Storage Encryption Reports

MicroScope – March 2023: Steering the storage market
sponsored by MicroScope
EZINE: In this issue, read all about how the storage world is continuing to evolve as it looks to the cloud, security and ESG compliance requirements. Also discover six steps to making your business more sustainable and read about how IBM's channel boss is set to make a difference.
Posted: 28 Feb 2023 | Published: 01 Mar 2023

MicroScope

Consolidate Your Back-Up Systems to Save Money and Reduce Risks
sponsored by IBM
WHITE PAPER: When a data disaster occurs, are you confident that the right person with the right training will log into the right system, restore the right data to the right place and do it quickly? Read this white paper to learn how one company found a solution to this problem.
Posted: 21 Nov 2013 | Published: 31 Aug 2012

IBM

Insight From The Iron Mountain Data Protection Predictors Study
sponsored by Iron Mountain
DATA SHEET: This concise data sheet reveals results from over 200 IT pros concerning data protection trends that likely will change in the next 1 to 3 years.
Posted: 05 Mar 2014 | Published: 05 Mar 2014

Iron Mountain

Buyer's Checklist to Purpose-Built Storage for Virtual Servers
sponsored by TechTarget Data Center
WHITE PAPER: In this buyer's checklist, we describe how the performance, scalability, and data protection capabilities of hypervisor-aware storage systems differ from older platforms, as well as explore the 5 categories of hypervisor-aware systems on the market today.
Posted: 14 Mar 2014 | Published: 19 Mar 2014

TechTarget Data Center

Case Study: Housing Works reduces backup and restore times by more than 90 percent
sponsored by IBM
CASE STUDY: When a tape backup failed after a small electrical fire damaged a file server, 3 IT staff members had to spend more than two weeks re-inputting data - which delayed other projects. Read this case study to learn about this organization benefited from deploying an instant restore appliance.
Posted: 22 Nov 2013 | Published: 28 Jun 2012

IBM

Protecting Technology Infrastructure: The Importance of Secure Access and Continuity Solutions
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper investigates mid-market continuity solutions drivers, deployment stages, and benefits and requirements. Its goal is to help IT managers understand the need for continuity solutions, benchmark their continuity journey against their peers, and evaluate how the right continuity solutions can address those needs.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise

Storage Decisions University: Storage for Virtual Servers
sponsored by TechTarget Storage
VIRTUAL ENVIRONMENT: As server virtualization becomes increasingly prevalent, the need for effective storage management becomes even more apparent. This classroom outlines the storage challenges associated with server virtualization, concerns specific to VMware environments, and tools that prove valuable in addressing common performance and capacity issues.
Posted: 03 May 2013 | Premiered: 02 May 2013

All resources sponsored by TechTarget Storage

Benefits of Consolidating and Virtualizing Microsoft Exchange and SharePoint in a Private Cloud Environment
sponsored by EMC
WHITE PAPER: This white paper reveals the benefits of virtual private cloud deployment and how one leading vendor's cloud virtualization technologies support the implementation of secure private cloud deployments of Microsoft Exchange Server and Microsoft SharePoint.
Posted: 17 Apr 2013 | Published: 28 Feb 2013

EMC

Why Data Deduplication Should Matter to You
sponsored by HPE and Intel®
WHITE PAPER: Deduplication is no longer considered as simply being part of "smarter storage," but can instead be seen throughout the data protection process. In this white paper, learn about the many benefits of deploying an overall data protection system, and find out why it's worth to adopt deduplication fully within your data protection strategy.
Posted: 20 Jun 2014 | Published: 20 Jun 2014

HPE and Intel®

The Security of Software Containers & Sandboxing
sponsored by CloudPassage
EGUIDE: Sandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.
Posted: 24 Jan 2018 | Published: 22 Jan 2018

CloudPassage