IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Tape Destruction

RSS Feed   
Tape Destruction White Papers (View All Report Types)
 
Taking Advantage of Multicore/Multiprocessor Technologies to Meet Today's Storage Needs
sponsored by Oracle India Pvt. Ltd
WHITE PAPER: This comprehensive white paper explores how Oracle's Sun ZFS Storage Appliances can perform complex processing for compression, deduplication, real-time storage analytics, and other advanced data services without slowing down I/O throughput and without costing more than competing solutions.
Posted: 17 May 2013 | Published: 24 Jun 2012

Oracle India Pvt. Ltd

HybridOps: Why It’s Important for Business
sponsored by PagerDuty
WHITE PAPER: Access this white paper to learn 3 characteristics that leading high-performing HybridOps organizations share, which will lead to resolving disruptions quicker than ever while keeping up with the speed of business.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

PagerDuty

Discovery-In-Depth: The Path to Data Intelligence
sponsored by BigID
WHITE PAPER: Data discovery is the foundational element of an effective data management strategy – and discovery enables data intelligence, insight and analysis. Download this white paper and discover how to leverage multiple modes of data discovery in order to successfully find & identify sensitive data.
Posted: 02 Jul 2020 | Published: 02 Jul 2020

BigID

Selecting Your Next-Generation Firewall Solution
sponsored by Fortinet, Inc.
WHITE PAPER: As security architects consider how to provide comprehensive threat protection for their enterprises, they face a confusing array of feature sets and vendor claims lacking complete specifications and/or standards-based performance metrics. View this white paper so that you may approach your CISO with a well-informed and compelling recommendation.
Posted: 06 Aug 2020 | Published: 06 May 2020

Fortinet, Inc.

2020 Data Breach Investigations Report
sponsored by Verizon
WHITE PAPER: Each year, Verizon conducts a Data Breach Investigations Report (DBIR) to observe and analyze data breaches and provide industry professionals with key takeaways, industry highlights, relevant best practices, and more. Read on to unlock the complete 119-page report overviewing this year’s findings.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Verizon

Event Intelligence: Next-Gen AIOps for Every Team
sponsored by PagerDuty
WHITE PAPER: Many organizations now deal with thousands, if not millions, of events taking place across their systems every day. In this e-book, learn about a new approach to AIOps that eliminates silos between event and incident management, has helped customers reduce noise on average by 98%, and supports both centralized and distributed workflows in harmony.
Posted: 04 Aug 2020 | Published: 04 Aug 2020

PagerDuty

Identity Governance & Administration (IGA)
sponsored by SailPoint Technologies
WHITE PAPER: In this 120-page Leadership Compass report from KuppingerCole, take a comprehensive deep-dive into the IGA market and uncover key insights regarding the vendors, offerings and market segments to keep an eye on.
Posted: 04 Aug 2020 | Published: 30 Apr 2019

SailPoint Technologies

Less Hackable
sponsored by ThreatLocker
WHITE PAPER: The problem that many businesses face when trying to secure their cyber environments is that they do not understand the risks involved. In this white paper, gain a better understanding of common cyber risks and learn how those risks can be reduced to an acceptable level.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

ThreatLocker

Five Key Elements of Continuous IT Compliance
sponsored by BMC
WHITE PAPER: As compliance regulations become more stringent, security and compliance teams are under additional pressure to ensure security, reduce risk and avoid conflicts. Download this white paper to learn more about a modern, intelligent approach to security – including 5 critical elements necessary for continuous IT compliance.
Posted: 08 Jul 2020 | Published: 08 Jul 2020

BMC

Quantum Computing and Quantum-Safe Security
sponsored by Thales
WHITE PAPER: Although quantum computer will have many benefits, it will also have the ability to do harm. The very same computing power that allows complex problems to be solved can, in turn, be applied to undermine cybersecurity. In this white paper, learn more about quantum computing and the implications it will have on the cybersecurity landscape.
Posted: 15 Jul 2020 | Published: 15 Jul 2020

Thales
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info