Storage Security Reports

eGuide: Email Security and Compliance Best Practices
sponsored by TechTarget Security
EGUIDE: Secure and compliant email systems are essential for financial services companies. In this two part series on email security best practices, expert George Wrenn discusses how to capture emails, securely archive the messages and detailed reporting.
Posted: 04 Jan 2011 | Published: 04 Jan 2011

TechTarget Security

EMC VNXe Series Software Packs: Simple Data Protection and More
sponsored by EMC Computer Systems (UK) Ltd.
PRODUCT OVERVIEW: EMC has packaged unique and powerful add-on storage software into two attractively priced, easy-to-order software packs: Total Value Pack and Total Protection Pack available for the VNXe 3100 and VNXe 3300 respectively, ensuring maximum protection, security, and compliance.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

EMC Computer Systems (UK) Ltd.

Presentation Transcript: Taming the Data Demons: Leveraging Information in the Age of Risk
sponsored by IBM
PRESENTATION TRANSCRIPT: Check out this presentation transcript from IBM as it discusses the advantages of implementing a holistic approach to data risk management, and provides both the “why” and “how” to begin putting a holistic data risk management program to work in businesses of all sizes.
Posted: 31 Jan 2011 | Published: 31 Jan 2011

IBM

Achieving Security With Cloud Data Protection
sponsored by Iron Mountain
WHITE PAPER: Today, more companies than ever recognize the value and convenience of using cloud backup to protect their server data. However, enterprises considering cloud backup for protecting their vital data face these security concerns. Read this white paper to learn how to secure your cloud.
Posted: 27 Jan 2011 | Published: 27 Jan 2011

Iron Mountain

Tiered Storage Takes Center Stage (Horison)
sponsored by Oracle Corporation
WHITE PAPER: This paper describes how tiered storage, as a storage initiative, has been proven to significantly reduce acquisition and operating costs for medium and large scale storage enterprises. Read this paper to learn more about how tiered storage is taking center stage.
Posted: 21 Dec 2010 | Published: 21 Dec 2010

Oracle Corporation

Immersion Into the Cloud: What You Need to Know
sponsored by Zenith Infotech
EGUIDE: This E-Guide discusses the firsthand tops from industry experts on just how to select the cloud offerings and service that is right for you while maintaining security and reliability standards.
Posted: 09 Dec 2010 | Published: 09 Dec 2010

Zenith Infotech

A Practical Guide to Understanding and Deploying Cloud for the Enterprise
sponsored by Hitachi Vantara
WHITE PAPER: While the promise of cloud is heady, there is confusion about the different types of cloud, what they actually offer, and which will meet stringent business requirements. Knowing when and how best to deploy cloud is critical. This paper focuses on separating the hype of cloud from the “how to”.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

Hitachi Vantara

Building A Network Foundation for Virtualization
sponsored by NETGEAR Inc.
WHITE PAPER: The deployment of virtualization technology has allowed businesses of all sizes to reduce costs and optimize resources. The impact has been particularly dramatic with server virtualization. By virtualizing their servers, many organizations have dramatically reduced their IT investment in hardware procurement. Read this white paper to learn more.
Posted: 04 Nov 2010 | Published: 04 Nov 2010

NETGEAR Inc.

What is Tape Without Pain?
sponsored by Spectra Logic Corporation
WHITE PAPER: Spectra has extensive expertise with all forms of backup, and therefore understands the continuing and increasingly important role of tape in protecting data. To that end, Spectra Logic has set itself a goal: Tape Without Pain. Read this white paper to learn more about easing the tape backup process.
Posted: 04 Nov 2010 | Published: 04 Nov 2010

Spectra Logic Corporation

eGuide: Email Security and Compliance Best Practices
sponsored by Google Postini
EGUIDE: Secure and compliant email systems are essential for financial services companies. In this two part series on email security best practices, expert George Wrenn discusses how to capture emails, securely archive the messages and detailed reporting.
Posted: 25 Oct 2010 | Published: 25 Oct 2010

Google Postini

Effective Storage Management and Data Protection for Cloud Computing
sponsored by IBM
WHITE PAPER: In Cloud Computing environments, applications reside in massively-scalable data centers where compute resources can be dynamically provisioned and shared to achieve significant economies of scale. Storage capacity scales with compute resources, and each needs to be effectively managed to gain the maximum benefits from Cloud.
Posted: 21 Oct 2010 | Published: 14 Sep 2010

IBM

John Webster whitepaper: IBM Smarter Planet Storage Solutions
sponsored by IBM
WHITE PAPER: Read this paper for information on data-generating technologies now available, the emerging applications that are harnessing them, and the desire among business executives across a broad range of industries to mine these applications for competitive advantage in some cases, and for the well-being of humanity in others.
Posted: 20 Oct 2010 | Published: 09 Jul 2010

IBM

PCI DSS: Next-Generation Data Security, Storage and Integrity
sponsored by TechTarget Security
EBOOK: SearchSecurity.com presents a comprehensive guide to PCI DSS. Our experts cover all the angles in order to help your efforts in meeting compliance with the credit card industry’s data security standard.
Posted: 11 Oct 2010 | Published: 11 Oct 2010

TechTarget Security

IBM Real-time Compression Technical Validation Report
sponsored by IBM Real-time Compression
PRODUCT OVERVIEW: IBM Real-time Compression solutions address all the requirements of primary storage data optimization, including performance, using a purpose-built technology called real-time compression. This paper details the results of tests conducted by IBM Real-time Compression and IBM.
Posted: 05 Oct 2010 | Published: 05 Oct 2010

IBM Real-time Compression

End-to-End Choices in Tiered Storage Solutions
sponsored by Oracle Corporation
WHITE PAPER: Oracle's tiered storage strategy lets you effectively manage and store data across multiple types of storage media while reducing your total cost of ownership up to 54 percent. Oracle is the only technology leader to provide a scalable, end-to-end storage solution that aligns data value with the right combination of cost, performance, and capacity.
Posted: 01 Oct 2010 | Published: 01 Oct 2010

Oracle Corporation

Achieving Security With Cloud PC Backup
sponsored by Iron Mountain
WHITE PAPER: This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.
Posted: 14 Sep 2010 | Published: 14 Sep 2010

Iron Mountain

Presentation Transcript:  Laptop Backup: ESG on the Fastest Growing Challenge for Storage Pros
sponsored by Copiun
PRESENTATION TRANSCRIPT: Check out this presentation transcript featuring Lauren Whitehouse, Senior Analyst, Enterprise Strategy Group as it outlines the challenges associated with endpoint data protection and management, how the problems are being addressed today, the advantages and disadvantages of these different data protection approaches and more.
Posted: 01 Sep 2010 | Published: 01 Sep 2010

Copiun

Agentless Architecture. Agentless Backup is Not A Myth
sponsored by Asigra
WHITE PAPER: Backup and recovery software typically requires agents that are installed onto the host servers that a system administrator wants to back up. The Asigra solution requires no agents, which inherently makes it easier to install and support than legacy backup and recovery solutions. Read this whitepaper to learn more!
Posted: 24 Aug 2010 | Published: 24 Aug 2010

Asigra

Anatomy of a Data Breach - Why Breaches Happen and What to Do About It
sponsored by Symantec Corporation
WHITE PAPER: This paper examines the three most common sources of data breaches, and offers a broad perspective on what can be done to stop data breaches, as well as specific recommendations to take preventive action.
Posted: 23 Aug 2010 | Published: 18 Aug 2010

Symantec Corporation

Mimecast Unifies Email Security, Archiving, and Continuity Services in the Cloud
sponsored by Mimecast
WHITE PAPER: The market for cloud-based IT infrastructure services delivered in a software-as-a-service model continues to grow. IDC research indicates this model of IT delivery is disrupting traditional licensed software markets and changing how archiving, backup, recovery, and security technologies are procured. Read this whitepaper to learn more.
Posted: 17 Aug 2010 | Published: 17 Aug 2010

Mimecast

Presentation Transcript: Replicate Smarter with EMC Data Domain Deduplication Storage Systems
sponsored by EMC Backup and Recovery Solutions
PRESENTATION TRANSCRIPT: Join EMC backup and recovery systems division to learn about their new solutions including Data Domain deduplication storage systems, dedupe for fastest time-to-DR readiness and more.
Posted: 09 Aug 2010 | Published: 05 Aug 2010

EMC Backup and Recovery Solutions

E-Book: IT Handbook - Backup and Recovery
sponsored by Vizioncore Inc.
EBOOK: Before you begin researching all of the available backup and disaster recovery technologies on the market, get a handle on your business needs. Read this e-book to learn about developing a backup and disaster recovery strategy, implementation guidelines for backup and dr, remote backups, and testing and verifying your backups.
Posted: 30 Apr 2010 | Published: 30 Apr 2010

Vizioncore Inc.

Information Security Magazine - April 2010: Endpoints on the Loose
sponsored by Information Security Magazine
EZINE: This month’s cover story focuses on the security threats that mobile devices and portable storage introduce. Other articles expound on topics like fraud prevention, security planning, and code outsourcing. Read on to learn about these important subjects and more.
Posted: 07 Apr 2010 | Published: 07 Apr 2010

Information Security Magazine

Designing Secure Multi-Tenancy into Virtualized Data Centers
sponsored by Continental Resources
WHITE PAPER: Today’s traditional IT model suffers from resources located in different, unrelated silos—leading to low utilization and gross inefficiency. Enterprise servers reside in one area of the data center and network switches and storage arrays in another. This document describes the design of - and the rationale behind - the Secure Cloud Architecture.
Posted: 02 Apr 2010 | Published: 02 Apr 2010

Continental Resources

IBM System Storage TS7650 ProtecTIER Deduplication Appliance
sponsored by IBM
DATA SHEET: This data sheet provides information about the IBM System Storage™ TS7650 ProtecTIER® Deduplication Appliance, a preconfigured solution of IBM storage, IBM server and IBM's revolutionary ProtecTIER data deduplication software.
Posted: 10 Mar 2010 | Published: 25 Jul 2009

IBM