Storage Encryption Reports

Storage trends 2016: Storage priorities, cloud appliances and NAS vs object storage
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This guide offers a collection of our most popular articles on storage-related issues from the first few months of 2016.
Posted: 08 Feb 2021 | Published: 18 Apr 2016

TechTarget ComputerWeekly.com

Containers: Making security and business sense
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from startups.
Posted: 08 Feb 2021 | Published: 21 Aug 2018

TechTarget ComputerWeekly.com

A Computer Weekly buyer's guide to Colocation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Colocation is an increasingly appealing option for data storage. In this 17-page buyer's guide, Computer Weekly looks at the constraints of migration, environmental considerations and datacentre opportunities in Africa.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

TechTarget ComputerWeekly.com

Royal Holloway: Rowhammer – From DRAM faults to escalating privileges
sponsored by TechTarget ComputerWeekly.com
RESEARCH CONTENT: Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them
Posted: 08 Feb 2021 | Published: 09 Jul 2020

TechTarget ComputerWeekly.com

A Computer Weekly Buyer's Guide to Next-Generation Storage
sponsored by TechTarget ComputerWeekly.com
EBOOK: Storage needs are ever increasing—and data volumes constantly expanding. How are today's systems accommodating these capacity demands? In this buyer's guide, Computer Weekly experts look at the evolution of storage systems and how they meet processing demands, the continuing role of all-flash arrays, and how to buy the best storage investment.
Posted: 08 Feb 2021 | Published: 11 Apr 2017

TechTarget ComputerWeekly.com

Barclays Bank Deploys SecureWave Sanctuary® Device Control to Remove USB Security Risk
sponsored by SecureWave
CASE STUDY: This article examines how after reviewing a number of solutions, Barclays Bank chose SecureWave's Sanctuary® Device Control which enabled complete lock down of USB ports and prevented all unauthorized connection of USB devices to the network.
Posted: 20 Nov 2006 | Published: 20 Nov 2006

SecureWave

Top Considerations for Implementing Secure Backup and Recovery
sponsored by Zmanda Inc.
WHITE PAPER: Since your backup is a copy of your most valuable digital assets, backup security is a critical consideration. This white paper details important considerations for ensuring security of backup data.
Posted: 09 Jul 2008 | Published: 08 Jul 2008

Zmanda Inc.

Best Practices: Enterprise SATA Deployment with High Performance and Reliability
sponsored by DataDirect Networks
WHITE PAPER: Across many organizations, the rapid growth of data is outpacing storage budgets. SATA disk based archive storage is the perfect solution. Download this white paper to learn more about disk based archive storage and see if it will work for you.
Posted: 24 Dec 2007 | Published: 01 Dec 2007

DataDirect Networks

The Benefits of Network Attached Storage in Small and Medium Sized Business Networks
sponsored by NETGEAR Inc.
WHITE PAPER: SMBs must choose the right solution for managing their data - because a wrong decision can be costly. Luckily, NAS solutions fit the requirements and budgets for SMBs. Read this white paper to learn how these solutions are impacting smaller organizations.
Posted: 03 Dec 2007 | Published: 01 Dec 2007

NETGEAR Inc.

Pod Slurping - An Easy Technique for Stealing Data
sponsored by GFI Software
WHITE PAPER: In this white paper, we explore how the uncontrolled use of portable storage devices such as iPods, USB sticks, flash drives and PDAs, coupled with data theft techniques such as 'pod slurping', can lead to major security breaches.
Posted: 18 Sep 2006 | Published: 18 Sep 2006

GFI Software