October 12, 2010 - (Free Research) Protecting sensitive and business-critical data is essential to a company’s reputation, profitability and business objectives. This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices.
November 2008 - (Free Research) This white paper is an introduction to Cisco Storage Media Encryption (SME), a heterogeneous, standards-based encryption solution for data at rest with comprehensive built-in key-management features.
August 2012 - (Free Research) TwinStrata CloudArray®, a downloadable virtual appliance makes cloud storage as fast, safe and easy-to-access as enterprise-grade local storage. Get all the benefits of cloud storage – cost and time savings, unlimited storage, disaster recovery, and more.
November 2012 - (Free Research) Check out this technical case study to learn how the IT team at the research organization home to the Large Hadron Collider juggle demands for performance, scalability and reliability amidst cost constraints. Read on to learn how this crew balances responsibility of the foundational database and the associated storage ops.
May 2008 - (Free Research) Data Encryption Expert fills the gaps in your data protection efforts as an affordable and easy to implement solution to difficult compliance requirements like encryption, access control, host protection and auditing.
July 2010 - (Free Research) Trend Micro data protection solutions address privacy, breach disclosure, and encryption requirements with Email Encryption and Data Loss Prevention solutions. These solutions address common IT compliance challenges with accuracy, usability, and cost-effectiveness. Read this white paper for more details.
March 2012 - (Free Research) Check out this white paper for 10 keys to staying compliant. Learn about the importance of access and authorization controls, discover the benefits of encryption for backups, learn how to safeguard traveling media and more.
May 2011 - (Free Research) In this FAQ Guide, David Chapa, senior analyst at the Enterprise Strategy Group, discusses some best practices for tape vaulting. Find out the costs of tape vaulting services, how offsite tape storage costs are determined, how to negotiate your SLAs, and whether or not you should encrypt your tapes before you ship them offsite.
August 2009 - (Free Research) The federal government’s push for electronic healthcare records has made compliance and data security even more pressing. This e-guide offers a look at where healthcare IT leaders should begin, and what they should watch out for as they move to embrace the HITECH Act, HIPAA and other initiatives.
March 2013 - (Free Research) Access this Storage Switzerland paper by Senior Analyst George Crump to learn why today's high-performing virtualized workloads demand a new storage protocol, and learn how virtualization workloads differ from traditional ones in terms of performance, scalability and cost.
September 2009 - (Free Research) This white paper introduces SafeGuard Enterprise 5.40, an innovative solution from Sophos that fulfills all the requirements a company could have for protecting confidential data on mobile PCs and data media.
March 2010 - (Free Research) This document takes a look at several aspects of data protection and HIPAA compliance and explains how a Data Loss Prevention (DLP) solution can help IT professionals discover sensitive data at rest, monitor traffic in real time, and capture events for after-the-fact investigations.
July 2008 - (Free Research) Read this paper to learn how organizations can mitigate risk, reduce TCO, address compliance requirements and optimize security and support by better managing and automating key tape-related processes, creating broad strategies for retention and encryption and implementing best practices.
November 2009 - (Free Research) Hitachi IT Operations Analyzer delivers all-in-one monitoring for the data center. A single interface provides a view to the availability and performance of servers and network and storage devices on a network. It eases troubleshooting without agents.
August 2009 - (Free Research) Hitachi IT Operations Analyzer delivers all-in-one monitoring for the data center. A single interface provides a view to the availability and performance of servers and network and storage devices on a network. It eases troubleshooting without agents.
September 2008 - (Free Research) Learn how whitelisting guards your systems by allowing only approved processes and applications to run on the endpoint and preventing malware and viral programs. With whitelisting technology, you can improve total data security and overall system performance.
July 2011 - (Free Research) "ExaGrid has been consistently adding customers to their rolls–just take a look at their website and read through the hundreds of published success stories and case studies...I think they have found the right formula and target for their solutions and are competing very well against even the biggest players in the competitive landscape."