RSS feed Get our RSS feed

News by Topic

back up

Results 326 - 350 of 1035Sort Results By: Published Date | Title | Company Name
By: Acronis EMEA     Published Date: May 18, 2015
This book is a guide to modern data protection for IT professionals that covers the simplest file backup scenarios to comprehensive protection strategies for businesses with complex IT environments.
Tags : backup, data protection, data security, protection strategies, recovery, cloud computing, virtualization, backup types
     Acronis EMEA
By: Acronis EMEA     Published Date: May 18, 2015
Download this case study to learn about the backup product they chose and how it gave them with a unified data and application database backup solution that simplified the procuring, learning and integrating of additional products, while saving time, lowering costs, and more.
Tags : backup, data protection, database backup application solution, data security, unified data, recovery, backup data
     Acronis EMEA
By: Acronis EMEA     Published Date: May 18, 2015
Download this case study now to find out about choosing Acronis backup solution and the benefits it came with.
Tags : acronis backup solution, backup solution, backup, recovery, protection, recovery services, benefits of acronis backup solution, remote recovery services
     Acronis EMEA
By: Ciena     Published Date: Nov 15, 2016
Research and Education (R&E) networks are experiencing a surge in capacity demand as a result of the massive growth of streaming media (Netflix, Facebook, YouTube), growing utilization of public cloud services, and the continued need to support large scientific data file transfers for researchers collaborating around the globe. This increase in traffic is driving many operators to evaluate network backbone upgrades to 100G. Upgrading is necessary but costly. But what if operators could upgrade their R&E networks to 100G for 50 percent less CAPEX investment and extend the life of the existing routers, while actually simplifying the architecture to enable lower operational costs? Download our app note to learn how.
Tags : o-vpn, integrated access device, pinpoint, z-series, ciena 6500, ciena 5430, 6500-7, emotr
     Ciena
By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
The Total Economic Impact™ Of Forcepoint Web Security and Email Security, a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, shows how a prominent manufacturing company experienced a ROI increase with Forcepoint after switching from another cloud vendor. Download the study to learn how this company achieved over a three year period: An ROI of 122% within a payback period of 6 months. Security breach reduction cost savings of $743,000. With an estimated cost of $3.25 million per breach and a starting risk level of 25%, the organization saved $743,000 over three years. Productivity gains up to $152,000. Company reported that they have benefited from the reduction in time spent managing malware and phishing incidents. Discover the potential impact of Forcepoint Web Security Cloud and Email Security Cloud on your organization!
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
The Total Economic Impact™ Of Forcepoint Web Security and Email Security, a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, shows how a prominent manufacturing company experienced a ROI increase with Forcepoint after switching from another cloud vendor. Download the study to learn how this company achieved over a three year period: An ROI of 122% within a payback period of 6 months. Security breach reduction cost savings of $743,000. With an estimated cost of $3.25 million per breach and a starting risk level of 25%, the organization saved $743,000 over three years. Productivity gains up to $152,000. Company reported that they have benefited from the reduction in time spent managing malware and phishing incidents. Discover the potential impact of Forcepoint Web Security Cloud and Email Security Cloud on your organization!
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
Transforming Cloud Connectivity & Security in Distributed Networks Today’s digital transformation initiatives frequently begin with moving applications and data to the cloud. But traditional networking and security infrastructure, such as backhauling data from remote locations to central offices over MPLS lines, can’t keep up. Fortunately, new approaches that also move connectivity and security to the cloud are rapidly overcoming these hurdles. Technologies such as direct-to-cloud SD-WAN and site-to-site VPNs dramatically cut the cost of connectivity. However, they put pressure on other parts of the organization to adopt new ways of defending each site against internet intruders, protecting the use of web content, and securing data stored in cloud apps. In this webcast, we’ll discuss a new, integrated approach to connectivity and security. Used by enterprises and government agencies around the world to manage as many as 1,500 sites from a single console, Forcepoint’s branch security
Tags : 
     Forcepoint
By: Forcepoint     Published Date: May 14, 2019
The Total Economic Impact™ Of Forcepoint Web Security and Email Security, a commissioned study conducted by Forrester Consulting on behalf of Forcepoint, shows how a prominent manufacturing company experienced a ROI increase with Forcepoint after switching from another cloud vendor. Download the study to learn how this company achieved over a three year period: An ROI of 122% within a payback period of 6 months. Security breach reduction cost savings of $743,000. With an estimated cost of $3.25 million per breach and a starting risk level of 25%, the organization saved $743,000 over three years. Productivity gains up to $152,000. Company reported that they have benefited from the reduction in time spent managing malware and phishing incidents. Discover the potential impact of Forcepoint Web Security Cloud and Email Security Cloud on your organization!
Tags : 
     Forcepoint
By: Veeam '18     Published Date: May 01, 2019
This 5-minute, easy-to-read document explains why organizations need to protect Office 365 data. This report will teach you: • The big misunderstanding between Microsoft's responsibility and the IT organizations • 6 reasons why backing up Office 365 is critical • Who is in control of Office 365 data
Tags : 
     Veeam '18
By: Veeam '18     Published Date: May 01, 2019
This 5-minute, easy-to-read document explains why organizations need to protect Office 365 data. This report will teach you: • The big misunderstanding between Microsoft's responsibility and the IT organizations • 6 reasons why backing up Office 365 is critical • Who is in control of Office 365 data
Tags : 
     Veeam '18
By: Veeam '18     Published Date: May 01, 2019
Downtime & Data Loss are Business Problems, not IT Issues Data protection and backup are often among the least appreciated aspects of IT, both in terms of budget and the perception of creating “business value” for the broader organization. Arguably, data protection and backup aren’t always respected even when compared to other facets of IT — until something fails, breaks, is overwritten, or corrupted accidentally or on purpose.
Tags : 
     Veeam '18
By: Veeam '18     Published Date: May 01, 2019
Questo documento di facile e rapida lettura (5 minuti) spiega perché le organizzazioni devono proteggere i dati di Office 365. Questo report fa chiarezza su: • la sostanziale distinzione tra la responsabilità di Microsoft Office 365 e la responsabilità delle organizzazioni IT • 6 motivi per cui il backup di Office 365 è importantissimo • Chi controlla i dati di Office 365
Tags : 
     Veeam '18
By: Motorola Solutions     Published Date: Apr 26, 2019
The Transportation and Logistics industry is the backbone of the global supply chain. But as Transportation and Logistics companies work to ensure timely delivery, they also face a variety of security risks and challenges.
Tags : 
     Motorola Solutions
By: Bluewolf     Published Date: Apr 13, 2011
Watch our 5-minute video to also find out what upgrades you can't ignore in 2011, and what upgrades should be on your IT backlog for 2012. Avoid the dreaded snowball affect! Upgrade or Die.
Tags : software upgrade, oracle, sql server, mysql, it backlog, business productivity, bluewolf, system upgrade
     Bluewolf
By: Veeam Software     Published Date: Nov 10, 2016
In this book, I explain in clear, concise language how virtualization changes an organization’s backup needs, and how traditional backup solutions will — or won’t — work with that technology. Then I tell you about a set of innovative solutions from Quantum that solve many of the problems inherent in virtual data protection.
Tags : virtualisation, vm data protection, threat and vulnerability management, data protection
     Veeam Software
By: Quantum     Published Date: Nov 10, 2016
In this book, I explain in clear, concise language how virtualization changes an organization’s backup needs, and how traditional backup solutions will — or won’t — work with that technology. Then I tell you about a set of innovative solutions from Quantum that solve many of the problems inherent in virtual data protection.
Tags : virtualisation, vm data protection, threat and vulnerability management, data protection
     Quantum
By: Symantec     Published Date: Nov 19, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : unified data protection, database security, security
     Symantec
By: Symantec     Published Date: Nov 19, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security
     Symantec
By: Symantec     Published Date: Nov 19, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection
     Symantec
By: Riverbed     Published Date: Feb 26, 2015
Nobody can afford to lose data. But managing data, including backup and availability, in locations can present many logistical and technological challenges that bring complexity, expense, and risk. It doesn’t have to be that way, though. A new branch converged infrastructure approach allows organizations to project virtual servers and data to remote offices, providing for local access and performance while storing the data in centralized data centers. Enterprises can now do business across the globe in any location without putting data at risk.
Tags : data center, lose data, infrastructure, data backup, infrastructure
     Riverbed
By: Riverbed     Published Date: Feb 26, 2015
How can IT achieve the flexibility and agility it needs to offer multiple types of applications in multiple locations? Just as enterprises take advantage of applications hosted in multiple locations (i.e., public clouds, private clouds, or SaaS applications), they take advantage of different networks for different reasons (i.e. performance, backup, remote access). These could be MPLS links, ATM links, traditional Internet connections, or VPN lines. Enterprises, in effect, are already building hybrid networks, and those combined with the elements of hybrid clouds create the hybrid enterprise.
Tags : private clouds, public clouds, saas applications, vpn lines, hybrid clouds, hybrid enterprise
     Riverbed
By: Riverbed     Published Date: May 29, 2015
RIVERBED HELPS MANUFACTURING COMPANY CENTRALIZE RESOURCES AND ACHIEVE SUBSTANTIAL SAVINGS
Tags : infrastructure, data center, data security, storage, backup
     Riverbed
By: Riverbed     Published Date: Jul 22, 2015
As enterprise computing has evolved, businesses have been shifting to a “hybrid enterprise” where core applications and data can be located in private data centers and public clouds. The growth of hybrid cloud deployments accelerated the transition to hybrid wide-area networks (WANs). Private networks, such as MPLS, are being joined by Internet connections that offer a choice in delivery channels—costly, but predictable, networks for mission-critical loads and cheaper public networks for bulk loads such as data backups.
Tags : hybrid enterprise, private data centers, public clouds, wans, data backups
     Riverbed
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics