RSS feed Get our RSS feed

News by Topic

asset protection

Results 1 - 25 of 27Sort Results By: Published Date | Title | Company Name
By: Vision Solutions     Published Date: Feb 18, 2008
Continuous member service is an important deliverable for credit unions, and. the continued growth in assets and members means that the impact of downtime is affecting a larger base and is therefore potentially much more costly. Learn how new data protection and recovery technologies are making a huge impact on downtime for credit unions that depend on AIX-hosted applications.
Tags : vision, high availability, ibm, aix, cdp, core union
     Vision Solutions
By: Hewlett Packard Enterprise     Published Date: Feb 05, 2018
As businesses plunge into the digital future, no asset will have a greater impact on success than data. The ability to collect, harness, analyze, protect, and manage data will determine which businesses disrupt their industries, and which are disrupted; which businesses thrive, and which disappear. But traditional storage solutions are not designed to optimally handle such a critical business asset. Instead, businesses need to adopt an all-flash data center. In their new role as strategic business enablers, IT leaders have the responsibility to ensure that their businesses are protected, by investing in flexible, future-proof flash storage solutions. The right flash solution can deliver on critical business needs for agility, rapid growth, speed-to-market, data protection, application performance, and cost-effectiveness—while minimizing the maintenance and administration burden.
Tags : data, storage, decision makers, hpe
     Hewlett Packard Enterprise
By: Dell EMC     Published Date: Nov 04, 2016
According to recent ESG research, 70% of IT respondents indicated they plan to invest in HCI over the next 24 months. IT planners are increasingly turning toward HyperConverged Infrastructure (HCI) solutions to simplify and speed up infrastructure deployments, ease day-to-day operational management, reduce costs, and increase IT speed and agility. HCI consists of a nodal-based architecture whereby all the required virtualized compute, storage, and networking assets are self-contained inside individual nodes. These nodes are, in effect, discrete virtualized computing resources “in a box.” However, they are typically grouped together to provide resiliency, high performance, and flexible resource pooling. And since HCI appliances can scale out to large configurations over time, these systems can provide businesses with investment protection and a simpler, more agile, and cost-effective way to deploy virtualized computing infrastructure. Read this paper to learn more.
Tags : data, software-defined, hyper-convergence, hdd, sddc
     Dell EMC
By: CA Technologies     Published Date: Apr 06, 2017
Privileged identity, accounts and credentials are core, critical assets for enterprises that must be highly protected through a combination of technology and processes which are enabled by privileged access management. Delivering that protection is instrumental in breaking the data breach kill chain, helping to prevent attacks and mitigating the impact of those that do occur.
Tags : data breach, it security, malicious spyware, security management, cloud security, system protection
     CA Technologies
By: NetIQ     Published Date: Jun 11, 2012
Take the effort out of log management and gain the actionable information you need to improve your organization's security posture. Receive your complimentary whitepaper NOW!
Tags : netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
     NetIQ
By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : risk, attack, security, business
     CA Technologies
By: CA Mainframe     Published Date: Sep 12, 2008
The CA Automated Storage Optimization Mainframe Suite provides a best-practices-based and intelligent approach to SRM, delivering the tools to identify and classify your storage assets. Access this Technology Brief to understand how to maximize use of existing storage resources and ensures protection of business-critical applications and information.
Tags : srm, storage resource management, zos, z/os, ibm, ibm server, ca mainframe, mainframe
     CA Mainframe
By: CA Technologies EMEA     Published Date: Aug 03, 2017
For organizations with additional security requirements for high value servers hosting business-critical assets, CA Privileged Access Manager Server Control provides localized, fine-grained access control and protection over operating system-level access and application-level access. Agent-based, kernel-level protection is available for individual files, folders and specific commands based on policy and/or finedgrained controls on specific hosts.
Tags : identity management, privileged user access, secure privileged credentials, secure hybrid it
     CA Technologies EMEA
By: NetIQ     Published Date: Nov 01, 2012
Take the effort out of log management and gain the actionable information you need to improve your organization's security posture.
Tags : security intelligence, compliance, log management, user activity monitoring, security
     NetIQ
By: Oracle     Published Date: Oct 20, 2017
Your enterprise runs its critical applications on Oracle Databases, and as an enterprise IT leader, maintaining the performance and availability of your databases is among your top priorities. Any degradation in performance or loss of data could result in serious business disruption and loss of revenue, so protecting this vital asset is a must. There are many causes of data loss— administration errors, system or media failures, cyberattacks, and more—but we often overlook design flaws in the very systems meant to protect data: general-purpose backup systems. Many existing data protection solutions fail to meet the demands of critical databases because they treat them as generic files to copy as opposed to specialized resources. Taking a generic approach to database backup and recovery not only exposes you to the risk of data loss, it also negatively impacts performance and makes it difficult to recover within acceptable timeframes.
Tags : 
     Oracle
By: Oracle     Published Date: Oct 20, 2017
Virtually every business-oriented conversation Wikibon has with senior IT leaders includes a discussion of digital transformation. The relevance to this research is the increasing interdependency between organizations and the data they use, create, access, share and store. Digital means data and lots of it; and this data must be protected. The data requirements facing organizations today as a direct result of digital initiatives are unprecedented and require new approaches for protecting and enabling recovery for high value data assets. Governments around the world are trying to keep pace with the digital tsunami and new/evolving regulations will further pressure data protection and recovery requirements. For example, the EU’s General Data Protection Regulation (GDPR) states that organizations must take appropriate measures to ensure the ability to restore personal data “in a timely manner in the event of a physical or technical incident.” Beginning in May of 2018, penalties for non-co
Tags : 
     Oracle
By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software
     Absolute Software
By: Viavi Solutions     Published Date: Apr 14, 2017
VoIP’s extreme sensitivity to delay and packet loss compared to other network applications such as web and e-mail services, presents a real challenge. A basic understanding of VoIP traffic and of the quality metrics provided by VoIP monitoring tools will help keep your network running smoothly. Follow our 10 VoIP best practices to ensure quality service for your network. This white paper guides you through the essentials of VoIP troubleshooting, including common problems and the metrics you should employ to fix and prevent them. You’ll learn how these metrics relate to one another and to overall VoIP health. You’ll also learn the best practices for keeping your VoIP network flowing smoothly, your time-to-resolution low, and end users happy.
Tags : sensitive information, data protection, network security, asset protection, network performance, network analysis, troubleshooting solutions
     Viavi Solutions
By: CDW     Published Date: Feb 24, 2015
The fundamentals of security and management of software have not changed. But the new computing environment – mobile devices, cloud computing and virtualization – requires new approaches to familiar challenges. What’s more, software publishers are bringing a new energy to their own vigilance. A capricious economy has many of them stepping up the number of customer audits. As organizations deal with these software licensing challenges, they also face increasingly sophisticated security threats that continuously morph, just a step ahead of remedies to stop them. Organizations need a comprehensive approach to security and software asset management. This white paper will examine the interconnection between SAM and security, offering practical advice on how enterprises can protect themselves and where to go for support.
Tags : software asset management, it enterprise, software licensing, mobility, cloud computing, data protection
     CDW
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
     Trend Micro, Inc.
By: Dell Software     Published Date: May 28, 2013
Tools and techniques used to protect physical data are no longer sufficient for virtual data assets. How do you know which technology is right for your organization? Let an expert do the work for you: The Buyers’ Guide to Virtual + Physical Data Protection.
Tags : dell quest, appassure, data protection, virtual data, physical data protection
     Dell Software
By: IBM     Published Date: Oct 10, 2013
Today, your company's digital presence is your reputation and your brand. But websites and other IT assets are vulnerable to security breaches, downtime and data loss—all of which can negatively affect your reputation and competitive position. Read this paper, commissioned by IBM with leading analyst Forrester to learn how IT security decision makers across the globe are doing more with less by outsourcing key security tasks.
Tags : reputational risk, it outsourcing, it security, security, risk, security breach, digital presence, it assets
     IBM
By: Symantec     Published Date: Apr 04, 2013
Stuxnet, a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : code signing, cyber attack, anti-virus, intrusion prevention, private keys, asset protection, security
     Symantec
By: Nevada Corporate Headquarters     Published Date: Sep 13, 2011
Incorporating in Nevada provides asset protection and reduced tax exposure. You can live anywhere and still incorporate in the Silver State.
Tags : nevada edge, asset protection, tax saving strategies, save money, business lawsuits
     Nevada Corporate Headquarters
By: AirTight Networks     Published Date: Aug 21, 2009
More and more companies are realizing that their corporate air waves are an asset that requires protection. Strong security policies have been created for wired networks. The same is now needed for the corporate air waves. This paper will discuss the compelling business reasons why an investment in wireless intrusion prevention should be made.
Tags : intrusion prevention, wireless security, security policy, security policies, security management, governance, airtight, airtight networks
     AirTight Networks
By: NETIQ     Published Date: Mar 12, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that you’re doing so.
Tags : security intelligence, compliance, log management, user activity monitoring, security
     NETIQ
By: NETIQ     Published Date: Sep 09, 2013
Compliance mandates are changing, and collecting logs is not enough. To reduce the risk of audit failure, you must be able to produce reports that both help you review anomalies, and demonstrate to ever-more attentive auditors that you’re doing so.
Tags : security intelligence, compliance, log management, user activity monitoring, security
     NETIQ
By: Dell EMC     Published Date: Nov 04, 2016
According to recent ESG research, 70% of IT respondents indicated they plan to invest in HCI over the next 24 months. IT planners are increasingly turning toward HyperConverged Infrastructure (HCI) solutions to simplify and speed up infrastructure deployments, ease day-to-day operational management, reduce costs, and increase IT speed and agility. HCI consists of a nodal-based architecture whereby all the required virtualized compute, storage, and networking assets are self-contained inside individual nodes. These nodes are, in effect, discrete virtualized computing resources “in a box.” However, they are typically grouped together to provide resiliency, high performance, and flexible resource pooling. And since HCI appliances can scale out to large configurations over time, these systems can provide businesses with investment protection and a simpler, more agile, and cost-effective way to deploy virtualized computing infrastructure. Read this paper to learn more.
Tags : 
     Dell EMC
By: Dell EMC     Published Date: Nov 04, 2016
According to recent ESG research, 70% of IT respondents indicated they plan to invest in HCI over the next 24 months. IT planners are increasingly turning toward HyperConverged Infrastructure (HCI) solutions to simplify and speed up infrastructure deployments, ease day-to-day operational management, reduce costs, and increase IT speed and agility. HCI consists of a nodal-based architecture whereby all the required virtualized compute, storage, and networking assets are self-contained inside individual nodes. These nodes are, in effect, discrete virtualized computing resources “in a box.” However, they are typically grouped together to provide resiliency, high performance, and flexible resource pooling. And since HCI appliances can scale out to large configurations over time, these systems can provide businesses with investment protection and a simpler, more agile, and cost-effective way to deploy virtualized computing infrastructure. Read this paper to learn more.
Tags : 
     Dell EMC
By: IBM     Published Date: Apr 04, 2016
Discover how covert threats from the dark web can impact your network, and what you can do to protect your assets.
Tags : ibm, ibm x-force threat intelligence, threat intelligence, asset protection, threat management, security
     IBM
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics