IT Management  >   Systems Operations  >   Security  >  

Tape Security

RSS Feed   
Tape Security Reports
 
Storage performance: From fundamentals to bleeding edge
sponsored by ComputerWeekly.com
EGUIDE: In this guide we look at LUN provision and management, RAID and flash storage, plus tuning for analytics workloads and key emerging technologies that can give your organisation a competitive advantage in mission-critical operations, such as storage-class memory, NVMe flash and persistent memory.
Posted: 15 May 2018 | Published: 15 May 2018

ComputerWeekly.com

Making Software-defined Storage Easy
sponsored by Red Hat
VIDEO: Join this video to learn how to get the benefits of SDS—elastic and flexible as it is—in a pre-configured system that is simple to purchase, cost-effective, and easy to deploy (usable storage can be up and running in less than 30 minutes).
Posted: 28 Nov 2018 | Premiered: 30 Apr 2018

Red Hat

Impact of General Data Protection Regulation on Storage Systems
sponsored by IBM
WHITE PAPER: Examine the impact the GDPR will have on your storage systems, and learn to mitigate the risk of data breach from uncontrolled access with media-level data encryption for flash and legacy storage media, geographically dispersed data, and more. Download now to ensure your organization is GDPR-compliant.
Posted: 31 Jul 2017 | Published: 31 May 2017

IBM

Compact, Cloud-Ready Data Protection
sponsored by Dell EMC and Intel®
WHITE PAPER: Open this whitepaper to learn about what Data Domain DD3300 from Dell EMC can bring to the table as an entry-level, cloud-ready data protection option, built with the scaling, backup, and cost demands of small to midsize IT environments in mind.
Posted: 27 Aug 2018 | Published: 27 Aug 2018

Dell EMC and Intel®

SQL Server SSD Technology Becoming a Solid Storage Choice
sponsored by Pure Storage
EGUIDE: Access this e-guide to clue into exactly why SSD is emerging as a solid storage choice for SQL Server. Our experts highlight how SSD's embedded controller ensures the integrity of the data stored in the drive, and address your concerns centered on drive reliability and longevity.
Posted: 20 Apr 2017 | Published: 17 Apr 2017

Pure Storage

The Security Under the Hood of One File Sharing Provider
sponsored by Dropbox for Business
WHITE PAPER: Explore the security architecture under the hood of Dropbox in this in-depth white paper. View now to learn how your files stay secure and out of the hands of nefarious users. Read on to learn the ins and outs and the security measures available to admins.
Posted: 31 Mar 2015 | Published: 21 Jan 2015

Dropbox for Business

Why Data Deduplication Should Matter to You
sponsored by HPE and Intel® Corporate
WHITE PAPER: Deduplication is no longer considered as simply being part of "smarter storage," but can instead be seen throughout the data protection process. In this white paper, learn about the many benefits of deploying an overall data protection system, and find out why it's worth to adopt deduplication fully within your data protection strategy.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

HPE and Intel® Corporate

How to Secure Your Microsoft Office 365 Environment
sponsored by AWS-NetApp
WHITE PAPER: Is your Office 365 environment leaving you exposed to accidental deletion, corruption, or theft of your data? Discover how you can safeguard your environment with Cloud Control, a comprehensive data protection solution that uses AWS cloud as your backup storage target.
Posted: 29 Aug 2017 | Published: 22 Aug 2017

AWS-NetApp

Fast Track Containers to Production
sponsored by Diamanti
WHITE PAPER: Discover how to fast track containers to production, increase your scalability, address containerized app requirements with converged infrastructure, enable automatic persistent storage for containers, and more.
Posted: 23 Jun 2017 | Published: 23 Jun 2017

Diamanti

Data Immutability Provides Ultimate Protection
sponsored by Wasabi
WHITE PAPER: This white paper explores a universal cloud object storage service that protects against accidental or malicious data destruction, so you can avoid data erasure, combat ransomware and viruses, and more.
Posted: 23 Oct 2017 | Published: 23 Oct 2017

Wasabi
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement