Best Practices for Cloud Compliance, Secure Backup, and Successful Information Management
sponsored by TechTarget Security
EGUIDE:
This E-Guide explores the keys to maintaining control over increasingly large data sets from a compliance, backup and information management perspective.
Posted: 11 Jul 2013 | Published: 11 Jul 2013
|
|
|
Top 10 BYOD Pitfalls to Avoid
sponsored by TechTarget Security
EGUIDE:
This expert E-Guide dives into how to make BYOD successful by overcoming potential obstacles and minimizing security risks through policy and technology.
Posted: 10 Jul 2013 | Published: 08 Jul 2013
|
|
|
Rethink Defense-In-Depth Security Model For BYOD
sponsored by TechTarget Security
EGUIDE:
This e-guide from SearchSecurity.com explores why the endpoint security model is failing and explains why defense-in-depth controls must assume endpoints are always vulnerable – and always compromised.
Posted: 03 Jul 2013 | Published: 03 Jul 2013
|
|
|
Mobile Device Data Protection: Key Findings and Players in the Market
sponsored by TechTarget Security
EGUIDE:
This E-Guide explores the risks associated with BYOD and quantifies the costs of a lost device, from both a cost and security standpoint.
Posted: 14 Jun 2013 | Published: 14 Jun 2013
|
|
|
Challenges With Data Protection in the Cloud
sponsored by TechTarget Security
ANALYST BRIEF:
This expert e-guide from SearchSecurity.com will help you discover the ways you can ensure better protection for your cloud-hosted data. Inside, you'll find out the major challenges involved with cloud security, as well as tips for protecting your intellectual property.
Posted: 12 Jun 2013 | Published: 12 Jun 2013
|
|
|
Demonstrating Proven Business Value Through Backup Redesign with EMC: Not Enough Hours in the Day for Backup
sponsored by EMC
WHITE PAPER:
This informative resource discusses how one organization easily and affordably implemented a backup solution that provides efficiency and resilience to conquer the challenges of today's IT landscape.
Posted: 18 Jul 2013 | Published: 30 Apr 2012
|
|
|
Secure Your Backup Tapes Every Step of the Way
sponsored by Iron Mountain
DATA SHEET:
This short resource explores an approach to safely move your media to a secure offsite tape vault or offsite location using one vendor's tape library moving service.
Posted: 17 Jul 2013 | Published: 31 Jul 2012
|
|
|
IT Reputational Risk Study Overview
sponsored by IBM
VIDEO:
This short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.
Posted: 16 Jul 2013 | Premiered: 13 Dec 2012
|
|
|
Expert Analysis of LTFS: Role in Backup, Media & Entertainment, and Beyond (Podcast)
sponsored by Oracle Corporation
PODCAST:
In this podcast, Storage Decisions speaker Jon Toigo discusses the role of LTFS for backup, how it works, and the requirements for implementation. He also provides a glimpse into the LTFS future and explains why more IT professionals are embracing it as general purpose storage.
Posted: 15 Jul 2013 | Premiered: Jul 15, 2013
|
|
|
Disaster Recovery Today: Top 3 Vendors and 2 New Tactics
sponsored by EMC & Arrow
EGUIDE:
This E-Guide examines the factors driving the recent focus on data protection and points out the top three vendors they are turning to as they evaluate and invest in new recovery software.
Posted: 08 Jul 2013 | Published: 08 Jul 2013
|
|
|
File Sync and Share vs. Endpoint Backup
sponsored by Code42
WHITE PAPER:
This short white paper provides insight into clearing up the confusion between backup and sync/share.
Posted: 26 Jun 2013 | Published: 26 Jun 2013
|
|
|
IBM Power Systems Keep Your Applications Ready for Anything
sponsored by IBM
WHITE PAPER:
This short white paper provides insight into a disaster recovery solution that maintains continuous high availability in the face of any threat to the data center.
Posted: 26 Jun 2013 | Published: 30 Apr 2012
|
|
|
Object Storage: Imagine the possibilities… More data, less headaches
sponsored by Hitachi Vantara
EBOOK:
This eBook explores an object storage solution that allows you to store, synchronize, share, protect and analyze file data from a single system.
Posted: 25 Jun 2013 | Published: 25 Jun 2013
|
|
|
Hitachi Content Platform Anywhere
sponsored by Hitachi Vantara
WEBCAST:
Watch this short webcast to discover fully integrated, on-premise solution for safe, secure file synchronization and sharing.
Posted: 25 Jun 2013 | Premiered: Jun 25, 2013
|
|
|
Senior Vodafone Staff Access BlackBerry Service at all Times with Rapid Disaster Recovery
sponsored by Neverfail
CASE STUDY:
This case study discusses how one company implemented a high availability solution that delivers 24/7 availability and allows for routine maintenance while their system is live.
Posted: 24 Jun 2013 | Published: 24 Jun 2013
|
|
|
Neverfail Heartbeat Failover Engine
sponsored by Neverfail
WHITE PAPER:
Check out this white paper to explore a business continuity solution that continuously keeps your applications up in the face of any threat to system availability.
Posted: 24 Jun 2013 | Published: 24 Jun 2013
|
|
|
A CIO's Five-Point Plan for Managing Endpoint Security
sponsored by Dell KACE
EGUIDE:
Managing endpoint security is a major challenge for organizations. This expert e-guide, brought to you by SearchCIO.com, offers a five-point solution for managing endpoint security for the hyper-connected enterprise – starting with data governance.
Posted: 20 Jun 2013 | Published: 20 Jun 2013
|
|
|
Uses and Misuses for Disk-based Backup
sponsored by ExaGrid Systems, Inc.
EGUIDE:
In this E-Guide, expert Jon Toigo offers advice on maximizing the disk storage you have and avoiding the tendency to use this media when it isn't necessary.
Posted: 19 Jun 2013 | Published: 19 Jun 2013
|
|
|
Backup Deduplication: Experts Compare 3 Methods and Quantify Capacity Reductions
sponsored by SEPATON
EGUIDE:
This E-Guide reports and analyzes surprising facts surrounding dedupe usage, maturity and deployment plans.
Posted: 18 Jun 2013 | Published: 18 Jun 2013
|
|
|
Understanding Web-Based Crime-Fighting Techniques To Protect Your Critical Data
sponsored by Imperva
EGUIDE:
In this e-guide, brought to you by SearchCompliance.com, you will gain an understanding of the risks to your data and strategies to protect your systems within the limits of your resources.
Posted: 17 Jun 2013 | Published: 17 Jun 2013
|
|
|
Security University: Data Loss Prevention
sponsored by TechTarget Security
VIRTUAL ENVIRONMENT:
The difference between suite and point product approaches; assessing what you'll focus on within your own organization, and pitfalls in DLP implementation. In this security school we'll examine real-world tactics to ensure a successful DLP deployment.
Posted: 14 Jun 2013 | Premiered: 17 Jun 2013
|
|
|
Generating Proven Business Value with EMC Next- Generation Back Up and Recovery
sponsored by EMC & Arrow
WHITE PAPER:
This white paper explores a few next-gen backup and recovery solutions that have been easily and affordably deployed in companies across all industries.
Posted: 14 Jun 2013 | Published: 31 Oct 2011
|
|
|
Archiving, Backup, and DR: Essential Tips and Issues to Address
sponsored by Rand Secure Data
EGUIDE:
This E-Guide points out four records retention issues you may inadvertently be exposing your business to and reveals the keys to integrating backup, archiving, and DR.
Posted: 07 Jun 2013 | Published: 07 Jun 2013
|
|
|
Developing Effective DR/BC Plans
sponsored by Iron Mountain
EZINE:
This Essential Guide offers a primer on business continuity and risk management. Get exclusive information on tailoring a DR plan to your organization's needs and discover 10 things every IT professional should know about disaster recovery. Read on to make DR planning a priority before it's too late.
Posted: 31 May 2013 | Published: 31 May 2013
|
|
|
10 Tips to Help You Minimize the Duration and Impact of a Security Breach
sponsored by Dell SecureWorks
WHITE PAPER:
Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013
|
|