RSS feed Get our RSS feed

News by Topic

protection

Results 251 - 275 of 2201Sort Results By: Published Date | Title | Company Name
By: Cohesity     Published Date: Aug 21, 2018
Today's backup and recovery is complex. 68% of organizations find their IT environments more complex than they were 2 years ago! Infrastructure silos are driving unnecessary data copies which can be difficult to manage and inefficient. Organizations need a modern solution that can simplify their backup and recovery global. Download this white-paper to learn more about Cohesity and its advantages!
Tags : 
     Cohesity
By: Splunk     Published Date: Aug 21, 2018
How can you utilize machine data to support compliance with the General Data Protection Regulation of the European Union? This white paper, “How Machine Data Supports GDPR Compliance”, answers this question and identifies three use cases that can help support your GDPR compliance program, regardless of the nature of your industry or deployment – on-premises, in the cloud or hybrid Download the white paper to: *Master the risks necessary to be prepared for GDPR through real-world scenarios *Understand which articles of GDPR will impact your business *Learn how machine data can help you overcome those requirements
Tags : 
     Splunk
By: Splunk     Published Date: Aug 21, 2018
On May 25, 2018, per the General Data Protection Regulation (GDPR), organizations with business ties to the European Union will need to comply to GDPR standards. The cost of non-compliance are stiff fines. The GDPR contains nearly 100 separate and nuanced articles that can be difficult to understand even if you are a data privacy expert. This short primer is a cheat sheet to help both the data privacy expert and non-expert approach the GDPR with key takeaways. Download your free copy of “A Short Primer of GDPR Essentials” to learn: *Financial Implications: The potential impact of a GDPR breach condition. *Key Focus Areas: A "new considerations checklist" for data privacy experts. It can also be used as a basic "bootstrapping checklist" for those less versed in data privacy. *People, Process, Tools: Tips to help reduce anxiety and uncertainty about how to operationalize GDPR.
Tags : 
     Splunk
By: MobileIron     Published Date: Aug 20, 2018
MobileIron knows that cybercriminals are continuously generating more advanced ways to steal your data by any means necessary. That’s why we are committed to continually innovating and delivering new solutions that help our customers win the race against time to get ahead of the latest mobile security threats. As part of that commitment, MobileIron Threat Defense supports the five critical steps to deploying advanced, on-device mobile security. Our solution provides a single, integrated app that delivers several key advantages: • A single app of threat protection is fully integrated with EMM. • No user action is required to activate or update on-device security. • Advanced mobile security blocks known and zero-day threats across iOS and Android devices with no Internet connectivity required. • Machine-learning algorithms instantly detect and remediate on-device DNA threats.
Tags : mobile, threat, defense, strategy, mobileiron, innovation
     MobileIron
By: MobileIron     Published Date: Aug 20, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : mobile, threat, detection, machine, learning
     MobileIron
By: F5 Networks Inc     Published Date: Aug 16, 2018
Integrated on-premises solutions offer tight control and flexibility, but can be quickly overwhelmed by a large volumetric attack. Managed cloudbased services deliver protection from those largeattacks, but can be expensive if used for all traffic, all the time. By using a combination of on-premises security devices and a cloud-based scrubbing service to handle volumetric attacks, organizations maintain control, while spinning up cloud-protection services as needed to handle the largest volumetric floods.
Tags : model, ddos, protection, solutions
     F5 Networks Inc
By: F5 Networks Inc     Published Date: Aug 16, 2018
While the choices facing you may seem daunting, the truth is that there’s never been a better time to shop for a web application firewall. WAF technology is now more accessible, affordable, and manageable than ever before—which is a good thing, because companies need the protection a WAF offers now more than ever. For more information about choosing the WAF that’s right for you, visit f5.com/security.
Tags : waf, companies, management, technology
     F5 Networks Inc
By: Datastax     Published Date: Aug 15, 2018
"True data protection and compliance starts at the data layer. When enterprises think of how best to protect their data and meet ever stricter and more complex compliance requirements, they should first and foremost be considering their data management solution. Read this white paper to learn how DataStax Enterprise Advanced Security allows enterprises to protect their data via features such as authentication, authorization, and data auditing, and also meet regulatory compliance requirements by leveraging advanced security features in accordance with best practices."
Tags : 
     Datastax
By: Shell     Published Date: Aug 15, 2018
Shell Lubricants believes companies can achieve significant cost savings by upgrading their lubrication processes. Taking better care of equipment can contribute to savings from lower maintenance costs, reduced unplanned downtime and improvements in productivity. These potential savings go far beyond what can be achieved by selecting lubricants on the basis of lowest price per litre. There are two key elements to seizing this opportunity. The first is selecting the right lubricant; the second is effective lubrication management.
Tags : productivity, savings, lubricants, shell, maintenance, construction, equipment protection, hydraulic system
     Shell
By: Shell     Published Date: Aug 15, 2018
While simple fixes may cost a few thousand dollars, lost revenue from equipment failures can run into the millions of dollars in lost productivity and replacement costs. There can be longer-term impacts, too, if the downtime inhibits a manufacturer’s ability to meet customer needs. That’s why it is important for companies to think about lubrication and equipment maintenance holistically, recognizing that short term cost savings may be leading to bigger, preventable expenses over the long term. Cheaper oil, for example, may save money initially, but it requires more frequent changes and provides less protection to the equipment, which could shorten component life. For many companies, the short-term savings simply aren’t worth the longterm cost risk. “Some companies don’t realize that they may be able to reduce their overall maintenance costs significantly by spending more up front on better quality lubricants,” Saffell says. “Their equipment may last longer and they are likely to see
Tags : cost, reduction, equipment, shell, manufacturing, maintenance, reliability, contamination control
     Shell
By: Dell PC Lifecycle     Published Date: Aug 14, 2018
Wenn Sie kein Risiko eingehen möchten, sollten Sie die Data Protection einem Anbieter mit einer umfassenden Lösung anvertrauen. Holen Sie das Optimum aus Dell EMC Data Domain heraus – mit der leistungsfähigen Data Protection Suite.
Tags : 
     Dell PC Lifecycle
By: Dell PC Lifecycle     Published Date: Aug 14, 2018
IT-Transformation ist ein Konzept, das heute noch stärker als vor 12 Monaten bei Unternehmen angekommen ist. Obwohl es nicht gleichbedeutend mit digitaler Transformation ist, sind die beiden Konzepte grundlegend miteinander verknüpft, da eine effektive digitale Transformation nicht ohne IT-Transformation erfolgen kann. Ein Unternehmen, das seine IT-Infrastruktur transformiert, ist nicht mehr von starren, manuellen, isolierten Legacy-Technologien abhängig. Es verzeichnet eine Steigerung der IT-Betriebsgeschwindigkeit, Effizienz, Skalierbarkeit und Wirtschaftlichkeit: Aufgaben werden automatisiert, Prozesse rationalisiert und Ressourcen freigesetzt. Diese IT-Verbesserungen unterstützen eine umfangreichere digitale Transformation, mit der das Unternehmen in der heutigen digitalen Wirtschaft bestehen kann. Es übertrifft seine Mitbewerber in Sachen Innovation, Vordenken und Geschwindigkeit und wird letztendlich selbst Disruptor statt Leidtragender.
Tags : 
     Dell PC Lifecycle
By: SafetyCulture     Published Date: Aug 14, 2018
Consistency and customer experience are key to quality and profitability in retail. Manual reporting processes can be unwieldy and time-consuming, but bringing together all compliance procedures under one digital platform means fast, consistent and easy-to-access performance data. Using real-time insights into best practice improves the reporting of quality control, stock loss prevention, inspection processes, logistics and more – saving time, increasing efficiency and boosting customer satisfaction. Benefits include better branding through monitoring rollouts with uploaded photos and videos, protection against shrinkage through improved inspection processes and audits, and clearer visibility of issues which means a speedier response.
Tags : 
     SafetyCulture
By: Dell PC Lifecycle     Published Date: Aug 09, 2018
IT Transformation is a concept that resonates with companies even more now than it did 12 months ago. It sounds like another current term, “digital transformation.” But in fact, effective digital transformation doesn’t happen without IT Transformation. A company that undergoes IT infrastructure transformation no longer has to rely on rigid, manual, siloed, legacy technologies. It sees a boost in IT operational speed, efficiency, scale, and cost effectiveness—tasks are automated, processes streamlined, and resources are freed up. Those IT-level improvements fuel a larger-scale digital transformation, allowing the company to thrive in today’s digital economy. It is able to out-innovate, out-think, and out-pace its competitors—ultimately becoming the disruptor, not the disrupted.
Tags : 
     Dell PC Lifecycle
By: Dell PC Lifecycle     Published Date: Aug 09, 2018
For total peace of mind, trust your Data Protection to a vendor with a complete solution. Get the most out of Dell EMC Data Domain by leveraging the power of the Data Protection Suite Family .
Tags : 
     Dell PC Lifecycle
By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
     Oracle
By: DocuSign UK     Published Date: Aug 08, 2018
"The General Data Protection Regulation (GDPR) is one example of the evolving regulatory landscape in the digital age. Since the European Union (EU) adopted the regulation in 2016, DocuSign has been investing to be compliant across its entire business, building upon our foundation and history of commitment to privacy. The conception of the GDPR undoubtedly introduced a number of compliance challenges for businesses to address around data privacy and protection. It also presented an opportunity for businesses to build trust with their stakeholders by reconnecting with the people they serve. This eBook details DocuSign’s approach to meeting GDPR’s obligations that went into effect on 25th May 2018, for companies conducting business in the EU, and the features and benefits that can be gained from using the DocuSign solution to fulfil certain areas of the GDPR."
Tags : 
     DocuSign UK
By: Oracle     Published Date: Aug 02, 2018
T raditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance. This book explains modern database protection and recovery challenges (Chapter 1), the important aspects of a database protection and recovery solution (Chapter 2), Oracle’s database protection and recovery solutions (Chapter 3), and key reasons to choose Oracle for your database protection and recovery needs (Chapter 4).
Tags : 
     Oracle
By: Oracle     Published Date: Aug 02, 2018
Enterprise data protection has grown unwieldy, with systems from various vendors claiming to protect all of an enterprise’s data—and none of them doing a particularly good job of addressing mission-critical data recoverability requirements. It’s a situation that introduces risk and raises concerns about IT’s ability to recover in a timely manner and without data loss from outages caused by cybercrime, system failures, or human error. An integrated strategy that focuses on the complete data recovery needs of an enterprise can eliminate data loss, cut recovery times, and reduce IT complexity—while ensuring data security and positioning the enterprise to seamlessly take advantage of the cloud.
Tags : 
     Oracle
By: Oracle     Published Date: Aug 02, 2018
Enterprises like yours face the growing risk of cyberattacks, which increases your exposure to the risk of data loss. One of the most menacing forms of these is ransomware, where your data is encrypted and literally held ransom—until you pay cybercriminals to release it, or you recover your data from a point in time before your systems were attacked. Such attacks and data losses make headlines —damaging your organization’s reputation. And with new regulations concerning data protection coming into force (such as those introduced by the US Department of the Treasury and the European Union) failing to prepare for a quick recovery from a cyberattack could mean serious financial penalties.
Tags : 
     Oracle
By: Oracle     Published Date: Aug 01, 2018
The Zero Data Loss Recovery Appliance’s benefits are compelling for any enterprise with a need to protect critical Oracle databases. The differences between this database recovery appliance and other approaches to data protection are stark. The Recovery Appliance leverages a combination of existing proven technologies and new developments that eliminate data loss and improve recovery. The elimination of periods between backups when database changes are not captured is also a major benefit, and the movement to a process of frequent or constant incremental backups provided by this appliance changes the game.
Tags : 
     Oracle
By: Oracle     Published Date: Aug 01, 2018
Les systèmes de sauvegarde traditionnels ne répondent pas aux besoins des entreprises modernes étant donné qu’ils sont axés sur la sauvegarde, et non sur la restauration. Ils traitent les bases de données comme des fichiers génériques à copier, au lieu de les considérer comme des charges de travail transactionnelles qui présentent des exigences spécifiques d’intégrité, de cohérence, de performance et de disponibilité des données.
Tags : 
     Oracle
By: Westex     Published Date: Aug 01, 2018
Meeting the needs of compliance standards while keeping your workers protected is a top priority for those in the electrical industry. There are a number of measures you can take to help keep your workers safe, starting with a sound personal protective equipment (PPE) program. In this new white paper, we detail the key changes found in the 2018 edition of NFPA 70E, and explain how daily wear PPE may help enhance both compliance and worker protection when compared to traditional task-based PPE.
Tags : nfpa, nfpa 70e, arc flash, ppe, flame resitance, arc resistance, fr fabric
     Westex
By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Examines new approaches to data center infrastructure and the HPE SimpliVity hyperconverged architecture that drives efficient, effective virtualization deployments with built-in data protection.
Tags : 
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Jul 18, 2018
Technical whitepaper uncovers the data protection capabilities and management tools of HPE SimpliVity hyperconverged infrastructure that deliver scalability, availability and performance.
Tags : 
     Hewlett Packard Enterprise
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics