IT Management  >   Systems Operations  >   Security  >   Data Security  >  

Tape Destruction

RSS Feed   
Tape Destruction White Papers (View All Report Types)
 
Taking Advantage of Multicore/Multiprocessor Technologies to Meet Today's Storage Needs
sponsored by Oracle India Pvt. Ltd
WHITE PAPER: This comprehensive white paper explores how Oracle's Sun ZFS Storage Appliances can perform complex processing for compression, deduplication, real-time storage analytics, and other advanced data services without slowing down I/O throughput and without costing more than competing solutions.
Posted: 17 May 2013 | Published: 24 Jun 2012

Oracle India Pvt. Ltd

8 ways that infrastructure and service visibility deliver benefits across IT
sponsored by ServiceNow
WHITE PAPER: ServiceNow IT Operations Management Visibility discovers IT infrastructure and automatically maps it to digital services. Learn how connecting this operational data to business processes improves service availability and performance, reduces operational risk, lowers service delivery costs, and more.
Posted: 26 Jul 2021 | Published: 26 Jul 2021

TOPICS:  IT Management
ServiceNow

GigaOm Radar for Cloud Observability
sponsored by Splunk
WHITE PAPER: Cloud computing, agile development, continuous deployments, and new DevOps practices have transformed IT. Now, how that IT is monitored needs to transform too. Learn more about monitoring your new IT here.
Posted: 05 Apr 2021 | Published: 05 Apr 2021

TOPICS:  IT Management
Splunk

How Enterprise Technology Orchestration Is Transforming IT
sponsored by Oomnitza
WHITE PAPER: The sudden acceleration of digital transformation has created a prevalent need for a new approach to technology orchestration for the enterprise. That’s where ETO steps in to help transform IT. Open up this white paper to learn more about ETO, including an in-depth definition, core and emergent uses cases, and more.
Posted: 22 Apr 2021 | Published: 22 Apr 2021

TOPICS:  IT Management
Oomnitza

Pennsylvania Lumbermens Mutual Insurance Company (PLM) Case Study
sponsored by VMware
WHITE PAPER: Understand how PLM uses VMware Cloud on AWS for their DR needs and how it helped them optimize their DR costs.
Posted: 16 Apr 2021 | Published: 16 Apr 2021

TOPICS:  IT Management
VMware

Making Sense of Sensitive Data
sponsored by PKWare
WHITE PAPER: In this white paper, read how PKWARE’s PK Protect offers data discovery and protection that locates and secures sensitive data to minimize organizational risks and costs, regardless of device or environment.
Posted: 20 Apr 2021 | Published: 20 Apr 2021

PKWare

3 Reasons your Operational Workflows are Suffering
sponsored by CyberMaxx
WHITE PAPER: Operational workflows for healthcare cybersecurity are complex. With this white paper, find 3 reasons why operational workflows are suffering and how to MDR can help. Take this survey to access the white paper.
Posted: 16 Aug 2021 | Published: 23 Aug 2021

TOPICS:  Security

Enterprise Innovation Management
sponsored by Ezassi
WHITE PAPER: Many organizations struggle with innovation technology. This white paper aims to help connect the dots by addressing the concerns with disjointed processes, solutions, and data. Access this report to learn more.
Posted: 03 Aug 2021 | Published: 03 Aug 2021

TOPICS:  IT Management
Ezassi

MITRE ATT&CK White Paper
sponsored by IronNet
WHITE PAPER: The MITRE ATT&CK Framework provides valuable and objective insights into the target of a threat and its current phase. Download this whitepaper to read about the 5 ways for a CISO to use the MITRE ATT&CK Framework including increasing your visibility of the threat landscape and strengthening your defensive posture now and over time.
Posted: 05 Mar 2021 | Published: 05 Mar 2021

IronNet

2021 State of Open-Source Security Report
sponsored by Contrast Security
WHITE PAPER: Open-source libraries are growing in complexity, increasing risk while making it more difficult to secure modern applications. The 2021 State of Open-source Security Report uses telemetry from actual applications protected by Contrast OSS and Contrast Assess to reveal trends about library usage, vulnerabilities, and best practices. Read it here.
Posted: 15 Apr 2021 | Published: 15 Apr 2021

TOPICS:  Security
Contrast Security
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences