Disk Security Reports

Storage performance: From fundamentals to bleeding edge
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this guide we look at LUN provision and management, RAID and flash storage, plus tuning for analytics workloads and key emerging technologies that can give your organisation a competitive advantage in mission-critical operations, such as storage-class memory, NVMe flash and persistent memory.
Posted: 08 Feb 2021 | Published: 15 May 2018

TechTarget ComputerWeekly.com

MicroScope – October 2023: Automating repetition in storage and backup management
sponsored by MicroScope
EZINE: In this issue, we explore how the growing hype of generative artificial intelligence is set to make change in the storage and backup management world, as well as the concerns and limits of the technology. Also, read about the importance of getting MSSPs and suppliers on the same page, and how SSC is moving to meet customer needs.
Posted: 05 Oct 2023 | Published: 06 Oct 2023

MicroScope

A Computer Weekly Buyer's Guide to Next-Generation Storage
sponsored by TechTarget ComputerWeekly.com
EBOOK: Storage needs are ever increasing—and data volumes constantly expanding. How are today's systems accommodating these capacity demands? In this buyer's guide, Computer Weekly experts look at the evolution of storage systems and how they meet processing demands, the continuing role of all-flash arrays, and how to buy the best storage investment.
Posted: 08 Feb 2021 | Published: 11 Apr 2017

TechTarget ComputerWeekly.com

The Problem of Enterprise Records Management
sponsored by EMC Corporation
WHITE PAPER: This white paper explains how records management solutions can be deployed flexibly and cost-effectively across the enterprise to meet the full spectrum of records management needs.
Posted: 01 Aug 2007 | Published: 01 Oct 2006

EMC Corporation

Intelligent Tiered Storage - No Need to Wait!
sponsored by Hitachi Vantara
PODCAST: Tiered Storage has been a storage industry buzz word for several years, its justification and value have been twisted and misconstrued by vendors and analysts alike. Listen to this Podcast and learn about three facts that probably don't coincide are.
Posted: 17 Oct 2006 | Premiered: Oct 18, 2006, 09:00 EDT (13:00 GMT)

Hitachi Vantara

Veritas NetBackup™ Operations Manager and Veritas Backup Reporter - Backup/Recovery Management and Reporting
sponsored by Symantec Corporation
WHITE PAPER: Storage volumes are expanding with no apparent limit, while backup and recovery processes grow steadily more complex. Navigate the new product landscape and identify key issues needed to address balance efficiency and risk in your backup environment.
Posted: 01 Dec 2006 | Published: 01 Nov 2006

Symantec Corporation

Dual Mode Fibre Channel and iSCSI SAN - The Best of Both SAN Storage Worlds
sponsored by Dell | EMC
WHITE PAPER: Discover how you can get the best of both SAN storage worlds. Download this white paper to learn about a solution that brings together the high performance and reliability of Fibre Channel and the low cost and versatility of iSCSI.
Posted: 16 Aug 2007 | Published: 10 Aug 2007

Dell | EMC

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

Presentation Transcript: Protecting Data on the Edge
sponsored by Zenith Infotech
PRESENTATION TRANSCRIPT: According to industry statistics, the majority of a typical company's data doesn't reside on data center storage -- it lives on the "edge." The edge may be desktop PCs, laptops or even smart phones and PDAs. In this transcript, W. Curtis Preston describes the most effective techniques, tools and best practices for protecting edge or mobile data.
Posted: 24 Nov 2009 | Published: 24 Nov 2009

Zenith Infotech

Information Security Magazine, June 2009 - SIMs: More than just a pile of logs
sponsored by Information Security Magazine
EZINE: This month's issue of Information Security Magazine covers a breadth of topics. The cover story this month is about SIM and how it can boost compliance, visibility, and overall business intelligence. Other featured articles cover risk management, convergence, and even the security concerns that come with cloud computing. Read on to learn more.
Posted: 10 Jun 2009 | Published: 10 Jun 2009

Information Security Magazine