RSS feed Get our RSS feed

News by Topic

data protection software

Results 26 - 50 of 61Sort Results By: Published Date | Title | Company Name
By: Dell EMC     Published Date: Jul 05, 2016
Unity’s hybrid flash design comes with built-in data protection, cloud-based management, and all inclusive software to deliver the best hybrid economics – price, density, and TCO.
Tags : storage management, performance management, best practices, application integration, technology, business intelligence, hybrid, storage
     Dell EMC
By: Dell EMC     Published Date: Jul 05, 2016
Unity’s all flash design comes with built-in data protection, cloud-based management, and all inclusive software to deliver the best flash economics – price, density, and TCO.
Tags : 
     Dell EMC
By: Dell EMC Storage     Published Date: Nov 28, 2018
Powerful data protection in a converged appliance that is easy to deploy and manage — at the lowest cost-to-protect. The integrated appliance brings together protection storage and software, search, and analytics — plus simplified system management and cloud readiness. And, the IDPA System Manager, with its clean, intuitive interface, provides a comprehensive view of data protection infrastructure from a single dashboard.
Tags : 
     Dell EMC Storage
By: Dell Software     Published Date: Apr 25, 2008
In Quest’s new white paper, learn how to implement a solid data protection, recovery, compliance and e-discovery strategy for your critical e-mail data.
Tags : disaster recovery, data protection, exchange recovery, exchange e-discovery, comprehensive data protection, continuous data protection, brick level recovery, email archiving
     Dell Software
By: Dell Software     Published Date: May 07, 2014
Short: Download your trial of AppAssure™ - an advanced data protection tool that unifies backup, replication and recovery in one software solution. Try it today.
Tags : storage, advanced data protection, backup, replication, security, recovery, software solution, trial download
     Dell Software
By: Dell Software     Published Date: Aug 31, 2016
This white paper explains how you can make the right choices for nearly any backup and recovery scenario by carefully evaluating public cloud and data protection software capabilities.
Tags : 
     Dell Software
By: digitiliti     Published Date: Apr 02, 2007
The challenge of managing, protecting and storing digital data is a major issue for businesses of every size and category. Companies generally rank the improvement of their storage infrastructure as a top objective, and the escalation of data protection costs has become an overriding concern. According to recent research, the data storage capacity of the average North American enterprise is now 59 terabytes, and the projected annual production data growth is 20 to 30 percent.
Tags : data storage, software, data security, data protection, enterprise software, storage, digitiliti, backup and recovery
     digitiliti
By: EMC Corporation     Published Date: Dec 01, 2014
Data is changing the way organizations manage, consume, and deliver storage. Many legacy applications, however, are still in traditional storage silos, where data is tied to specific vendor storage and not easily configurable and monitored. EMC ViPR is the lightweight, software-only solution that centralizes, automates, and transforms storage into a simple, extensible and open platform.
Tags : data protection, availability, disaster recovery, easy configurable, vendor storage
     EMC Corporation
By: EMC Corporation     Published Date: Dec 01, 2014
The Solution Guide provides an introduction to data protection through continuous availability. The guide enables you to begin the planning and design of continuous availability for a Federation Software-Defined Center solution.
Tags : software-defined data center, data protection, planning and design, continuous availability
     EMC Corporation
By: FICO     Published Date: Mar 14, 2017
In this Executive Brief, we share best practices in how to evaluate and deploy layered controls that will help you develop a holistic approach to controls, investigate and control where risk is introduced, assess your risk appetite and benchmark your cybersecurity posture against others in your industry.
Tags : network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
     FICO
By: FICO     Published Date: Mar 14, 2017
Learn how technologies such as AI, self-calibrating models and self-learning analytics are being used to detect cyber attacks before they happen. Download now!
Tags : network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
     FICO
By: FICO     Published Date: Mar 14, 2017
Are you ready for a new year of killer devices, hacked fingerprints, crooked migration and more? Download now.
Tags : network security and data protection, advance threat defense, network visibility, security analytics, mobile security, cyber security detection software
     FICO
By: Group M_IBM Q418     Published Date: Sep 25, 2018
As of May 25, 2018, organizations around the world—not just those based in the EU—need to be prepared to meet the requirements outlined within the EU General Data Protection Regulation (GDPR). Those requirements apply to any organization doing business with any of the more than 700 million EU residents, whether or not it has a physical presence in the EU. IBM® Security can help your organization secure and protect personal data with a holistic GDPR-focused Framework that includes software, services and GDPR-specific tools. With deep industry expertise, established delivery models and key insights gained from helping organizations like yours navigate complex regulatory environments, IBM is well positioned to help you assess your needs, identify your challenges and get your GDPR program up and running.
Tags : 
     Group M_IBM Q418
By: HP     Published Date: May 14, 2014
In today’s business environment, customers rely on the most efficient, high performing, and reliable backup systems to protect critical business information. Customers need to protect increasing levels of data while keeping costs under control. HP StoreOnce Backup systems provide a disk-based data protection platform while addressing data growth by applying HP StoreOnce deduplication software for efficient, longer term data retention.This document describes the benefits of using HP StoreOnce Backup systems combined with HP StoreOnce Catalyst software and HP Data Protector to back up important enterprise data. This document also recommends backup and recovery implementations.
Tags : hewlett packard, storeonce, data protector, catalyst software
     HP
By: IBM     Published Date: Jun 15, 2009
The average SMB has most of the same data protection needs as its larger competitors. But most SMBs can't afford a trained staff assigned specifically to storage management and protection. As a result, when they buy storage management software they look for solutions that are both less expensive and easier to use than traditional products.
Tags : ibm, tivoli, storage management, smbs, small business, data protection, mom-and-pop, ema
     IBM
By: IBM     Published Date: Sep 10, 2009
Data protection and recovery can be a complicated problem in remote offices. But there are options. This white paper explores a range of possibilities, and shows how an adaptive data protection solution can protect remotely stored data for enterprises of all sizes.
Tags : ibm, applications, risks, rcovery considerations, backup, tivoli software, tivoli® storage manager fastback, remote office
     IBM
By: IBM     Published Date: Jan 09, 2014
Simply put, software defined storage is the abstraction of storage services from storage hardware. This term is more than just marketing hype, it’s the logical evolution of storage virtualization from simply being a storage aggregator to the end goal of storage as a service. To achieve this goal, software defined storage needs a platform from which to centralize.
Tags : ibm, storage switzerland, storage platform, sds, software defined storage, data center, storage virtualization, data protection
     IBM
By: IBM     Published Date: Jul 17, 2018
As of May 25, 2018, organizations around the world—not just those based in the EU—need to be prepared to meet the requirements outlined within the EU General Data Protection Regulation (GDPR). Those requirements apply to any organization doing business with any of the more than 700 million EU residents, whether or not it has a physical presence in the EU. IBM® Security can help your organization secure and protect personal data with a holistic GDPR-focused Framework that includes software, services and GDPR-specific tools. With deep industry expertise, established delivery models and key insights gained from helping organizations like yours navigate complex regulatory environments, IBM is well positioned to help you assess your needs, identify your challenges and get your GDPR program up and running
Tags : 
     IBM
By: IBM APAC     Published Date: Mar 19, 2018
IBM’s Spectrum Protect offering boasts more than 20 years of achievement in the protection and recovery of key IT systems. So, it would be easy to suppose that IBM’s new Spectrum Protect Plus and Spectrum Copy Data Management software offerings simply represent “Spectrum Protect with extra features.” That assumption would be incorrect. They are standalone, reimagined approaches aiming to solve a daunting IT challenge—virtualization protection/recovery—and aspiring to attain a coveted IT outcome—effective data management and enablement (DM&E), referred to by many as “copy data management” (CDM).
Tags : data protection, data availability, software defined storage
     IBM APAC
By: Infoblox     Published Date: Sep 04, 2013
Press headlines are filled by reports of malware attacks. Malware attacks, once the reserve of amateurs largely for amusement, are now launched by a number of entities. Today, a malware attack can literally come from anywhere in the world and can impact even the largest organization.
Tags : infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
     Infoblox
By: Infoblox     Published Date: Nov 07, 2013
According to the Ponemon Institute, the annual cost of malware breaches averaged $8.4 million. Read this white paper to gain insights into critical information to safeguard against DNS security threats and disrupt malware communications to your DNS servers.
Tags : infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
     Infoblox
By: Infoblox     Published Date: Sep 09, 2014
Stories about devastating cyberattacks are plaguing the news. Why? The DNS protocol is easy to exploit. See your network the way hackers do—as an easy target. Learn how you can effectively secure your DNS infrastructure today.
Tags : infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
     Infoblox
By: Infoblox     Published Date: Sep 09, 2014
DNS is a key part of enterprise networks but increasingly targeted by hackers. Traditional security measures such as next-generation firewalls or secure web gateways won’t shield your infrastructure from attacks. Learn how to protect your DNS today.
Tags : infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
     Infoblox
By: Infoblox     Published Date: Sep 09, 2014
An integrated DNS architecture is needed in today’s networking landscape. Designing a secure DNS architecture requires more than increased bandwidth and QPS. Learn how to build a secure and scalable DNS solution to ensure network availability.
Tags : infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc
     Infoblox
Start   Previous    1 2 3    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics