Secure Data Storage Reports

Top 10 cyber security stories of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK: Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.
Posted: 26 Jan 2022 | Published: 26 Jan 2022

TechTarget ComputerWeekly.com

Computer Weekly Buyer's Guide to EU General Data Protection Regulation
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.
Posted: 08 Feb 2021 | Published: 07 Feb 2018

TechTarget ComputerWeekly.com

A Computer Weekly Buyer's Guide to Next-Generation Storage
sponsored by TechTarget ComputerWeekly.com
EBOOK: Storage needs are ever increasing—and data volumes constantly expanding. How are today's systems accommodating these capacity demands? In this buyer's guide, Computer Weekly experts look at the evolution of storage systems and how they meet processing demands, the continuing role of all-flash arrays, and how to buy the best storage investment.
Posted: 08 Feb 2021 | Published: 11 Apr 2017

TechTarget ComputerWeekly.com

IT Priorities 2020: Covid-19 consolidates storage push to cloud
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The emphasis on home and remote working has been felt in storage and backup as in all areas of IT, with continued evolution towards the cloud and as-a-service storage and backup.
Posted: 08 Feb 2021 | Published: 16 Nov 2020

TechTarget ComputerWeekly.com

Are you one eDiscovery away from a budgetary meltdown?
sponsored by TechTarget ComputerWeekly.com
ANALYST REPORT: Using an online object storage platform with global namespaces can provide full data protection, high availability and easily managed eDiscovery in a way that fully supports the business, say analysts Clive Longbottom and Marcus Austin.
Posted: 08 Feb 2021 | Published: 25 Jan 2017

TechTarget ComputerWeekly.com

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software

Barclays Bank Deploys SecureWave Sanctuary® Device Control to Remove USB Security Risk
sponsored by SecureWave
CASE STUDY: This article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.
Posted: 20 Nov 2006 | Published: 20 Nov 2006

SecureWave

Dual Mode Fibre Channel and iSCSI SAN - The Best of Both SAN Storage Worlds
sponsored by Dell | EMC
WHITE PAPER: Discover how you can get the best of both SAN storage worlds. Download this white paper to learn about a solution that brings together the high performance and reliability of Fibre Channel and the low cost and versatility of iSCSI.
Posted: 16 Aug 2007 | Published: 10 Aug 2007

Dell | EMC

Best Practices: Enterprise SATA Deployment with High Performance and Reliability
sponsored by DataDirect Networks
WHITE PAPER: Across many organizations, the rapid growth of data is outpacing storage budgets. SATA disk based archive storage is the perfect solution. Download this white paper to learn more about disk based archive storage and see if it will work for you.
Posted: 24 Dec 2007 | Published: 01 Dec 2007

DataDirect Networks

Presentation Transcript: Protecting Data on the Edge
sponsored by Zenith Infotech
PRESENTATION TRANSCRIPT: According to industry statistics, the majority of a typical company's data doesn't reside on data center storage -- it lives on the "edge." The edge may be desktop PCs, laptops or even smart phones and PDAs. In this transcript, W. Curtis Preston describes the most effective techniques, tools and best practices for protecting edge or mobile data.
Posted: 24 Nov 2009 | Published: 24 Nov 2009

Zenith Infotech