Tape Security White Papers

(View All Report Types)
Achieving Security With Cloud Data Protection
sponsored by Iron Mountain
WHITE PAPER: Today, more companies than ever recognize the value and convenience of using cloud backup to protect their server data. However, enterprises considering cloud backup for protecting their vital data face these security concerns. Read this white paper to learn how to secure your cloud.
Posted: 27 Jan 2011 | Published: 27 Jan 2011

Iron Mountain

Case Study - Australia Institute of Management
sponsored by Nimble Storage
WHITE PAPER: This case study highlights the importance of updating IT systems to handle increased storage demands. It also explains how one organization was able to implement a shared storage solution that was designed to work in a virtualized environment.
Posted: 23 Apr 2014 | Published: 30 Apr 2013

Nimble Storage

NexGen n5 Storage System
sponsored by NexGen Storage
WHITE PAPER: Check out this ESG Report for a hands-on introduction to a hybrid solid-state storage solution designed to deliver fast performance for mixed-application workloads in both consolidated and virtual server environments. Read on to learn about the features of this technology, and to discover how it stacked up against ESG's lab testing.
Posted: 30 Mar 2012 | Published: 29 Mar 2012

NexGen Storage

A Practical Guide to Understanding and Deploying Cloud for the Enterprise
sponsored by Hitachi Vantara
WHITE PAPER: While the promise of cloud is heady, there is confusion about the different types of cloud, what they actually offer, and which will meet stringent business requirements. Knowing when and how best to deploy cloud is critical. This paper focuses on separating the hype of cloud from the “how to”.
Posted: 01 Dec 2010 | Published: 01 Dec 2010

Hitachi Vantara

Designing Secure Multi-Tenancy into Virtualized Data Centers
sponsored by Continental Resources
WHITE PAPER: Today’s traditional IT model suffers from resources located in different, unrelated silos—leading to low utilization and gross inefficiency. Enterprise servers reside in one area of the data center and network switches and storage arrays in another. This document describes the design of - and the rationale behind - the Secure Cloud Architecture.
Posted: 02 Apr 2010 | Published: 02 Apr 2010

Continental Resources

Eight Tips to Safeguard Your Business Information
sponsored by Iron Mountain
WHITE PAPER: Check out this short, two-page document to explore 8 tips for safeguarding your business information in today's day and age. Read on to fortify your data protection strategy with these tips, including: 1) structure your data, 2) assess and treat associated data risks, 3) ensure you have a disaster recovery plan and 5 more expert tips.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Iron Mountain

A Practical Guide to Cloud Computing Security
sponsored by Avanade
WHITE PAPER: Typically, the level of security you get will be designed to meet the needs of the most risky client in the cloud. And, if you use the tools identified in this paper as a starting point, you will have a good idea of how comparable your cloud security versus internal security will be.
Posted: 19 Feb 2010 | Published: 19 Feb 2010

Avanade

Can File Sync and Share be Both Flexible and Enterprise-ready?
sponsored by Code42
WHITE PAPER: This white paper highlights some of the crucial aspects of enterprise-wide file sync and share and proposes a solution that meets the challenges many organziations face.
Posted: 21 Feb 2014 | Published: 21 Feb 2014

Code42

ExaGrid Gets High Marks in Independent ESG Lab Evaluation
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: ESG Lab believes that organizations struggling with the cost, complexity, and risk associated with tape backups would be wise to consider the bottom line savings that can be achieved with ExaGrid. Check out this lab validation report to learn more.
Posted: 07 Feb 2012 | Published: 01 Feb 2012

ExaGrid Systems, Inc.

Protect Your IT System with Next Generation Security
sponsored by IBM
WHITE PAPER: Read through this exclusive white paper to find out about data breaches and what you can do to protect yourself, as well as three real-life examples of what can happen when your IT systems are attacked.
Posted: 21 Jan 2014 | Published: 31 Oct 2012

IBM