Secure data storage

Email Alerts

Register now to receive news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Can a Maxtor One Touch USB transfer data from one PC to another?

    Expert Brett P. Cooper tells users how to share a Maxtor One Touch USB between personal computers and how to safely remove the unit before disconnecting it. 

  • Security flaw could put EMC Centera users at risk

    EMC Centera relies on MD5 hash integrity for its single-instancing storage feature -- potentially compromising its ability to provide SEC compliance. UPDATED: 3.25pm EST 

  • Get ready for LTO-3

    Get ready for the next greatest thing in tape technology -- LTO-3. Bob Abraham, tape industry analyst and founder of Freeman Reports Inc., says the next iteration of L... 

  • Security concerns for maintaining multiple operating systems on the same host


  • The evolving role of data replication

    Data replication may soon be viewed less as a standalone tool and more as a part of a continuum of data protection technologies. 

  • Backup School: Final Exam

    Backup School lessons 1 through 9 have taught you the basics of backup, how to prevent hardware failure and recover from application loss, as well as the importance of compliance. Now it's time to prove your expertise. Take the Backup School final ex... 

  • Time to try storage smart cards?

    It's a safe bet that your storage network uses at least one of several types of smart cards that offer security and mobility to the enterprise. Storage security expert Vijay Ahuja explains the ins and outs of the various types of storage smart card t... 

  • Backup school: Lesson seven

    Why replication? Is replication worth it? Should you choose synchronous or asynchronous replication? Lesson seven of's "Backup School" explores the ins and outs of replication. Professor Dorian Cougias examines the pros and cons of ... 

  • Making DMZ isolated networks safe


  • Backup school: Lesson five

    Losing an operating system or an application is always a nightmare. Lesson five of "Backup school" gives you the tools you need to prevent and recover from either of these losses.