RSS feed Get our RSS feed

News by Topic

endpoint data

Results 1 - 25 of 121Sort Results By: Published Date | Title | Company Name
By: Code42     Published Date: Mar 31, 2017
Today’s enterprise is vastly different than five years ago: 75 percent of the workforce is mobile, 90 percent of companies support Mac devices, five malware attacks happen every second and half of enterprise data lives outside the data center. As everything around you changes, you’re expected to support the enterprise with flat budgets and static head counts. Endpoint backup enables you to protect enterprise data and mitigate the growing risk of data loss, ransomware and insider threat.
Tags : 
     Code42
By: Code42     Published Date: Apr 04, 2017
Download the white paper today to learn why local dedupe is the superior choice to global dedupe.
Tags : 
     Code42
By: Code42     Published Date: Apr 04, 2017
Download “The business of ransomware: What every CXO should know” to see how a modern approach to endpoint data protection can disarm this accelerating threat.
Tags : ransomware, cyber attack, recovery, cyber security, cyber criminals, ransomware as a service, cyberthreat, data breach
     Code42
By: Code42     Published Date: Apr 04, 2017
Too often, organizations mistake electronic file sync and share as synonymous with endpoint backup, leaving critical data unprotected. In an ideal data management strategy, endpoint backup works alongside file sync and share to silently protect every version of every file. Together, the two technologies mitigate the growing risk of data loss to data breach, ransomware, or insider threat.
Tags : ransomware, cyber attack, recovery, cyber security, cyber criminals, ransomware as a service, cyberthreat, data breach
     Code42
By: McAfee     Published Date: Mar 31, 2017
This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.
Tags : unified data protection, data protection, pervasive data protection, optimized data lifecycle security, optimized data security
     McAfee
By: IBM     Published Date: May 01, 2017
If you function like most IT organizations, you've spent the past few years relying on mobile device management (MDM), enterprise mobility management (EMM) and client management tools to get the most out of your enterprise endpoints while limiting the onset of threats you may encounter. In peeling back the onion, you'll find little difference between these conventional tools and strategies in comparison to those that Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) have employed since the dawn of the modern computing era. Their use has simply become more: Time consuming, with IT trudging through mountains of endpoint data; Inefficient, with limited resources and limitless issues to sort through for opportunities and threats; and Costly, with point solution investments required to address gaps in OS support across available tools. Download this whitepaper to learn how to take advantage of the insights afforded by big data and analytics thereby usher i
Tags : ibm, endpoint management, mobile device management, enterprise mobility, os support, it organizations
     IBM
By: IBM     Published Date: May 01, 2017
Today's mobile landscape is very much a moving target. IT managers must keep track of all types of devices and platforms, hundreds if not thousands of applications and a threat landscape that changes by the minute. In this ever-changing environment, IT staff often find themselves drowning in mobile minutiae, overwhelmed by mountains of endpoint data but unable to extract meaning from it or make business decisions based on it. The tactical challenge of keeping infrastructure and business data secure while keeping workers productive each day takes precedence. And even then, IT managers can find themselves choosing between security and productivity as they decide how best to spend limited time and resources. This whitepaper will guide you how to get deep visibility into relevant endpoint data within the platform, granting actionable intelligence that can have a measurable impact on your organization.
Tags : it staff, applications, business data, data security, it managers, endpoint data, device, platforms
     IBM
By: IBM     Published Date: May 01, 2017
Endpoints continue to advance… Employees come and go... And the security landscape is in constant flux. IT leadership must rise to the challenge of managing a disparate and growing number of endpoints, operating systems, and platforms. The only efficient method of managing and securing all endpoints, their users, apps, content, and data is to implement and deploy a unified endpoint management (UEM) solution that changes and adapts with new technology, more skilled users, and increasingly sophisticated attacks by hackers. Read onward to learn why UEM is necessary, how it addresses complex problems encountered in the modern enterprise, and best practices for a successful deployment.
Tags : endpoints, employees, security landscape, security leaders, it security, unified endpoint management
     IBM
By: Code42     Published Date: Apr 28, 2016
Endpoint data backup is the foundation of an effective enterprise data security strategy. With half of enterprise data living on the endpoints, the attack surface is wide and risk of data leakage, loss, theft and breach is great.
Tags : 
     Code42
By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
     Commvault
By: Code42     Published Date: Jan 12, 2016
Endpoint backup is more than a copy of your data stored in the cloud; it’s the antidote to everything that ails enterprise endpoints.
Tags : code42, data, backup, security, endpoint, endpoint backup, employee churn, endpoint data
     Code42
By: Code42     Published Date: Jan 12, 2016
CrashPlan provides enterprise organizations with a way to view, manage and protect data from walking out the door.
Tags : code42, data, protection, churn, security, insider threat, employee churn, employee turnover
     Code42
By: Oracle + Dyn     Published Date: Jun 27, 2017
"Hybrid cloud adoption is exploding, with 80% of enterprises having at least some infrastructure in the cloud. This growth includes increased use of multiple endpoints to deliver applications, sites and services, requiring a performance management strategy to ensure those services reach users effectively. This educational webinar will cover the importance of: • Optimizing round trip times and latency, with clear real-time data • Understanding the importance of load balancing and active failover • Protecting your service from route hijacks, DDoS attacks and mitigating vulnerabilities Watch this short Video Webinar and learn how focusing on the DNS layer can help you plan, migrate and optimize your way to cloud success! Watch now! "
Tags : 
     Oracle + Dyn
By: Dell     Published Date: Feb 04, 2016
Security risks have grown roughly in proportion to the meteoric growth in employee-owned mobile devices within the workplace. Meanwhile cyber-attacks are growing in sophistication and severity. According to data from a new IDG Research survey, these dynamics have IT decision makers scrambling to tighten and revise BYOD policies while addressing the holistic issue of endpoint security. Download this two-page paper detailing the IDG Research results and for expert advice on securing your organization’s data in an increasingly mobile world.
Tags : security risks, byod, cyber attacks, byod policies
     Dell
By: Dell     Published Date: Jan 26, 2015
Forrester presents the relevant endpoint security data from their most recent surveys, with special attention given to those trends affecting SMBs (firms with 20 to 999 employees) and enterprises (firms with 1,000+ employees), along with analysis that explains the data in the context of the overall security landscape. As organizations prepare for the 2015 budget cycle, security and risk (S&R) professionals should use this annual report to help benchmark their organization’s spending patterns against those of their peers — while keeping an eye on current trends affecting endpoint security — in order to strategize their endpoint security adoption decisions. Please download this Forrester Research report, offered compliments of Dell, for more information.
Tags : dell, windows, endpoint security adoption, forrester, smbs, budget cycle, security
     Dell
By: Code42     Published Date: Nov 19, 2015
Eliminate Data Loss Risk by Protecting All Enterprise Information
Tags : 
     Code42
By: Code42     Published Date: Nov 19, 2015
Find out why using endpoint backup for data/device migrations is painless for users, faster for admins and better for users.
Tags : 
     Code42
By: Dell     Published Date: May 09, 2017
The workplace is changing and the one-size-fits-all approach to technology is changing along with it. As a result, your organization may need to rethink how to keep productivity high, promote collaboration, delight employees with the latest devices all while keeping IT within budget. This interactive eGuide will be your one-stop resource to understand all the new innovation available in Dell’s latest notebooks, desktops, 2-in-1s and ecosystem that can keep your organization future-ready. Access the eGuide from Dell and Intel® and you will learn: • How the workplace and workforce is changing • What tools and solutions help IT go from maintenance to innovation • How innovation is changing notebooks, 2-in-1s, desktops and workstations • The latest Windows 10 features employees will be talking about • What you need to keep endpoints and data secure
Tags : 
     Dell
By: Code42     Published Date: Jul 07, 2015
Beyond baseline requirements like centralized management, user transparency, scheduled backups and the ability to restore to different devices, buyers must evaluate against endpoint data protection differentiators to ensure they purchase the most secure and scalable solution for their organization.
Tags : 
     Code42
By: Code42     Published Date: Jul 07, 2015
Continuous, real-time data backup is the only viable solution for protecting all enterprise data while providing for a seamless migration process. But how do you achieve it?
Tags : 
     Code42
By: Code42     Published Date: Oct 08, 2015
Join Code42 and featured speaker, IDC Program Vice President Laura DuBois to learn: - Up-to-the minute trends in endpoint security - The challenges and opportunities of growth in unstructured data - How IT can regain control without compromising end-user productivity -Table stakes for enterprise-grade endpoint backup
Tags : 
     Code42
By: Code42     Published Date: Oct 16, 2015
Today’s organizations face a ballooning data management and risk problem. The use of laptops, tablets, workstations, servers and smartphones in the enterprise to create and store critical data is growing at an alarming rate.
Tags : backup, data, legal hold
     Code42
By: Code42     Published Date: Oct 16, 2015
Find out why using endpoint backup for data/device migrations is painless for users, faster for admins and better for users.
Tags : backup, data, legal hold
     Code42
By: Code42     Published Date: Mar 20, 2014
Enterprise IT teams face increasing challenges as the amount of valuable data living on endpoints continues to grow. Adding complexity is the mounting list of government regulations to which enterprises must comply. Read how endpoint backup can satisfy data collection and preservation requirements in a more streamlined and cost-effective manner than traditional e-discovery methods.
Tags : code 42, enterprise it, e-discovery, esi, endpoint backup, crashplan
     Code42
By: Code42     Published Date: Mar 20, 2014
Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn't provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data.
Tags : code42 software, endpoint backup, data migration, data loss, data management, data risk, encryption
     Code42
Start   Previous   1 2 3 4 5    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics