Backup SecurityWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Backup Security returned the following results.
RSS What is RSS?
Related Categories

 •   Backup Systems and Services
 •   Storage Management
 •   Data Security
 •   Disk-based Backup & Storage/ RAID
 •   Storage Security
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Disaster Recovery
 •   Virtualization
 •   Tape Drives and Libraries
 •   Enterprise Data Protection and Privacy

Related Searches
 •   Backup Payment
 •   Backup Providers
 •   Backup Security Consults
 •   Backup Security Decisions
 •   Backup Security Media
 •   Backup Security Schedules
 •   Backup Security Version
 •   Outsourcing Backup
 •   Patent Backup Security
 •   Profile Backup
Advertisement

ALL RESULTS
1 - 25 of 458 | Next Page

Featured Sponsors

E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

Best Practices in Backup Security by Quantum Corporation

April 01, 2006 - (Free Research)
Regardless of your organization's size, data security is becoming one of the biggest challenges in IT today. Get an overview on how to address backup security through tips and best practices. 
(WHITE PAPER)

Data Storage Backup Security tutorial: Tape Encryption and Cloud Backup by Quantum Corporation

August 01, 2009 - (Free Research)
Data storage backups are a necessary element of data protection plan, but they're often the biggest source of security woes. Learn everything you need to know about keeping your backups secure in this tutorial. 
(EBOOK) READ ABSTRACT |

Addressing Cloud Backup Security by SunGard Availability Services

February 06, 2012 - (Free Research)
As cloud deployments continue to expand, there are a number of security issues IT managers must keep in mind to ensure that content is protected. This white paper is here to keep you up to date on the latest cloud security challenges and solutions, and will help you understand how to accurately define your backup and security needs. 
(EGUIDE) READ ABSTRACT |

Data storage backup security tutorial: Tape encryption and cloud backup by Quantum Corporation

September 18, 2009 - (Free Research)
Data storage backups are a necessary element of data protection plan, but they're often the biggest source of security woes. Learn everything you need to know about keeping your backups secure in this tutorial. 
(INFORMATION CENTER) READ ABSTRACT |

Top Considerations for Implementing Secure Backup and Recovery by Zmanda Inc.

July 2008 - (Free Research)
Since your backup is a copy of your most valuable digital assets, backup security is a critical consideration. This white paper details important considerations for ensuring security of backup data. 
(WHITE PAPER) READ ABSTRACT |

What you should know about cloud backup security by Quantum Corporation

August 2009 - (Free Research)
Kevin Beaver, information security consultant with Principle Logic LLC, outlines security issues to consider when deploying cloud or online backup. 
(PODCAST) READ ABSTRACT |

Achieving SaaS Security with Connected® Online PC Backup by Iron Mountain

September 2008 - (Free Research)
This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data. 
(WHITE PAPER) READ ABSTRACT |

Guide to Improving Your Tape Storage Practices by Iron Mountain

May 2011 - (Free Research)
Proper security of data backups doesn’t just happen. It requires thoughtful planning and careful controls. Given the implications of failure – reputational damage, direct costs, compliance issues, and sub-optimal business operations - companies owe it to themselves to take data backup security seriously. 
(WHITE PAPER) READ ABSTRACT |

Risk Management: How Vulnerable is Your Backup Media? by Iron Mountain

March 2012 - (Free Research)
Check out this white paper for tips to help you securely manage backup and recovery processes. Discover the importance of developing a chain of custody when it comes to data, learn how authorization and access restrictions can help keep your information secure, and receive best practices for choosing an offsite data backup/protection partner. 
(WHITE PAPER) READ ABSTRACT |

Zmanda Recovery Manager: Guide to MySQL Backup & Recovery by Zmanda Inc.

July 2008 - (Free Research)
This paper introduces you to the Zmanda Recovery Manager (ZRM) for MySQL version 2.1. ZRM is a comprehensive, certified, mission-critical enterprise backup and recovery solution designed to protect MySQL databases. 
(WHITE PAPER) READ ABSTRACT |

Is Your Complete Restoration Plan on Track? by Iron Mountain

March 2012 - (Free Research)
Check out this white paper to learn how finding the right storage partner can help you ensure your data is protected and accessible and put your mind at ease. Read on to discover what to look for in an offsite partner, explore key DR concerns to determine how your existing strategy holds up and more. 
(WHITE PAPER) READ ABSTRACT |

The New Storage: Flexible, Scalable, and Green by Dell | EMC

September 2008 - (Free Research)
Any organization with growing data storage -- and that's just about everybody now -- needs to do something, and what they did in the past won't work in the future. This paper gives a brief view into "new storage" -- flexible, scalable and green. 
(WHITE PAPER) READ ABSTRACT |

2010 Information Security & Compliance Trend Study by nCircle

August 2010 - (Free Research)
This report summarizes the results of the nCircle 2010 Information Security and Compliance Trend Study, a cross-industry survey of over 250 respondents in the IT security industry in the United States and Canada. Over 65% of survey respondents are from large and midsize enterprises. 
(WHITE PAPER) READ ABSTRACT |

10 Steps to Safeguard Small Business Data by i365, makers of Evault

October 2008 - (Free Research)
What should you do to protect your data if your resources are limited? This paper describes ten steps to safeguard business data. 
(WHITE PAPER) READ ABSTRACT |

American Equipment, Symantec Technologies and Wasatch Software Success by Symantec Corporation

July 2012 - (Free Research)
Facing a significant growth in data, American Equipment, Inc. needed to improve its data protection and backup. In this case study learn how Symantec Technologies and Wasatch Software were able to meet these needs with Symantec Backup Exec. 
(VIDEO) READ ABSTRACT |

FAQ Guide: Data Backup & Security Pain Points by Quantum Corporation

October 2012 - (Free Research)
This FAQ Guide can help you get started on the right path to securing your stored and backed up data. Access it now to find questions and answers about data encryption challenges and appliances, cloud storage security, and tape, host-based or disk encryption approaches. 
(EGUIDE) READ ABSTRACT |

Symantec NetBackup 5220 Appliance by DLT Solutions

August 2012 - (Free Research)
Watch this webcast today for an introduction to an emerging backup system purpose-built to handle the challenges faced by storage admins in the face of today's data growth. Explore the features and specs this hardware has to offer, and learn what benefits it can bring your organization right out of the box. 
(WEBCAST) READ ABSTRACT |

Why tape is still necessary for successful backup solution by Iron Mountain

December 2012 - (Free Research)
Access this brief paper to uncover 4 reasons to keep tape as part of your backup strategy. 
(WHITE PAPER) READ ABSTRACT |

Protect Data in VMware-Based Environments with IBM Tivoli Solutions by IBM

July 2013 - (Free Research)
This brief resource examines the challenges of traditional backup and storage approaches in virtual environments, and introduces a unified platform that enables your organization to meet these challenges and effectively store, analyze, manage, and protect data. 
(WHITE PAPER) READ ABSTRACT |

Reducing Server Total Cost of Ownership with VMware Virtualization Software by VMware, Inc.

November 2008 - (Free Research)
Technology purchases are often quantified simply by hardware and software costs. But there's more to it. This TCO study takes a holistic view. 
(WHITE PAPER) READ ABSTRACT |

SharePoint E-zine -- February 2011: SharePoint Governance and e-Discovery by SearchWinIT

February 2011 - (Free Research)
Information in SharePoint is subject to the same rules and regulations as other corporate data. Learn what you need to do to prepare for any e-discovery request. Also in this issue, choose third-party tools to help manage a multi-server SharePoint farm, and get expert advice on making SharePoint more secure. 
(EZINE)

Getting started with Cloud Storage by SunGard Availability Services

January 2012 - (Free Research)
This E-Guide from SearchCloudStorage.com is here to help you decide if cloud storage services are a good fit for your organization. In this guide you'll learn about the pros and cons of various cloud deployments, explore advantages specific to SMBs regarding cloud infrastructures, and discover 5 of today's best practices for moving to the cloud. 
(EGUIDE) READ ABSTRACT |

Taming the Data Demons by IBM

June 2011 - (Free Research)
Taming the data demons: leveraging information in the age of risk explores the framework and advantages of a holistic approach to data risk management, and provides both IT and line-of-business executives with the "why" and "how" to begin putting an end-to-end data risk management program to work in your organization. 
(WHITE PAPER) READ ABSTRACT |

Data Storage, Management, and Recovery: Solution Selection Criteria by IBM

August 2012 - (Free Research)
In this brief video, you will discover how IBM and Tivoli solutions have helped Hertz Australia manage massive, enterprise-wide data growth. Find out how implementing disaster recovery management enabled Hertz Australia to manage their environment on a single command. 
(VIDEO) READ ABSTRACT |

Business Continuity Planning IT Survival Guide by CA Technologies.

December 2008 - (Free Research)
This survival guide will help you and your company start to plan an effective business continuity plan. The end result should be a reduction in risk factors and to minimize the impact of disasters that are out of your control. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 458 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts