IT Management  >   Systems Operations  >   Security  >  

Tape Security

RSS Feed   
Tape Security Reports
 
Containers: Making security and business sense
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from startups.
Posted: 21 Aug 2018 | Published: 21 Aug 2018

ComputerWeekly.com

Storage Showdown: All-flash vs. Hybrid Arrays for Virtual Desktop Environments
sponsored by Pure Storage
EGUIDE: Download this guide as Tom Fenton, Senior Validation Engineer at the Taneja Group, illustrates several critical factors to consider when deciding to use an all-flash or hybrid array in your virtual desktop environments. Here, you'll evaluate hybrid vs. all-flash on cost, ability access to cold data, compression and deduplication, and more.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

Pure Storage

New Flash Use Cases Identified and What to Do about the NAND Flash Shortage
sponsored by Silk
EGUIDE: Because we're in the midst of a worldwide NAND flash shortage, will once-lowered costs now rise? Download this guide as our editors evaluate the impact the NAND flash shortage has on the cost of SSDs (and how that compares per gigabyte to HDDs), as well as new use cases like flash as RAM.
Posted: 09 Aug 2017 | Published: 03 Aug 2017

Silk

Utilizing Data-aware Storage in the Age of Convergence
sponsored by IBM
EGUIDE: Access the latest on converged, data-aware storage architectures, which seek to improve performance optimization through smart deduplication and compression schemes, app-aligned caching and tiering, policy-definable QoS, and data protection schemes. Additionally, discover why flash is crucial to convergence.
Posted: 03 Nov 2016 | Published: 27 Oct 2016

IBM

Managing Data through Replication: Avoiding Errors, Improving Access
sponsored by Dell Software
WHITE PAPER: Learn the ins and outs of data replication with this brief from the Center for Digital Government, and gain insight into how it works, what it offers and it's appeal to IT professionals.
Posted: 15 May 2014 | Published: 15 May 2014

Dell Software

Building the Best Backup Plan for Today's Storage Environment
sponsored by Iron Mountain
EGUIDE: In this expert-guide, learn about how your offline backups could be the key to keeping your data safe from the online threat of ransomware. Then, explore how dangerous over-protecting your information can be, and how a data retention policy can keep that from happening, and more.
Posted: 27 Sep 2017 | Published: 21 Sep 2017

Iron Mountain

Buyer's Checklist to Purpose-Built Storage for Virtual Servers
sponsored by SearchConvergedInfrastucture
WHITE PAPER: In this buyer's checklist, we describe how the performance, scalability, and data protection capabilities of hypervisor-aware storage systems differ from older platforms, as well as explore the 5 categories of hypervisor-aware systems on the market today.
Posted: 14 Mar 2014 | Published: 19 Mar 2014

SearchConvergedInfrastucture

Introduction to Better Disk Backup for Virtual Machines
sponsored by VMware, Inc.
WHITE PAPER: This white paper gives  an overview of the architecture, deployment, configuration and management of vSphere Data Protection, a backup and recovery solution for VMware, from VMware.
Posted: 25 Apr 2014 | Published: 13 Nov 2013

VMware, Inc.

Storage Networking Technology Steps Up to Overcome Performance Challenges
sponsored by IBM
EGUIDE: Fast flash storage and the growing use of virtual apps carry larger amounts of data than ever before—placing pressure on networks that carry storage traffic. This guide illustrates how to keep storage traffic from becoming the bottleneck in your data center, revealing key improvements to 2016 storage networking technologies.
Posted: 02 Nov 2016 | Published: 26 Oct 2016

IBM

Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: Check out this short, two-page document to explore 8 tips for safeguarding your business information in today's day and age. Read on to fortify your data protection strategy with these tips, including: 1) structure your data, 2) assess and treat associated data risks, 3) ensure you have a disaster recovery plan and 5 more expert tips.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Iron Mountain
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences