Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "data protection"

Total Search Results : 65

Will They Make It? Part Two - Focus

December 01, 2009 10:06 AM
Developing a focus is hard for any organization, but it is probably the most important thing to the emerging technology company. As I stated in the first part of this series, determining if the emerging technology company you're looking to partner with is going to make it is never an exact science. There are many variables to consider, but one of the most important is their ability to focus.

CYA: Cover Your (Vendor) Agreements

November 12, 2009 12:46 PM
Most applicable data privacy and security laws will hold your organization equally liable for a breach whether it was your fault or that of your third party vendor. Risks of data loss, data corruption and data theft are of paramount concern. Such risks are not limited to the organization's actions or omissions, but increasingly those of its vendors. When the worst happens, how do you manage the financial as well as data losses?

Frost & Sullivan: Network Protection Fuels Growth in the Latin American Markets

July 15, 2009 03:29 PM
A major factor motivating growth in the Latin America network security markets is the dramatically growing workforce in the region. The adoption of the home-office model, juxtaposed with the increase in the usage of laptops, PDAs, and smart phones has enhanced the need for securing the expanded network of companies in the region.

Jetico BCWipe Enterprise Removes Sensitive Data

June 26, 2009 08:00 PM
Data encryption hides sensitive data from prying eyes. File wiping securely deletes what is left over.

Jetico Unleashes Enforcer On Enterprise Data Deletion Policies

June 26, 2009 04:07 PM
Bcwipe enterprise launched as industry's first data wiping tool supporting systems management to enforce policies

EMC's Advanced Data Protection Enhances Efficiency Of Oracle Environments

June 25, 2009 04:50 PM
New Solutions Reduce Costs, Improve Efficiency And Maximize Performance

Storage Software Sales Show First Decline in More Than 5 Years

June 08, 2009 08:13 PM
The drop in software sales follows earlier IDC report that storage hardware sales also fell in the first quarter.

Code Green Plugs Data Leaks

November 15, 2007 07:17 PM
Code Green Networks' DLP product is good with alerts, but requires help with prevention.

Deep Storage: Does Tape Have a Place?

February 02, 2007 05:00 AM
At this stage of the data back-up game, tape shouldn't be the first line of defense. But it does make an excellent fallback, one you shouldn't be without.

Legal Brief: Communication Is Key to Security Compliance

January 19, 2007 05:00 AM
Technology is important, but communication is the key to protecting data, creating policies, and meeting business and legal needs.

« Previous Page  | 1 | 2 | 3 | 4 |  5 | 6 | 7  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers