PODCAST:
In this podcast, Storage Decisions speaker Jon Toigo discusses the role of LTFS for backup, how it works, and the requirements for implementation. He also provides a glimpse into the LTFS future and explains why more IT professionals are embracing it as general purpose storage.
VIDEOCAST:
Learn how Sun StorageTek T-series tape drives use a Crypto-Key Management System to encrypt data, and how Volsafe technology helps your business meet electronic, regulatory, and legal requirements.
VIDEO:
Check out this short video to explore one industry-leading vendor's backup and data protection solutions. Whether you're just starting out, building momentum or expanding your business, these storage solutions for backup and data protection can help you. Watch now to learn more.
WEBCAST:
Storage managers are finding it difficult to acquire all the new data while continuing to keep up performance levels and availability, all within their budget. Fortunately, there is new industry leading management software which has proven to have easy navigation and improved performance and analytics.
WEBCAST:
Watch this short and effective webcast to learn about a backup recovery solution that is fast, scalable and secure, ensuring that your backup data is protected and available whenever you need it to minimize downtime and maximize availability.
WEBCAST:
This Webcast will help you design a storage system that best matches the needs of your organization, providing tips on determining system needs and tools and resources for implementation.
VIDEO:
This short video examines the importance of remote server management, especially as organizations expand globally. Discover new design features that enable you to quickly detect issues, regardless of the physical location of your data center.
TRIAL SOFTWARE:
Download the compact VMware virtual machine and never run out of space again. Nasuni is your integrated storage and backup system that replaces clumsy tape rotations. Download free trial.
TRIAL SOFTWARE:
Learn how Sophos delivers complete protection against viruses, spyware and adware, controls VoIP, IM, P2P, games and removable storage devices and enables you to assess and control all endpoints.
VIDEOCAST:
Learn about Trusted Computing in today’s enterprise with this executive briefing on two different forms of embedded hardware security: the Trusted Platform Module (TPM) and self-encrypting drive (SED). Designed by the Trusted Computing Group (TCG) to counter the vulnerabilities of software-based security, and so much more.