IT Management  >   Systems Operations  >   Security  >  

Secure Data Storage

RSS Feed   
Secure Data Storage Reports
 
Tackling Data Security and Compliance Challenges
sponsored by Cloudian
EBOOK: Access this e-book to learn 3 important security questions you should ask about your storage platform to help ensure you are doing everything you can to protect your organization’s data.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Cloudian

Defining the Modern Data Experience for the Next Decade
sponsored by Habour IT
RESOURCE: Read the following blog post to view several adoption trends that are emerging in APAC as a result of digitization and increased cloud adoption—including STaaS, container storage, and more.
Posted: 27 Aug 2020 | Published: 27 Aug 2020

Habour IT

Better Backup for Big Data
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains the challenges of modern data backup in the age of Big Data and proposes a new solution that delivers comprehensive database support, protection for data warehouse appliances, Hadoop and Big Data analytics capabilities and more.
Posted: 28 May 2014 | Published: 28 Sep 2012

Symantec Corporation

Best Practices and Tips for Data Management and Security
sponsored by Code42
EGUIDE: This expert e-guide examines the best practices, tips and considerations for optimal data storage security. Additionally, experts discuss four key data retention issues to address including access, cost, risks and productivity.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Code42

DevOps Strategy for Health Site Fueled by Flash, CDM
sponsored by Pure Storage
EGUIDE: In this expert guide, discover how women's health website Lifescript implemented a revenue-boosting DevOps strategy with all-flash storage and copy data management. Read on to see how this SSD/CDM duo succeeds, with built-in data deduplication and more.
Posted: 20 Apr 2017 | Published: 18 Apr 2017

Pure Storage

The Security of Software Containers & Sandboxing
sponsored by CloudPassage
EGUIDE: Sandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.
Posted: 24 Jan 2018 | Published: 22 Jan 2018

CloudPassage

Utilizing Data-aware Storage in the Age of Convergence
sponsored by IBM
EGUIDE: Access the latest on converged, data-aware storage architectures, which seek to improve performance optimization through smart deduplication and compression schemes, app-aligned caching and tiering, policy-definable QoS, and data protection schemes. Additionally, discover why flash is crucial to convergence.
Posted: 03 Nov 2016 | Published: 27 Oct 2016

IBM

Share, Store, Sync, and Secure Data on any Device Anywhere
sponsored by Citrix and Microsoft
DATA SHEET: ShareFile is a secure data sync and sharing service that allows IT to mobilize all enterprise data and empower user productivity anywhere. Download today's featured data sheet to review all the key functions and benefits that can be reaped from this technology.
Posted: 27 Jun 2014 | Published: 27 Jun 2014

Citrix and Microsoft

The Big Data Challenge: How To Develop a Winning Strategy
sponsored by EMC Corporation
WHITE PAPER: This brief resource breaks down Big Data in a way that's understandable and shows how adopting Big Data analytics early can be beneficial to organizations in any industry.
Posted: 11 Mar 2014 | Published: 14 Jun 2012

EMC Corporation

Enhanced Data Protection for Virtualized Environments
sponsored by VMware, Inc.
WHITE PAPER: This white paper highlights the benefits of implementing a backup and recovery solution that's built for virtualization when dealing with a virtual environment. It also explains where traditional backup and recovery approaches fall short.
Posted: 23 Apr 2014 | Published: 23 Apr 2014

VMware, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info