IT Management  >   Systems Operations  >   Security  >  

Disk Security

RSS Feed   
Disk Security Reports
 
Computer Weekly Buyer's Guide to EU General Data Protection Regulation
sponsored by ComputerWeekly.com
EBOOK: In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

ComputerWeekly.com

Making Software-defined Storage Easy
sponsored by Red Hat
VIDEO: Join this video to learn how to get the benefits of SDS—elastic and flexible as it is—in a pre-configured system that is simple to purchase, cost-effective, and easy to deploy (usable storage can be up and running in less than 30 minutes).
Posted: 28 Nov 2018 | Premiered: 30 Apr 2018

Red Hat

Why Flash Storage for Hybrid IT?
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This ESG white paper outlines several critical considerations for investigating flash to support hybrid IT initiatives, including how to strategically use multiple flash types in your environment. Read on to learn how to use flash for cloud integration, backup and secondary workloads, and more.
Posted: 23 Apr 2018 | Published: 31 Aug 2017

Hewlett Packard Enterprise

The Future of Connected Cars in a Software-defined World
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine how software is reshaping the car industry, with internet-connected cars presenting challenges and opportunities. IT suppliers are putting up prices in the UK as the value of the pound falls – we look at the implications. And Eurostar's digital chief talks about his IT overhaul. Read the issue now.
Posted: 28 Oct 2016 | Published: 01 Nov 2016

ComputerWeekly.com

A Computer Weekly Buyer's Guide to Next-Generation Storage
sponsored by ComputerWeekly.com
EBOOK: Storage needs are ever increasing—and data volumes constantly expanding. How are today's systems accommodating these capacity demands? In this buyer's guide, Computer Weekly experts look at the evolution of storage systems and how they meet processing demands, the continuing role of all-flash arrays, and how to buy the best storage investment.
Posted: 20 Apr 2017 | Published: 11 Apr 2017

ComputerWeekly.com

Make Next-Gen Storage your Secret Weapon in Unstructured Data Protection
sponsored by StorageCraft Technology Corporation
WHITE PAPER: In this white paper, learn how you can use scale-out storage based in a combination of on-prem hardware, and the public cloud to grant you continuous data protection, inline-deduplication, and more to help you better secure your unstructured data.
Posted: 15 Jun 2018 | Published: 15 Jun 2018

StorageCraft Technology Corporation

Transforming Data Protection with Blockchain Tech, Ransomware Protection, and Quick Insights
sponsored by Acronis
WHITE PAPER: Today's infrastructure needs a holistic data protection suite compatible with all workloads in all environments. This IDC report outlines one such offering, which provides a blockchain-based authentication and integrity tool for automated, proactive protection from ransomware, and more.
Posted: 07 Sep 2017 | Published: 11 Sep 2017

Acronis

Redefine Possible in the Hybrid Cloud and Beyond
sponsored by EMC Corporation
WEBCAST: Join David Goulden – CEO of EMC Information Infrastructure – on July 8, 2014, for a special presentation regarding the new innovations that are reshaping storage, data protection, cloud computing, big data, and more. Read on now for more information.
Posted: 03 Jul 2014 | Premiered: Jul 8, 2014, 14:00 EDT (18:00 GMT)

EMC Corporation

Case Study: Global Company Simplifies Storage Administration and Flexibility
sponsored by Nimble Storage
CASE STUDY: In this case study, find out how Staples made their storage solution easy and efficient once again with flash-optimized hybrid storage. Read on to discover benefits including 30x reduction in datacenter footprint and a 9x storage cost reduction without impacting performance.
Posted: 19 Feb 2016 | Published: 19 Feb 2016

Nimble Storage

The Security of Software Containers & Sandboxing
sponsored by CloudPassage
EGUIDE: Sandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.
Posted: 24 Jan 2018 | Published: 22 Jan 2018

CloudPassage
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement