IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Tape Destruction

RSS Feed   
Tape Destruction White Papers (View All Report Types)
 
Drive Disposal Best Practices: Guidelines for Removing Sensitive Data Prior to Drive Disposal
sponsored by Seagate Technology
WHITE PAPER: When a hard drive is disposed, many times, the data is not fully removed - leading to serious consequences. This white paper provides guidelines and best practices to assist you in properly removing data on your hard drives prior to their disposal.
Posted: 13 Nov 2007 | Published: 01 Nov 2007

Seagate Technology

Taking Advantage of Multicore/Multiprocessor Technologies to Meet Today's Storage Needs
sponsored by Oracle India Pvt. Ltd
WHITE PAPER: This comprehensive white paper explores how Oracle's Sun ZFS Storage Appliances can perform complex processing for compression, deduplication, real-time storage analytics, and other advanced data services without slowing down I/O throughput and without costing more than competing solutions.
Posted: 17 May 2013 | Published: 24 Jun 2012

Oracle India Pvt. Ltd

Who's Reading Your Old Disk Drives? Mitigating Risk and Liability through Data Eradication
sponsored by PeakData Services, Inc.
WHITE PAPER: One area that is often overlooked when protecting an organization's data is the security of data stored on magnetic disk. This white paper discusses the various options available for ensuring the protection of information stored on disk.
Posted: 10 Sep 2007 | Published: 10 Sep 2007

PeakData Services, Inc.

Avoiding Self-Inflicted Security Breaches through Hard Drive Decommissioning
sponsored by Ensconce Data Technology, Inc.
WHITE PAPER: Download this white paper and discover how to help your client prevent financial loss, irreparable damage to the company's reputation, as well as civil and criminal liability for directors with an effective hard drive decommissioning solution.
Posted: 09 Nov 2006 | Published: 01 Jul 2006

Ensconce Data Technology, Inc.

Data Deduplication: It’s not a question of if, rather where and when! What to Look for and What to Avoid
sponsored by Quantum Corporation
WHITE PAPER: This paper looks at the value of data de-duplication for optimizing data protection along with considerations about how to add it to your storage strategy most effectively.
Posted: 01 Oct 2010 | Published: 29 Sep 2010

Quantum Corporation

Deception Technology Comes of Age
sponsored by Illusive Networks
WHITE PAPER: Today, deception technology is gaining more and more attention as an innovative cybersecurity technology that can shift the balance of power back to your business. This white paper details how to embrace deception as a network security tool with 5 compelling reasons.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

Illusive Networks

Software-defined Secure Networks
sponsored by Juniper Networks
WHITE PAPER: According to this ESG study, 28% of organizations claim to have a shortage with network security specialists. This research report delves into how organizations can monitor their networks to detect suspicious activities and effectively enforce policies to prevent malicious behavior with the help of software-defined networks.
Posted: 12 Feb 2018 | Published: 31 Dec 2017

Juniper Networks

Reduce Your Audit Tax: Five Methods to Lessen the Burdens
sponsored by Lynx Technology Partners
WHITE PAPER: The security and regulatory environment these days has mushroomed to the point that very few organizations ever go untouched by the auditor's viewfinder. Access this resource to uncover the 5 steps to developing and implementing an audit tax strategy for greater automation of data collection and reporting.
Posted: 08 Feb 2018 | Published: 08 Feb 2018

Lynx Technology Partners

It's Time for a Smarter Approach: Threat-centric Vulnerability Management
sponsored by Skybox Security
WHITE PAPER: Access this white paper to learn how threat-centric vulnerability management (TCVM) offers a smarter approach for your organization as the threat landscape continues to evolve.
Posted: 08 Feb 2018 | Published: 31 Dec 2017

Skybox Security

10 Do's and Don'ts When Migrating to the Cloud
sponsored by Leaseweb
WHITE PAPER: In this white paper, learn 5 things you should be doing to prepare for your cloud migration, like sharing your roadmap with your teams and checking the compliance certifications of your partner, as well as 5 things you should certainly avoid like abandoning your current investments or planning to migrate in one big move.
Posted: 21 Feb 2018 | Published: 21 Feb 2018

Leaseweb
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement