removable media

Results 1 - 6 of 6Sort Results By: Published Date | Title | Company Name
Published By: Redstor UK     Published Date: Mar 12, 2018
Backup and recovery have been a constant for organisations over the years, often not seen as glamorous aspects of an IT environment but as solutions that are necessary all the same. Environments have changed over the years and the focal use for backups have changed with them, although your solutions may not have. Taking a simple off-site backup, whether this be to disk, tape or other removable media, would once have been the last line of defence for data protection. Solutions were reliable and ensured data could be recovered in a timely manner.
Tags : 
recovery, backup, infrastructure, security, data
    
Redstor UK
Published By: CREDANT Technologies     Published Date: Feb 10, 2011
This two-part whitepaper will address some of the best practice approaches that you may wish to evaluate and potentially adopt in order to reduce the risk of USB devices becoming the source of a significant leak or virus infection.
Tags : 
credant technologies, removable media, best practices, security, usb device, corporate governance, virus infection, anti spam
    
CREDANT Technologies
Published By: Code42     Published Date: Apr 22, 2016
Today, in the age of information, people are paid for their ideas: to create original knowledge products or add value to existing products. Given their self-reliance, it is not surprising that workers take pride in their outputs—up to half of employees take a portfolio of files with them when they leave. When employees move on, many feel entitled to the work they’ve created.They presume it is acceptable to transfer work documents to personal computers, removable media, tablets, smartphones or online file sharing apps. Some pilfered data is innocuous and already in the public realm. But some of it is classified. Read this paper to find out how to collect and secure data to protect operations, reputation and continuity when employees leave.
Tags : 
data protection, code 42, data security, intellectual property, database security, information management, secure content management, legal issues
    
Code42
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : 
trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
    
Trend Micro, Inc.
Published By: Spectra Logic     Published Date: Aug 21, 2009
Most data storage devices can be broadly characterized as either fixed media or removable media. This paper briefly examines and compares magnetic tape, magneto-optical disk, and removable magnetic disks, and identifies their positioning, future trends, and market applications.
Tags : 
backup, disk backup, tape backup, disk-based backup, tape-based backup, storage media, tape storage, disk storage
    
Spectra Logic
Published By: NETIQ     Published Date: Sep 09, 2013
Virtualization technology can solve the cost vs. time dilemma that traditional data recovery solutions pose, enabling organizations to quickly and cost-effectively recover all server workloads. To learn more, download your copy of this NetIQ paper today.
Tags : 
netiq, white paper, disaster recovery, workload mirroring, removable-media backup, server workload, virtualization technology, security
    
NETIQ
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.