ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Center Physical Security Research

  • Computer Weekly – 12 March 2013: Will software-defined networking justify the hype?

    Sponsored by: TechTarget Security

    In this week's Computer Weekly, we take an in-depth look at one of the hottest emerging technologies – software-defined networking – and what it means for IT departments. We visit Iceland, home of the greenest datacentres, and see what they offer to CIOs. And we look at the growth of governance as a key task for CIOs. Read the issue now.

  • Data Center Designs to Help Meet Your Compliance Challenge

    Sponsored by: Iron Mountain

    This valuable resource reveals how the right data center services can help you successfully meet your industry-specific regulatory requirements and better support compliance.

  • Fundamental Principles of Generators for Information Technology

    Sponsored by: Schneider Electric

    This whitepaper covers the basics on standby generators and systems to prepare your IT staff for any prolonged utility power outages.

  • Calculating the Cost of Data Center Outages

    Sponsored by: Emerson Network Power

    This white paper details the results of a study that determined the real cost of unplanned data center outages.

  • Mapping Security for your Virtual Environment

    Sponsored by: Hewlett Packard Enterprise

    Access this brief white paper that addresses the concern over managing virtual environment security with an enterprise-ready system that provides full visibility of physical and virtual data center and simplified security policy management.

  • ShareFile Trial Demo

    Sponsored by: Citrix Systems, Inc.

    Citrix ShareFile is an enterprise follow-me data solution that enables IT to deliver a robust data sharing and sync service that meets the mobility and collaboration needs of users and the data security requirements of the enterprise. It enables optimal productivity for today's highly mobile, anywhere, any-device workforce.

  • ShareFile Enterprise Overview

    Sponsored by: Citrix Systems, Inc.

    Workshifting and BYOD trends are adding new challenges for IT who already struggle with protecting intellectual property and observing compliance regulations. This white paper explains how to use enterprise-grade file sharing technology to regain control over sensitive corporate while meeting mobility and collaboration needs of end users.

  • Chapter 3: Patching Security Holes in Private Clouds

    Sponsored by: Dell and VMware

    Download part 3 in this 4 part private cloud series for expert advice on patching the security holes in private clouds. Learn more about storage provisioning, perimeter security, data portability and much more.

  • Closing the security gap: 2012 IOUG enterprise data security survey

    Sponsored by: Oracle Corporation UK Ltd

    This exclusive paper surveys 350 data center managers to find out what the most prevalent threats are to data security today. Discover what your peers are doing to overcome these challenges, and learn helpful strategies for safeguarding your critical information.

  • Monitoring Physical Threats in the Modern Data Center

    Sponsored by: Ingram Micro

    Learn how your organization can protect against data center physical threats that can elude traditional monitoring methods. This paper outlines these threats and suggests approaches to deploying monitoring devices and reducing downtime.

  • Intel Cloud Builders Reference Architecture: Trusted Compute Pools with Parallels

    Sponsored by: Intel

    Establishing a trusted platform on the physical server layer of a cloud environment can be very challenging, but it’s not impossible. This brief video discusses how trusted computing pools can allow you to manage your cloud more efficiently and more securely.

  • Expert tips for Addressing Power Failure in Your Data Center

    Sponsored by: HPE and Intel®

    The loss of data center power can be critical to any organization. Access this expert e-guide learn why it is important to design your data center with power in mind to prevent capacity issues from happening. Also, gain insight into the reasons for outages and ways to mitigate the risks of potential power path issues

  • Essential Guide: Getting started with disaster recovery planning

    Sponsored by: Riverbed Technology, Inc.

    Whether you're new to IT disaster recovery planning or want to brush up on best practices, we have the answers for you in this essential DR planning guide.

  • Largest UK Network Solves BIG Problem with Small Solution

    Sponsored by: Nexsan

    ITV.com’s IT management sought a future-proofed solution that would improve overall performance and future proof for High Definition editing without increasing the physical storage footprint requirements of their small datacenter. Nexsan was the only company that could deliver the solution they required.

  • Best Practices Guide: Cabling the Data Center

    Sponsored by: Brocade

    This guide describes best practices for incorporating cabling in a typical data center, plus tips for selecting cabling components and information on data transmission media.

  • HP white paper: Complete Data Protection for VMware Virtual Environments

    Sponsored by: Hewlett Packard Enterprise

    This paper examines the issues of backup and recovery in VMware virtual server environments, and outlines the key features of HP Data Protector.

  • 5 Keys to Protecting Your Sensitive Information: What Every Enterprise Executive Should Know

    Sponsored by: Symantec Corporation

    Preventing sensitive information from being sent outside your enterprise has become a top priority for organizations today. If you are evaluating a data loss prevention (DLP) solution, make sure you have a clear understanding of the requirements for successful data protection. Read this paper to learn more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.