Data Loss Prevention (DLP) Reports

Nixing Cloud Data Protection Pain Points 101
sponsored by TechTarget Security
EGUIDE: This expert SearchStorage.com E-Guide covers the pain points of cloud data protection and evaluates one vendor's response to the challenges of cloud data protection.
Posted: 30 Oct 2012 | Published: 30 Oct 2012

TechTarget Security

Exploring new web browser security capabilities
sponsored by TechTarget Security
WHITE PAPER: New threats are created on a regular basis and businesses need to be prepared for the risks. View this expert E-Guide to explore some of the new security capabilities of web browsers and how they help prevent attacks. Learn more about the features that strengthen the security of Web gateway's by consulting this asset.
Posted: 04 Oct 2012 | Published: 04 Oct 2012

TechTarget Security

Mobile Data Security and Compliance Challenges in the Enterprises
sponsored by TechTarget Security
EGUIDE: The bring your own device (BYOD) era has ushered in a number of benefits and security challenges alike. In this E-Guide from SearchConsumerization.com, learn about the top mobile data security and compliance challenges and the best ways you can conquer them.
Posted: 19 Sep 2012 | Published: 19 Sep 2012

TechTarget Security

Backup Perspectives: Mobile Data, Hot Sites & Vendor Management
sponsored by TechTarget Storage
EBRIEF: This SearchDataBackup.com e-brief featuring backup expert Brien M. Posey covers how IT can protect mobile data, the pros and cons of managing your own recovery site and the most recent advances in the virtualization market.
Posted: 18 Jun 2012 | Published: 01 Jun 2012

TechTarget Storage

Understanding DLP in the cloud
sponsored by TechTarget Security
EGUIDE: In this tip, uncover how data loss prevention (DLP) for the cloud works and how it can actually enhance security and compliance beyond traditional DLP solutions for physical environments.
Posted: 04 Jun 2012 | Published: 04 Jun 2012

TechTarget Security

Presentation Transcript: Virtualize Mission-Critical Applications With Confidence
sponsored by DataCore Software Corporation
PRESENTATION TRANSCRIPT: This brief paper contains insight into the most effective way to overcome the storage-related problems causing virtualized business-critical applications to run poorly.  The paper describes how to shape storage behavior to achieve the desired speed and predictable response users expect.
Posted: 17 Oct 2012 | Published: 17 Oct 2012

DataCore Software Corporation

Presentation Transcript: Confidential Documents at Risk
sponsored by WatchDox
PRESENTATION TRANSCRIPT: Uncover the results of a recent survey about the threats and risks inherent to the inadequate safeguarding of corporate data and learn how a document-centric solution can help ensure the safety of your critical, confidential information.
Posted: 24 Sep 2012 | Published: 01 Jun 2012

WatchDox

Five data protection guidelines for business continuity - Presentation Transcript
sponsored by DellEMC and Intel®
PRESENTATION TRANSCRIPT: Jon William Toigo covers data protection guidelines, including mirroring, tape backup and WAN-based replication technologies.
Posted: 06 Sep 2012 | Published: 06 Sep 2012

DellEMC and Intel®

Cornell University Chooses Red Hat Storage for Demanding HPC Environment
sponsored by Red Hat
CASE STUDY: In this case study, learn how a New York University found a storage solution that helped to promote research, education and technology transfer in biotech, and explore the solution that's robust enough to perform DNA sequencing, proteomics and imaging.
Posted: 15 Aug 2012 | Published: 15 Aug 2012

Red Hat

5 Key Steps for Moving Away From Tape Backup
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: Access this 5-step guide to making the transition from tape to disk with dedupe backups. Read on to explore the drawbacks of tape backup and to learn the key functional requirements of a disk backup system with deduplication.
Posted: 13 Aug 2012 | Published: 13 Aug 2012

ExaGrid Systems, Inc.

8 Considerations for Evaluating Disk-Based Backup Solutions
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: Check out this white paper for 8 critical considerations to keep in mind before deciding on a disk-based backup appliance. Explore the importance of backup, restore, dedupe and scalability capabilities when shopping for a backup solution, and gain the insight you need to make a confident and informed decision when it comes to backup.
Posted: 07 Aug 2012 | Published: 07 Aug 2012

ExaGrid Systems, Inc.

Symantec NetBackup 5220 Appliance
sponsored by DLT Solutions
WEBCAST: Watch this webcast today for an introduction to an emerging backup system purpose-built to handle the challenges faced by storage admins in the face of today's data growth. Explore the features and specs this hardware has to offer, and learn what benefits it can bring your organization right out of the box.
Posted: 02 Aug 2012 | Premiered: Aug 2, 2012

DLT Solutions

Rapid Recovery - Maintaining Operations after the 2011 Japan Earthquake and Tsunami
sponsored by Dell Software
WEBCAST: In this informative webcast, learn the critical need for true Continuous Data Protection (CDP). Then, see how CMC Markets – a financial services organization with an office in Tokyo – relied on CDP servers to maintain operations after the devastating earthquake and tsunami that struck Japan in March 2011.
Posted: 11 Jul 2012 | Premiered: Apr 24, 2012

Dell Software

Symantec Web Gateway 5.0 Trialware
sponsored by Symantec Corporation
TRIAL SOFTWARE: In an age of ever-changing Web practices, organizations need to be ready to protect themselves against a variety of attacks. By downloading this helpful trial, you can protect your important data against multiple types of Web-borne malware, data loss and increase its flexibility.
Posted: 10 Jul 2012 | Premiered: 10 Jul 2012

Symantec Corporation

Solving Agencies’ Big Data Challenges: PED for On-the-Fly Decisions
sponsored by NetApp
WHITE PAPER: Check out this white paper to learn how to harness the valued intelligence from huge sets of data and learn about a storage solution designed to help turn ISR data into quality information that can be used for better decision-making.
Posted: 28 Jun 2012 | Published: 01 Mar 2012

NetApp

Finding the Right Automated Tiered Storage
sponsored by NetApp
EGUIDE: This SearchStorage.com E-Guide is here to help you decide which automated storage tiering option is the best fit for your data storage environment and to explain data movement in Tier 0 storage.
Posted: 27 Jun 2012 | Published: 27 Jun 2012

NetApp

E-Guide: Windows Server 8: Achieve Efficient Storage Through Data Deduplication
sponsored by Dell EMC and Microsoft
EGUIDE: Deduplication technology has existed for some time, but only now is it being incorporated into a Windows operating system. This expert e-guide examines Windows Server 8's new deduplication functionality and discusses how it enables significant space savings and protection against data loss.
Posted: 19 Jun 2012 | Published: 18 Jun 2012

Dell EMC and Microsoft

Presentation Transcript: Cloud vs. Tape Backup
sponsored by Iron Mountain
PRESENTATION TRANSCRIPT: Get Jon Toigo's take on cloud vs. tape backup in this presentation transcript.
Posted: 04 Jun 2012 | Published: 04 Jun 2012

Iron Mountain

Windows Application and Server Backup 2.0: Chapter 5- SQL Server Backups
sponsored by Dell AppAssure Backup, Replication and Recovery Software
EBOOK: Access this handy e-book to learn how you can overcome common SQL Server-related backup and recovery challenges such as data sprawl, log truncation, single‐object recovery and off‐location restores.
Posted: 01 Jun 2012 | Published: 31 Dec 2009

Dell AppAssure Backup, Replication and Recovery Software

Windows Application and Server Backup 2.0: Chapter 12- Tales from the Trenches: My Life with Backup 2.0
sponsored by Dell AppAssure Backup, Replication and Recovery Software
EBOOK: Read the final chapter of this e-book to explore stories about Backup 2.0 - learn how to save money, time and anguish, and discover how to fit your new backup system into the specific niches of your company.
Posted: 31 May 2012 | Published: 31 May 2012

Dell AppAssure Backup, Replication and Recovery Software

Windows Application and Server Backup 2.0: Chapter 11- Redesigning Backup: Is It Really Worth It?
sponsored by Dell AppAssure Backup, Replication and Recovery Software
EBOOK: Check out the 11th chapter of this e-book to gain insight into the value of traditional and modern backups and decide for yourself if redesigning backup is truly worthwhile.
Posted: 31 May 2012 | Published: 31 May 2012

Dell AppAssure Backup, Replication and Recovery Software

Windows Application and Server Backup 2.0: Chapter 10- When Everything Fails: What’s Your Disaster Recovery Plan?
sponsored by Dell AppAssure Backup, Replication and Recovery Software
EBOOK: The tenth chapter of this e-book focuses on disaster recovery. Check it out to explore all that is DR: old-school DR planning, bare-metal and off-site recovery, modern DR, virtualization for DR, application restoration, cold, warm and hot recovery and more!
Posted: 31 May 2012 | Published: 31 May 2012

Dell AppAssure Backup, Replication and Recovery Software

Windows Application and Server Backup 2.0: Chapter 8- Other Backup Concerns and Capabilities
sponsored by Dell AppAssure Backup, Replication and Recovery Software
EBOOK: Learn about disaster recovery, data retention for compliance and integrating your existing backups with virtualized server backups in the eighth chapter of this e-book.
Posted: 30 May 2012 | Published: 30 May 2012

Dell AppAssure Backup, Replication and Recovery Software

Windows Application and Server Backup 2.0: Chapter 7- Virtualization Server Backups
sponsored by Dell AppAssure Backup, Replication and Recovery Software
EBOOK: Brush up on backup for virtualized servers in this e-book and explore virtualization-specific concerns regarding backups.
Posted: 30 May 2012 | Published: 30 May 2012

Dell AppAssure Backup, Replication and Recovery Software

Cloud Security: A process, not a product
sponsored by Red Hat
PRESENTATION TRANSCRIPT: This presentation transcript explores how you can develop a comprehensive cloud security plan and leverage the tools you already have to make your data safe in cloud environments.
Posted: 15 May 2012 | Published: 15 May 2012

Red Hat