IT Management  >   Systems Operations  >   Security  >  

Tape Security

RSS Feed   
Tape Security Reports
 
Computer Weekly Buyer's Guide to EU General Data Protection Regulation
sponsored by ComputerWeekly.com
EBOOK: In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

ComputerWeekly.com

Storage trends 2016: Storage priorities, cloud appliances and NAS vs object storage
sponsored by ComputerWeekly.com
EGUIDE: This guide offers a collection of our most popular articles on storage-related issues from the first few months of 2016.
Posted: 18 Apr 2016 | Published: 18 Apr 2016

ComputerWeekly.com

CW Europe – Forecast: Cloudy with Dry Spells
sponsored by ComputerWeekly.com
EZINE: In Europe cloud is restricted and hybrid setups make use of local compute and storage.
Posted: 09 Feb 2016 | Published: 08 Feb 2016

ComputerWeekly.com

Insight From The Iron Mountain Data Protection Predictors Study
sponsored by Iron Mountain
DATA SHEET: This concise data sheet reveals results from over 200 IT pros concerning data protection trends that likely will change in the next 1 to 3 years.
Posted: 05 Mar 2014 | Published: 05 Mar 2014

Iron Mountain

Utilizing Data-aware Storage in the Age of Convergence
sponsored by IBM
EGUIDE: Access the latest on converged, data-aware storage architectures, which seek to improve performance optimization through smart deduplication and compression schemes, app-aligned caching and tiering, policy-definable QoS, and data protection schemes. Additionally, discover why flash is crucial to convergence.
Posted: 03 Nov 2016 | Published: 27 Oct 2016

IBM

Salvation Army Protects the Integrity of Data and Global Brand
sponsored by Lumension
CASE STUDY: Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security.
Posted: 31 Jul 2013 | Published: 31 Oct 2007

Lumension

Back Up Your Critical Cloud Data Before It’s Too Late
sponsored by Backupify
WHITE PAPER: This exclusive Forrester report highlights a new type of backup service to protect critical data in the cloud: cloud-to-cloud backup providers.
Posted: 20 Mar 2014 | Published: 04 Feb 2014

Backupify

Managing Data through Replication: Avoiding Errors, Improving Access
sponsored by Dell Software
WHITE PAPER: Learn the ins and outs of data replication with this brief from the Center for Digital Government, and gain insight into how it works, what it offers and it's appeal to IT professionals.
Posted: 15 May 2014 | Published: 15 May 2014

Dell Software

Storage Showdown: All-flash vs. Hybrid Arrays for Virtual Desktop Environments
sponsored by Pure Storage
EGUIDE: Download this guide as Tom Fenton, Senior Validation Engineer at the Taneja Group, illustrates several critical factors to consider when deciding to use an all-flash or hybrid array in your virtual desktop environments. Here, you'll evaluate hybrid vs. all-flash on cost, ability access to cold data, compression and deduplication, and more.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

Pure Storage

Best Practices and Tips for Data Management and Security
sponsored by Code42
EGUIDE: This expert e-guide examines the best practices, tips and considerations for optimal data storage security. Additionally, experts discuss four key data retention issues to address including access, cost, risks and productivity.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Code42
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement