RSS feed Get our RSS feed

News by Topic

protection

Results 2176 - 2200 of 2205Sort Results By: Published Date | Title | Company Name
By: Tripwire     Published Date: Jul 05, 2007
Find out step-by-step what it takes to become compliant with the Payment Card Industry (PCI) Data Security Standard (DSS), and how Tripwire can help your company achieve and maintain PCI compliance.
Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
     Tripwire
By: Tripwire     Published Date: Jul 05, 2007
Learn about the validation requirements of the payment card industry's data security standard (PCI DSS), including administrative and technical elements of the program, and the potential sanctions for failure to comply.
Tags : pci, pci compliance, payment card, credit card, credit cards, payment card industry, cisp, privacy
     Tripwire
By: Third Brigade     Published Date: May 25, 2007
This white paper identifies twelve critical questions that organizations need to consider when selecting a Host Intrusion Prevention System product. These questions relate to protection, manageability, integration and speed.
Tags : host ips, ips, hips, intrusion prevention, vendor selection, software selection, security, hacker prevention
     Third Brigade
By: AirDefense     Published Date: Apr 24, 2007
This paper outlines the specific elements of wireless LAN security (perimeter control, access control, date protection, and monitoring) and WLAN management (configuration, fault diagnostics, network usage, and policy enforcement). Reader will gain a keen understanding of how to effectively lockdown a wireless LAN and manage it for peak performance.
Tags : wireless security, wlan, wlans, wlan security, wireless lan, access control, wireless access control, data protection
     AirDefense
By: Cyberoam     Published Date: Apr 19, 2007
Protecting students from the millions of sites that house pornography, adult chat rooms, violence & hacking can provide not just a safe surfing atmosphere to minors in schools and libraries, but also qualify the institutions for federal E-rate funding through compliance with CIPA - the Children's Internet Protection Act.
Tags : cipa, cipa compliance, cyberoam, cyberroam, chat room, hacking, childrends internet protection act
     Cyberoam
By: Xiotech     Published Date: Apr 13, 2007
Disruption to your production environment is costly, and any loss of information can be disastrous. Consequences may include loss of revenue and company reputation, lower shareholder confidence, potential exposure to business continuity risk, or sanctions and fines for noncompliance with regulatory requirements. Organizations need an effective and reliable way to safeguard corporate information in the wake of an unforeseen downtime event.
Tags : data protection, data recovery, information management, regulatory compliance, compliance, storage compliance, high availability, storage
     Xiotech
By: Xiotech     Published Date: Apr 13, 2007
Well-publicized disasters highlight the need for an effective and timely data recovery solution. While current tape and disk backup provide some peace of mind, they do not keep up with the demands placed on your business. You cannot afford to wait hours (or days) to recover your critical applications and data.
Tags : disaster recovery, disaster plan, data backup, backup and recovery, data recovery, disk backup, tape backup, offsite storage
     Xiotech
By: Avalere     Published Date: Apr 02, 2007
Companies struggle with cleanly separating an employee, contractor or consultant with their company and critical information.  Avalere enables companies to review how information has been used prior to an employee’s departure in order to protect the company and the employee.
Tags : data protection, employee performance, fired, employee departure, employee quit, employee resigned, access control, avalere
     Avalere
By: digitiliti     Published Date: Apr 02, 2007
The challenge of managing, protecting and storing digital data is a major issue for businesses of every size and category. Companies generally rank the improvement of their storage infrastructure as a top objective, and the escalation of data protection costs has become an overriding concern. According to recent research, the data storage capacity of the average North American enterprise is now 59 terabytes, and the projected annual production data growth is 20 to 30 percent.
Tags : data storage, software, data security, data protection, enterprise software, storage, digitiliti, backup and recovery
     digitiliti
By: ProStor Systems     Published Date: Mar 15, 2007
The need for protecting data is universal – whether a small to mid-size business, the largest enterprise data center, or an individual. The recognition of the value of information and the impact of data loss has reached the point where repeating it is no longer required. The issue now has turned to how to protect the data.
Tags : smb, archiving, backup, hardware, security, data management, database security, data protection
     ProStor Systems
By: Breece Hill, LLC     Published Date: Mar 15, 2007
Once a business clears the financial hurdle and begins to plan their data protection strategy the choices can appear daunting. Do they select tape or disk? Apply differential or incremental backups? How much will a new system cost and how much time will it take to implement? What data should be included in the backup? This article attempts to address these concerns.
Tags : smb, storage, archiving, backup, hardware, small business networks, storage, backup and recovery
     Breece Hill, LLC
By: Intermec     Published Date: Mar 14, 2007
Smart printers are a smart investment. They eliminate the need for computers dedicated to controlling them, can act as PLCs to run other devices on production lines, enable fool-proof and error-proof bar code printing, and provide investment protection with advanced features like XML printing and RFID label encoding.
Tags : plc, programmable logic controllers, intermec, xml, rfid, erp, bar code printing, fault dots
     Intermec
By: Secure Computing     Published Date: Feb 27, 2007
Driven by increasing regulatory scrutiny and the need to protect key corporate assets, concerns about compliance and data leakage have risen to the top of the priority list for today's corporate executives. This paper discusses multiple policies, procedures and processes corporations must consider to remain secure and compliant.
Tags : security, security management, compliance, security policies, hipaa compliance, data protection, database security, corporate governance
     Secure Computing
By: Secure Computing     Published Date: Feb 27, 2007
All merchants and service providers that handle, transmit, store, or process information concerning credit cards are required to be compliant with the Payment Card Industry Data Security Standards requirements (PCI), or face contract penalties or even termination by the credit card issuers. This paper discusses the 12 requirements of PCI, and how Secure Computing's portfolio of security solutions can help enterprises meet and exceed them.
Tags : security, compliance, data protection, database security, pci, credit cards, privacy, consumer protection
     Secure Computing
By: XLink Technology Inc.     Published Date: Jan 15, 2007
At the wake of hurricanes and other natural disasters, Vanguard has taken steps to provide disaster data recovery for its clients.
Tags : servers, high availability, data protection, web hosting, backup, recovery, backup and recovery, failover
     XLink Technology Inc.
By: XLink Technology Inc.     Published Date: Jan 15, 2007
XLink ClusterReplica Enterprise software, based on CDP technology, combines conventional High Availability solutions and Microsoft DPM-like functions to create the next generation of business continuity software. ClusterReplica ENT offers real-time data replication and auto failover for MSSQL, IIS Web Server and File Servers.
Tags : servers, data protection, windows server, high availability, data replication, disaster recovery, business continuity, xlink
     XLink Technology Inc.
By: Symantec     Published Date: Dec 12, 2006
Read this whitepaper to find out how this latest release of Symantec's Backup Exec can help safeguard critical Microsoft Exchange 2000 Server and Exchange Server 2003 data.
Tags : backup, backup and recovery, high availability, microsoft exchange, data protection, symantec
     Symantec
By: Secure Computing     Published Date: Nov 20, 2006
Organizations need to be protected from both known and unknown threats, and all the varieties and forms that sophisticated malware can take.  Learn about the changing nature of malware attacks and how the Webwasher Anti-Malware from Secure Computing can provide a highly effective defense against malicious content.
Tags : anti spam, anti spyware, anti virus, application security, security, network security, data protection, malware
     Secure Computing
By: NetIQ Corporation     Published Date: Nov 18, 2006
This white paper is a must read for those involved in the process of log management for legal use. You'll examine the admissibility of log data in court cases; maintaining the authenticity of log data; and how log data can be attacked and stand up to scrutiny. And, learn legal terms like Hearsay, Best Evident Rules, etc.
Tags : log file, data protection, log management, legal log, log data, log law, authenticated log, netiq
     NetIQ Corporation
By: NetIQ Corporation     Published Date: Nov 18, 2006
Mandatory compliance requirements often vary or conflict. Discover the major issues and appropriate actions organizations must take today to protect the privacy of information and meet legal and contractual requirements.
Tags : compliance, privacy, pci, hipaa compliance, consumer privacy, customer privacy, data protection, database security
     NetIQ Corporation
By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : enterprise security, perimeter, security appliance, information management, data protection, data integrity, smb, smbs
     KACE
By: TriTuns Innovation     Published Date: Nov 14, 2006
This paper examines the nature, cause and impact of data quality problems in typical IT system implementations.  It argues that the extent and impact of poor data quality is largely misunderstood and often ignored.
Tags : data quality, data protection, data improvement, improve data, trituns, trituns innovation
     TriTuns Innovation
By: Symantec     Published Date: Nov 09, 2006
Security and compliance risks are greater than ever, and businesses depend on their data being protected when stored internally and taken offsite. New encryption capabilities offered by Backup Exec 11d for Windows Servers offer secure protection from unauthorized access. Learn more about encryption capabilities in Backup Exec 11d.
Tags : backup, backup and recovery, disaster recovery, compliance, data protection, encryption, access control, backup exec
     Symantec
By: EMC     Published Date: Nov 06, 2006
The amount of data on business computers has grown astronomically over the past few decades.  If a company loses this data, business grinds to a halt. The following tips can help you select the hardware and software you need to safeguard the integrity of your data, guarantee accurate restores, and manage backups without placing an undue burden on IT personnel.
Tags : data protection, raid, disaster plan, smb, smbs, small business, top 10, backup and recovery
     EMC
By: EMC     Published Date: Nov 06, 2006
By utilizing the speed and reliability of the EMC CLARiiON® AX150 networked storage system and the convenience of EMC Retrospect® 7.5 for Windows backup and recovery software, SMBs can implement fast, effective, reliable data protection that is easy to set up and manage without placing undue strain on IT resources.
Tags : data protection, raid, disaster plan, disk-based, tape-based, data backups, disk backup, tape backup
     EMC
Start   Previous    75 76 77 78 79 80 81 82 83 84 85 86 87 88 89    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics