Tape Security Reports

Computer Weekly – 25 October 2016: 25 years of Linux
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Oct 2016

TechTarget ComputerWeekly.com

Top 7 Reasons to Improve Your Analytics with a EMC Isilon Storage
sponsored by EMC & Arrow
WHITE PAPER: This white paper lists the top benefits for adopting an EMC Isilon scale-out storage solution for Hadoop analytics. This solution will lower operating and capital costs while allowing for more big data analytics capabilities
Posted: 04 Apr 2014 | Published: 30 Mar 2012

EMC & Arrow

Webinar: Protecting Critical SaaS Data Before It’s Too Late
sponsored by Spanning Cloud Apps
WEBCAST: This webinar goes through the best practices for SaaS data protection. Presented by industry experts, it touches on the key points for understanding how to ensure SaaS data protection and how to find the right provider.
Posted: 05 May 2014 | Premiered: Apr 1, 2014

Spanning Cloud Apps

Storage Networking Technology Steps Up to Overcome Performance Challenges
sponsored by IBM
EGUIDE: Fast flash storage and the growing use of virtual apps carry larger amounts of data than ever before—placing pressure on networks that carry storage traffic. This guide illustrates how to keep storage traffic from becoming the bottleneck in your data center, revealing key improvements to 2016 storage networking technologies.
Posted: 02 Nov 2016 | Published: 26 Oct 2016

IBM

Cloud-based archiving for e-discovery/compliance: Five "need to knows"
sponsored by Hewlett Packard Enterprise
EGUIDE: This expert E-Guide discusses five key questions to answer when evaluating or developing a cloud-based archiving strategy for your business.
Posted: 01 May 2013 | Published: 01 May 2013

Hewlett Packard Enterprise

The Security of Software Containers & Sandboxing
sponsored by CloudPassage
EGUIDE: Sandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.
Posted: 24 Jan 2018 | Published: 22 Jan 2018

CloudPassage

Cloud Storage: Key Questions to Ask Before Implementation
sponsored by IBM
WEBCAST: Today, many enterprises are turning to cloud storage which is an elastic, pay-as-you-go storage pool. However, there are a few things you should consider before jumping into a cloud system.
Posted: 25 Nov 2013 | Premiered: Sep 22, 2011

IBM

Better Backup for Big Data
sponsored by Symantec Corporation
WHITE PAPER: This white paper explains the challenges of modern data backup in the age of Big Data and proposes a new solution that delivers comprehensive database support, protection for data warehouse appliances, Hadoop and Big Data analytics capabilities and more.
Posted: 28 May 2014 | Published: 28 Sep 2012

Symantec Corporation

Buyer's Checklist to Purpose-Built Storage for Virtual Servers
sponsored by TechTarget Data Center
EBOOK: This Buyer's Checklist on Purpose-Built Storage for Virtual Servers describes how these storage systems differ from traditional arrays, provides insights into some of their unique features and offers guidance on evaluating, purchasing and deploying these storage systems.
Posted: 02 May 2014 | Published: 02 May 2014

TechTarget Data Center

Salvation Army Protects the Integrity of Data and Global Brand
sponsored by Lumension
CASE STUDY: Protecting data integrity without hindering their care-givers and officers is paramount for The Salvation Army. This case study reveals how the organization implemented plug and play flexibility for their users with USB devices and mitigated potential data threats with endpoint security.
Posted: 31 Jul 2013 | Published: 31 Oct 2007

Lumension