Data Protection Reports

4 data privacy predictions for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Over the last two years, businesses and employees saw their workspace change forever with the rise of hybrid and remote work. All of a sudden, data privacy became a top priority for enterprises all over the world. As attention continues to build, here are four data privacy predictions for 2022 and beyond.
Posted: 08 Mar 2022 | Published: 08 Mar 2022

TechTarget ComputerWeekly.com

The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

ITS Group Consulting Offers "More 9's" and Killer RTO/RPO with Replay AppImage
sponsored by AppAssure Software, Inc.
CASE STUDY: Replay AppImage's ability to restore messages and systems quickly and with little effort allowed ITS Group to grow its customer base while keeping overhead low.
Posted: 20 Apr 2009 | Published: 19 Mar 2009

AppAssure Software, Inc.

Streamline Your Storage Usage: 4 Straightforward Ways To True NAS Management
sponsored by Northern Parklife
WHITE PAPER: In a relatively short span of time, Network Attached Storage [NAS] has become a popular, widely implemented technology given its many attractive features and benefits. This whitepaper details four techniques for managing network attached storage, including file management simplification and data access without server intervention.
Posted: 12 Feb 2009 | Published: 12 Feb 2009

Northern Parklife

Storage Magazine Online May 2009: Put Dedupe to the Test
sponsored by TechTarget Storage
EZINE: In this month's Storage Magazine Online cover story, our resident backup expert, W. Curtis Preston, shows how to test various systems against your data so you can make the right decisions. Plus, check out features on recession-proof storage tips, four-tier storage design, and Continuous Data Protection (CDP).
Posted: 05 May 2009 | Published: 01 May 2009

TechTarget Storage

Taming The Power Hungry Data Center
sponsored by Fusion-IO
WHITE PAPER: The widening disparity between CPU performance and that of storage subsystems has spawned numerous solutions that do not fix the problem. This white paper exposes this fundamental flaw and introduces the means available today to substantively reduce power consumption while improving performance: Fusion-io's flash memory-based storage technology.
Posted: 16 Feb 2009 | Published: 16 Feb 2009

Fusion-IO

Seven Strategies for Effective Desktop Management
sponsored by WebEx Communications, Inc.
WEBCAST: Remote and local desktop support is an increasingly difficult and expensive task for IT staffs. Listen to this Webcast to gain seven strategies for effective desktop management so your organization can immediately manage, protect and secure its PC assets
Posted: 01 Mar 2007 | Premiered: Feb 27, 2007

WebEx Communications, Inc.

Virtualized iSCSI SANs: Flexible, Scalable Enterprise Storage for Virtual Infrastructures
sponsored by DellEMC and IntelĀ®
WHITE PAPER: Enterprises of all sizes are building flexible storage infrastructures using iSCSI and advanced virtualization technologies to achieve a flexible and dynamic IT infrastructure that is simple to manage and scale. Read this white paper to learn more.
Posted: 20 Sep 2007 | Published: 20 Sep 2007

DellEMC and IntelĀ®

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
sponsored by Aladdin Knowledge Systems
WHITE PAPER: Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
Posted: 28 Jul 2008 | Published: 11 Jun 2008

Aladdin Knowledge Systems

Data Protection Strategies Leveraging Replication: An In-Depth Look at Evaluation Criteria and Usage Scenarios
sponsored by Double-Take Software
WHITE PAPER: As dependence on continuous access to critical data grows, so does the importance of avoiding service interruption. This paper examines four data protection strategies and compares their merits for the most common business continuance scenarios.
Posted: 01 May 2009 | Published: 29 Feb 2008

Double-Take Software