Storage Encryption Reports

A Computer Weekly buyer's guide to Colocation
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Colocation is an increasingly appealing option for data storage. In this 17-page buyer's guide, Computer Weekly looks at the constraints of migration, environmental considerations and datacentre opportunities in Africa.
Posted: 15 Mar 2021 | Published: 15 Mar 2021

TechTarget ComputerWeekly.com

Containers: Making security and business sense
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from startups.
Posted: 08 Feb 2021 | Published: 21 Aug 2018

TechTarget ComputerWeekly.com

Computer Weekly – 12 February 2019: The Met Office storms ahead on data analytics
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, find out how the Met Office takes 2TB of weather data every hour and turns it into useful business insight. We examine whether Amazon's presence in the retail market is putting off other retailers from using its public cloud services. And we look at the new 802.11ax wireless networking standard. Read the issue now.
Posted: 08 Feb 2021 | Published: 12 Feb 2019

TechTarget ComputerWeekly.com

Computer Weekly – 25 October 2016: 25 years of Linux
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, 25 years after Linus Torvalds released the Linux kernel, we look at how the open source operating system has influenced modern-day IT. Our new buyer's guide covers the fast-growing technology of object storage. And we examine the rise of corporate wireless networking. Read the issue now.
Posted: 08 Feb 2021 | Published: 25 Oct 2016

TechTarget ComputerWeekly.com

Computer Weekly Buyer's Guide to EU General Data Protection Regulation
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.
Posted: 08 Feb 2021 | Published: 07 Feb 2018

TechTarget ComputerWeekly.com

Best Practices and Tips for Data Management and Security
sponsored by Code42
EGUIDE: This expert e-guide examines the best practices, tips and considerations for optimal data storage security. Additionally, experts discuss four key data retention issues to address including access, cost, risks and productivity.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Code42

Case Study: SSB Wind Systems, End-To-End Service Mitigates Information Risks
sponsored by Iron Mountain
CASE STUDY: This short white paper discusses how one organisation transformed its data and records management processes through end-to-end off-site data protection and records management services.
Posted: 16 Oct 2013 | Published: 31 Dec 2012

Iron Mountain

E-Guide: Build a Hybrid Storage Cloud
sponsored by Hitachi Vantara
EGUIDE: This expert E-Guide explores the choices that must be considered when combining public and on-premise cloud storage and provides insight into the available products and services to help you make those decisions.
Posted: 30 Apr 2013 | Published: 30 Apr 2013

Hitachi Vantara

SearchStorage Editors Examine the Leading All-flash Array Vendors
sponsored by Pure Storage
EGUIDE: In this e-guide, we evaluate eight leading AFA vendors to let you decide which products best suit your organization. Read on as Logan Harbaugh, IT consultant and freelance reviewer with SearchStorage, breaks down how to select an AFA vendor based on functional specification, 3 essential purchasing considerations, and more.
Posted: 26 Jul 2017 | Published: 20 Jul 2017

Pure Storage

The Security of Software Containers & Sandboxing
sponsored by CloudPassage
EGUIDE: Sandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.
Posted: 24 Jan 2018 | Published: 22 Jan 2018

CloudPassage