RSS feed Get our RSS feed

News by Topic

protection

Results 151 - 175 of 2221Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Aug 02, 2018
Enterprises like yours face the growing risk of cyberattacks, which increases your exposure to the risk of data loss. One of the most menacing forms of these is ransomware, where your data is encrypted and literally held ransom—until you pay cybercriminals to release it, or you recover your data from a point in time before your systems were attacked. Such attacks and data losses make headlines —damaging your organization’s reputation. And with new regulations concerning data protection coming into force (such as those introduced by the US Department of the Treasury and the European Union) failing to prepare for a quick recovery from a cyberattack could mean serious financial penalties.
Tags : 
     Oracle
By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
     Oracle
By: Preempt     Published Date: Nov 02, 2018
In our 2018 Trends in Information Security report, we outlined a concept we referred to as the ‘identity-aware perimeter.’ The essential idea is that as new architectures such as cloud, containers, mobility and IoT take hold, controlling access to resources will increasingly need to rely on identity as an alternative to purely network-based approaches focused more on ‘where’ you are than ‘who’ you are. By combining identity with user and entity behavior and risk scoring to gate access, Preempt fits squarely within this trend, which we think could be one of the most interesting and powerful to hit the infosec market in years. Preempt has few direct competitors, and its initial challenge will be finding ways to distinguish itself from vendors in adjacent categories such as adaptive multi-factor authentication (MFA), advanced threat protection, user and entity behavior analytics (UEBA) and cloud access security brokers (CASB), to name a few. Forging a new security category is never easy,
Tags : 
     Preempt
By: Dell EMC Storage     Published Date: Nov 28, 2018
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. It sounds like another current term, “digital transformation.” But in fact, effective digital transformation doesn’t happen without IT Transformation. A company that undergoes IT infrastructure transformation no longer has to rely on rigid, manual, siloed, legacy technologies. It sees a boost in IT operational speed, efficiency, scale, and cost effectiveness—tasks are automated, processes streamlined, and resources are freed up. Those IT-level improvements fuel a larger-scale digital transformation, allowing the company to thrive in today’s digital economy. It is able to out-innovate, out-think, and out-pace its competitors—ultimately becoming the disruptor, not the disrupted.
Tags : 
     Dell EMC Storage
By: Dell EMC Storage     Published Date: Nov 28, 2018
Powerful data protection in a converged appliance that is easy to deploy and manage — at the lowest cost-to-protect. The integrated appliance brings together protection storage and software, search, and analytics — plus simplified system management and cloud readiness. And, the IDPA System Manager, with its clean, intuitive interface, provides a comprehensive view of data protection infrastructure from a single dashboard.
Tags : 
     Dell EMC Storage
By: Dell EMC Storage     Published Date: Aug 15, 2019
The digital era is changing the way that organizations think about, protect, and monetize data. Now more than ever they are pushing to be digitally-driven, and to achieve this they must be data-driven. Data powers everything in modern organizations; analytics, digital experiences, IoT, and artificial intelligence are notable examples. All are essential to organizations that want to succeed in a digitally transformed world, but they simply cannot function without data. This is driving the shift from data as a static digital asset to data as a strategic business asset.
Tags : 
     Dell EMC Storage
By: Dell EMC Storage     Published Date: Aug 15, 2019
L’ère du numérique change la façon dont les organisations considèrent, protègent et monétisent les données. Aujourd’hui plus que jamais, elles sont axées sur le numérique, et doivent se concentrer sur la gestion des données. Les organisations modernes sont entièrement alimentées par les données ; l’analytique, les experiences numériques, l’IoT et l’intelligence artificielle en sont des exemples probants. Tous ces éléments sont essentiels aux organisations qui souhaitent réussir dans un monde transformé par le numérique. Toutefois, ils ne peuvent fonctionner sans données. C’est ce qui engendre cette utilisation de données en tant que ressource d’entreprise stratégique, et non plus en tant que resource numérique statique.
Tags : 
     Dell EMC Storage
By: Dell EMC Storage     Published Date: Aug 20, 2019
The move to data-centric business models is geared to enable organizations to turn their data into data capital. Because of the more stringent performance, scalability, availability, flexibility, and management requirements of the data-centric model, these organizations must modernize their storage and data protection infrastructure through the process of IT transformation. This white paper defines data capital, describes how boosting data capital is a critical ingredient for competitive differentiation, and discusses the implications for data storage and data protection infrastructure. It then turns to an overview of the Dell EMC storage and data protection portfolio, exploring the benefits these solutions offer to organizations interested in crafting the most effective infrastructure to maximize the value of data capital.
Tags : 
     Dell EMC Storage
By: Dell EMC Storage     Published Date: Sep 03, 2019
The move to data-centric business models is geared to enable organizations to turn their data into data capital. Because of the more stringent performance, scalability, availability, flexibility, and management requirements of the data-centric model, these organizations must modernize their storage and data protection infrastructure through the process of IT transformation. This white paper defines data capital, describes how boosting data capital is a critical ingredient for competitive differentiation, and discusses the implications for data storage and data protection infrastructure. It then turns to an overview of the Dell EMC storage and data protection portfolio, exploring the benefits these solutions offer to organizations interested in crafting the most effective infrastructure to maximize the value of data capital. Dell EMC Transformation powered by Intel®
Tags : 
     Dell EMC Storage
By: Dell EMC Storage     Published Date: Sep 03, 2019
The digital era is changing the way that organizations think about, protect, and monetize data. Now more than ever they are pushing to be digitally-driven, and to achieve this they must be data-driven. Data powers everything in modern organizations; analytics, digital experiences, IoT, and artificial intelligence are notable examples. All are essential to organizations that want to succeed in a digitally transformed world, but they simply cannot function without data. This is driving the shift from data as a static digital asset to data as a strategic business asset.
Tags : 
     Dell EMC Storage
By: Dell EMC EMEA     Published Date: Nov 23, 2018
Companies Prioritize Detection Amidst A Wave Of Security Incidents Advanced endpoint threats and steady attacks change the way that decision-makers at organizations of all sizes and across industries prioritize, purchase, and execute on security initiatives. Now more than ever, IT security professionals recognize the importance of front line detection and are shifting priorities to close gaps that place their organizations at risk. Learn more about Dell solutions powered by Intel®
Tags : 
     Dell EMC EMEA
By: Fortinet EMEA     Published Date: Nov 26, 2018
Most organizations are in the midst of some form of digital transformation (DX), transforming how they bring products and services to the market—and ultimately deliver value to their customers. But DX initiatives also bring complexity for the network operations team. With business-critical services distributed across multiple clouds, this leads to potential performance issues, especially at branch locations. Given these realities, it is no wonder that software-defined wide-area network (SD-WAN) technology is rapidly going mainstream. Unfortunately, SD-WAN is an example of the paradox of DX: transformative technology can potentially move the business to the next level, but the expanded attack surface it creates can expose the organization to significant risk. That is why an SD-WAN deployment, like every other DX effort, should be accompanied by a security transformation (SX) that rethinks outdated principles, broadens protection beyond the data center, and integrates the security archit
Tags : 
     Fortinet EMEA
By: Fortinet EMEA     Published Date: Nov 26, 2018
Endpoint devices continue to be one of the favorite targets for cyberattacks. A successfully compromised laptop provides a foothold for a threat to move laterally and infect other endpoints within the organization. To address this critical vulnerability, security leaders must integrate endpoint security into their broader network security architecture. A deep connection between endpoint and network security offers key improvements to holistic enterprise protection. It provides risk-based visibility of all endpoint devices, establishes policy-based access controls, enables real-time threat intelligence sharing, and automates security responses and workflows for effective and efficient protection that conserves time and money.
Tags : 
     Fortinet EMEA
By: Automation Anywhere     Published Date: Feb 21, 2019
Robotic Process Automation was born with the vision of empowering business users to create software bots that could interact with enterprise systems just like humans. Its benefits include substantial time and cost savings, improved customer satisfaction, increased workforce morale, and the ability to build a competitive advantage over competitors. But to fully realize all these benefits, it’s important for businesses to select a solution with a robust RPA security architecture that supports core principles, such as least privileges and separation of duties while delivering end-to-end protection for the critical apps and sensitive data involved. This paper provides an overview of the industry’s highest standard for enterprise-grade security as demonstrated by the market’s leading Digital Workforce platform, Automation Anywhere Enterprise.
Tags : 
     Automation Anywhere
By: Dell EMEA     Published Date: Aug 20, 2019
Eliminate complexity and siloed IT for SAP landscapes. Industry - leading Intel based SAP HANAready compute, storage, CI/HCI, networking and data protection solutions from Dell EMC span from edge to core to cloud. Make SAP available anytime, anywhere—providing coverage for the entire business with solutions that aren’t confined to a single location. Support all your SAP workloads and enjoy world-record SAP application performance. The Dell EMC PowerEdge and broader portfolio of solutions for SAP modernizes your IT, reduces risk and simplifies IT management.
Tags : 
     Dell EMEA
By: Akamai Technologies     Published Date: Dec 11, 2018
Security threats are persistent and growing. While many organizations have adopted a defense-in-depth strategy — utilizing anti-virus protection, firewalls, intruder prevention systems, sandboxing, and secure web gateways — most IT departments still fail to explicitly protect the Domain Name System (DNS). But this Internet protocol doesn’t have to be a vulnerability.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Dec 11, 2018
The cyber threat landscape is dynamic and accelerating. The Domain Name System (DNS) is a vulnerability in many organizations’ defenses that malicious actors are increasingly exploiting. The following DNS best practices, when coupled with an enterprise threat protection service, will aid you in identifying, blocking, and mitigating targeted threats such as malware, phishing, ransomware, and data exfiltration.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
     Akamai Technologies
By: Akamai Technologies     Published Date: Oct 02, 2018
Ponemon Institute’s Asia-Pacific report details the prevalence of and consequences associated with web application attacks and denial of service (DoS) attacks. More than 500 IT and IT security professionals in Asia-Pacific shared the experiences of their organizations with these types of cyberattacks. The report provides a clear breakdown of specific costs by category for web application attacks and DoS. You’ll also see the security technologies the organizations are using to try to stop DDoS attacks and web application attacks, the rated effectiveness of each technology, and the barriers organizations in Asia-Pacific face in achieving effective protection.
Tags : 
     Akamai Technologies
By: Dell     Published Date: Nov 15, 2016
PCs have been the core productivity tool for organizations for years, but the workforce and technology trends are changing dramatically. With Windows 10, hypermobile employees, and increasing security threats, it’s more critical than ever for IT to understand how the latest PCs have evolved to tackle these challenges. Download this eGuide from Dell and Intel® to learn how… · Dell’s latest commercial notebooks, 2-in-1s, tablets and desktops are thinner, lighter, faster, and more beautiful than ever before · New PCs can increase productivity by up to 50% and reduce security concerns with built-in data protection software · Windows 10 will affect commercial organizations and how IT can plan for the next wave of PCs and devices
Tags : upgrade, principled technologies, mobility, windows 10
     Dell
By: Dell     Published Date: Nov 03, 2015
Download this infographic to learn how Microsoft Azure can benefit your organization and help your organization to: -Extend apps -Simplify protection -Understand the trade-offs
Tags : 
     Dell
By: Dell EMC     Published Date: Nov 04, 2016
According to recent ESG research, 70% of IT respondents indicated they plan to invest in HCI over the next 24 months. IT planners are increasingly turning toward HyperConverged Infrastructure (HCI) solutions to simplify and speed up infrastructure deployments, ease day-to-day operational management, reduce costs, and increase IT speed and agility. HCI consists of a nodal-based architecture whereby all the required virtualized compute, storage, and networking assets are self-contained inside individual nodes. These nodes are, in effect, discrete virtualized computing resources “in a box.” However, they are typically grouped together to provide resiliency, high performance, and flexible resource pooling. And since HCI appliances can scale out to large configurations over time, these systems can provide businesses with investment protection and a simpler, more agile, and cost-effective way to deploy virtualized computing infrastructure. Read this paper to learn more.
Tags : data, software-defined, hyper-convergence, hdd, sddc
     Dell EMC
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics