Cyber-Threats: Focus On Reducing Time To Containment
sponsored by Claranet
WHITE PAPER: In order to minimize the growing risks from cyberthreats, CISOs and other security leaders are turning towards next-generation endpoint detection and response (EDR) tools – but how does the current iteration of EDR capabilities differ from the previous generation? Read on to find out.
Posted: 24 Nov 2020 | Published: 24 Nov 2020

Claranet

Machine Identities Drive Rapid Expansion of Enterprise Attack Surface
sponsored by Venafi
WHITE PAPER: Over the last 5 years, nearly 1 billion records have been breached in attacks that leverage machine identities, and these attacks were among the most serious and damaging. Read on learn more about why automating full lifecycle machine identity management is important and how you can get started.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

TOPICS:  Security
Venafi

Securing the Future of Work
sponsored by Menlo Security
WHITE PAPER: Access this white paper to learn the top security threats posed to remote workers, use cases of cloud security that can cover the risk, and 4 steps to deploying a cloud-based secure web gateway (SWG) for remote workers with Menlo Security.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

Menlo Security

PSA Certified Program Overview
sponsored by Archetype
WHITE PAPER: In this interactive white paper, learn how PSA Certified reduces the time, cost and risk involved in building a trustworthy device and it aligns with major industry standards and government regulations.
Posted: 25 Nov 2020 | Published: 25 Nov 2020

TOPICS:  Security
Archetype

The Definitive Guide to Electronic Communications Capture
sponsored by Smarsh
WHITE PAPER: Is your organization under pressure to manage an ever-increasing volume and diversity of communications data? Download this Smarsh Definitive Guide to Capture to learn how your compliance program stacks up, and get the information you need to reduce your organizational risk.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

Smarsh

Simplify your security operations center
sponsored by Red Hat
WHITE PAPER: Placeholder
Posted: 16 Nov 2020 | Published: 16 Nov 2020

Red Hat

Building the Case for Investing in Tech Training and Talent
sponsored by QA
WHITE PAPER: Today, the amount of technologically skilled talent is finite. Dive into this guide to hear expert surveys and research make the case for further tech training and talent investments—and how the global pandemic has amplified the need for skilled talent.
Posted: 17 Nov 2020 | Published: 17 Nov 2020

QA

A Security Engineer’s Nightmare
sponsored by Cribl.io
WHITE PAPER: For security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Cribl is helping security engineers log information and incidents so they can focus their efforts on more important tasks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Cribl.io

The 10 Backup Mistakes MSPs Make (and How to Avoid Them)
sponsored by MSP360
WHITE PAPER: Sometimes, MSPs can get backup wrong. Unfortunately, there are lessons we can learn from them. Jump inside this guide to read over the top 10 backup mistakes that MSPs are most prone to making—and how to course-correct before they turn into major problems.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

MSP360
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info