Storage Encryption White Papers

(View All Report Types)
IDC WP - Accelerating Converged Infrastructure with the FlexPod Datacenter Solution and the Support Alliance
sponsored by NetApp
WHITE PAPER: This IDC white paper explores one such technology - a data center solution designed to help organizations achieve timely, repeatable and consistent virtual deployments - and explores how it stands up against some of today's most pressing virtualization challenges. Also included are today's best practices regarding virtual environments.
Posted: 17 Jan 2012 | Published: 11 Jul 2011

NetApp

Achieving Superior Manageability, Efficiency, and Data Protection with Oracle's Sun ZFS Storage Software
sponsored by Oracle Corporation
WHITE PAPER: Oracle's Sun ZFS Storage software is the key ingredient that enables Oracle's Sun ZFS Storage Appliances to deliver unmatched simplicity, ease-of-use, increased storage efficiency, and industry leading price/performance.
Posted: 21 Mar 2011 | Published: 01 Dec 2010

Oracle Corporation

IBM XIV Storage System: Engineered for Business Continuity
sponsored by IBM
WHITE PAPER: This comprehensive white paper explores the factors to consider and the evaluations needed to make informed decisions to minimize downtime, prevent technological mishaps, and compensate for natural or man-made disasters.
Posted: 08 Aug 2011 | Published: 08 Aug 2011

IBM

ExaGrid Gets High Marks in Independent ESG Lab Evaluation
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: ESG Lab believes that organizations struggling with the cost, complexity, and risk associated with tape backups would be wise to consider the bottom line savings that can be achieved with ExaGrid. Check out this lab validation report to learn more.
Posted: 07 Feb 2012 | Published: 01 Feb 2012

ExaGrid Systems, Inc.

When Good Backups Go Bad: Data Recovery Failures and What to Do About Them
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, you'll learn about some of the most common pitfalls associated with backups and how to avoid them. You'll learn about the repercussions of poor/failed backups, and learn how to establish a backup strategy that can ensure minimal downtime during a disaster. Read on to learn more.
Posted: 22 Nov 2011 | Published: 22 Nov 2011

Symantec Corporation

Consolidate Your Back-Up Systems to Save Money and Reduce Risks
sponsored by IBM
WHITE PAPER: When a data disaster occurs, are you confident that the right person with the right training will log into the right system, restore the right data to the right place and do it quickly? Read this white paper to learn how one company found a solution to this problem.
Posted: 21 Nov 2013 | Published: 31 Aug 2012

IBM

HP Data Protector Guide to Virtual Server Protection
sponsored by HP Inc
WHITE PAPER: HP Data Protector software, a key component of the HP Information Management solutions portfolio, helps you protect enterprise information in both physical and virtual environments. Read this white paper to learn more.
Posted: 26 Sep 2011 | Published: 26 Sep 2011

HP Inc

ExaGrid Systems Named Champion in Disk Backup Vendor Landscape by Info-Tech Research Group
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: As a Disk Backup Champion, ExaGrid received the highest rating from Info-Tech Research Group for its exceptional product architecture and overall vendor score highlighting the company’s ‘exemplary’ strategy and strong viability, reach and channel. Read on to learn more.
Posted: 07 Feb 2012 | Published: 07 Feb 2012

ExaGrid Systems, Inc.

Case Study - Australia Institute of Management
sponsored by Nimble Storage
WHITE PAPER: This case study highlights the importance of updating IT systems to handle increased storage demands. It also explains how one organization was able to implement a shared storage solution that was designed to work in a virtualized environment.
Posted: 23 Apr 2014 | Published: 30 Apr 2013

Nimble Storage

A Practical Guide to Cloud Computing Security
sponsored by Avanade
WHITE PAPER: Typically, the level of security you get will be designed to meet the needs of the most risky client in the cloud. And, if you use the tools identified in this paper as a starting point, you will have a good idea of how comparable your cloud security versus internal security will be.
Posted: 19 Feb 2010 | Published: 19 Feb 2010

Avanade