RSS feed Get our RSS feed

News by Topic

risk data

Results 126 - 150 of 517Sort Results By: Published Date | Title | Company Name
By: Oracle     Published Date: Oct 20, 2017
Traditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance
Tags : 
     Oracle
By: Oracle     Published Date: Aug 02, 2018
T raditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance. This book explains modern database protection and recovery challenges (Chapter 1), the important aspects of a database protection and recovery solution (Chapter 2), Oracle’s database protection and recovery solutions (Chapter 3), and key reasons to choose Oracle for your database protection and recovery needs (Chapter 4).
Tags : 
     Oracle
By: Oracle     Published Date: Aug 02, 2018
Backup is one thing, recovery is everything. You no doubt appreciate how mission-critical your Oracle database is to your organization's success. But what if you experience an outage or cyberattack? Can you be confident you can quickly recover all of your data? Traditional backup solutions leave data exposed to loss and your business at risk. Oracle’s Zero Data Loss Recovery Appliance eliminates exposure and saves you time, effort, and the stress of retrieving data. Discover how our customers are recovering their data without the drama.
Tags : 
     Oracle
By: Oracle     Published Date: Oct 20, 2017
Backup is one thing, recovery is everything. You no doubt appreciate how mission-critical your Oracle database is to your organization's success. But what if you experience an outage or cyberattack? Can you be confident you can quickly recover all of your data? Traditional backup solutions leave data exposed to loss and your business at risk. Oracle’s Zero Data Loss Recovery Appliance eliminates exposure and saves you time, effort, and the stress of retrieving data. Discover how our customers are recovering their data without the drama.
Tags : 
     Oracle
By: IBM Corporation     Published Date: Jun 09, 2011
This Research Brief categorizes databases as a "dangerous and growing security gap" - and offers steps to improve database security across the enterprise.
Tags : ibm, guardium, database security, risk, database discovery, vulnerability scanning, penetration testing, user monitoring
     IBM Corporation
By: CA Technologies     Published Date: Jan 09, 2015
This paper focuses on the Insider threat to security and the controls available to reduce risk and enable information sharing within an organization.
Tags : insider threats to security, reducing risk of insider threats, enabling safe data sharing, ca security
     CA Technologies
By: Dell EMC EMEA     Published Date: May 08, 2019
Dell and its partners provide a range of solutions that enable their customers to transform the capabilities of the workforce. Dell commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential benefits and costs enterprises may realize by deploying three key Workforce Enablement Solutions, namely: - Best device experience - Unified endpoint management - Enterprise collaboration The purpose of this study is to provide readers with a framework to evaluate the potential impact of these Workforce Enablement Solutions on their organizations.To better understand the benefits, costs,and risks associated with investment in these solutions, Forrester interviewed eight large enterprise customers with years of experience using Workforce Enablement Solutions—this data was supplemented by a survey of over 700 organizations. Download this whitepaper to find out more.
Tags : 
     Dell EMC EMEA
By: Datamatics     Published Date: Mar 02, 2011
Are you looking for a time and attendance system which maximizes workforce productivity while minimizing compliance risk? Sign up today and receive a no-obligation personalized demo from Datamatics, leaders in labor management automation since 1966.
Tags : datamatics, time, attendance, payroll costs, risk, compliance
     Datamatics
By: HP - Enterprise     Published Date: Jun 05, 2013
It wasn’t long ago that being on the cutting edge of business meant having a website where customers could purchase your products, but that quickly changed. Soon, it wasn’t enough just to have an e-commerce presence; you had to offer an interactive and engaging customer experience (see Web 2.0). Now the standard has shifted once again; in order to truly compete in the modern economy, your business needs to have a mobile storefront on smart phones and tablets. Without this mobile presence, you’ll lose business to competitors who have them. With this new challenge comes high risk as well as great reward. With mobility, the client side of your applications is more important than ever. Instead of accessing your website from the safe confines of work or home, your customers can now perform sensitive transactions anywhere. As a result, mobile applications, and the devices and data they interact with, can now be more easily attacked.
Tags : mobile applications, ecosystem, risk, defense, application, risk
     HP - Enterprise
By: BlackBerry     Published Date: Jun 11, 2008
By now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise: namely, increased productivity, improved efficiency and improved response times resulting in decreased costs and increased revenue opportunities. But with these advantages come risks, and most have to do with controlling the data contained on wireless devices and the networks and applications to which they connect.
Tags : blackberry, corporate mobile policy, enterprise solution, crm, microsoft exchange, mobile device management, mobile device management software, mobile workers
     BlackBerry
By: Adobe     Published Date: Mar 05, 2018
We are fully entrenched in the digital age, so much so that you're probably reading this with a smartphone or mobile device within arms length. Similarly government is also making the shift towards a digital future. But with moving away from paper-based records and towards digital data, there are new opportunities for potential security risks regarding government data and content. As cyberthreats continue to grow in number and sophistication, agencies should be looking at features to secure every level of their digital infrastructure and content. Check out this new pocket guide to learn content security best practices, why it matters, government rules and regulations related to digital data and its associated security and content challenges. You’ll also learn tips and tricks to apply at your agency to make sure your content is secure.
Tags : 
     Adobe
By: Epicor     Published Date: Dec 06, 2018
Change—and the innovation it creates—increasingly defines the winners and losers in today’s manufacturing industry. As successful manufacturers continue to embrace the Internet of Things (IoT), Industry 4.0, and other digital transformation trends, it’s important to recognize and implement these changes or risk getting left behind by the competition. In this Epicor eBook, we’ll look at five key areas where successful manufacturers must embrace change and use it to drive innovation, competition, and growth—including: • The accelerating pace of technology change • The changing face of the modern workforce • Competing in a global manufacturing marketplace • Tapping the power of analytics and data-driven manufacturing • Charting a path to sustainable, cost-effective compliance We’ll also explain how Epicor Cloud ERP equips manufacturers to regard change as an opportunity rather than a threat. Download the eBook to learn more.
Tags : epicor erp, cloud erp, digital transformation
     Epicor
By: Flexera     Published Date: Feb 19, 2019
Flexera’s Software Vulnerability Research allows effective reduction of the attack surface for cybercriminals, providing access to verified vulnerability intelligence from Secunia Research covering all applications and systems across all platforms. It drives a prioritized remediation process by handling vulnerability workflows, tickets and alerts, and describes the steps to mitigate the risk of costly breaches. You Don’t Know What You Don’t Know It’s hard for enterprise security analysts to get reliable and trusted information about software vulnerabilities and then identify and filter that data for just the products that matter to their organization. Those challenges lead to wasted time and effort. Learn more.
Tags : 
     Flexera
By: CDW Symantec     Published Date: Aug 02, 2012
This white paper documents the ubiquity of tablets and other mobile devices within the workplace, the sensitive data accessed on these devices and their potential IT risks, and the data loss prevention solutions Symantec provides to help CISOs make the most intelligent security decision.
Tags : ipad, data security, remote wiping, data encryption, sandboxing, compartmentalization, reverse proxy, dlp
     CDW Symantec
By: Courion     Published Date: Aug 21, 2012
Hear from a panel of experts as they discuss the factors that impact enterprise security strategy, including regulatory pressures, demands from audit to demonstrate compliance, the increasing risk of data breaches.
Tags : access, risk, identity management, identity and access management, iam, regulatory compliance, audit compliance, policy compliance
     Courion
By: Mimecast     Published Date: Aug 22, 2017
Email security is essential in preparing for the GDPR deadline. The GDPR emphasizes the principle of accountability and the need for organizations to demonstrate they have taken reasonable measures to protect personal data. This white paper explores how to improve email and cloud security to meet strict compliance regulations. Uncover: • GDPR challenges for email • How to mitigate risks and ensuring email resiliency • An effective email and cloud security platform
Tags : gdpr, risk mitigation, email resiliency, personal data protection
     Mimecast
By: Dell     Published Date: Oct 24, 2014
Today's business environments are very different to those of 10 years ago. Windows Server 2003 has been a trusted friend for over a decade, but there are better ways to deliver against today's business expectations and technical possibilities. Download this paper to better understand the risks of ignoring the end of support and to discover the advantages of migrating to a modern data center platform.
Tags : virtualization, it security, platform support, platform migration
     Dell
By: DataCore     Published Date: Jun 06, 2019
More than 54% of companies have experienced a downtime event that lasted more than 8 hours – one full work day – in the past 5 years. And the risk of major disruptions to business continuity practices looms ever larger – primarily due to the troubling dependencies on the location, topology and suppliers of data storage. Download this infographic and see how you can preserve proven Business Continuity practices despite inevitable changes to your data storage infrastructure.
Tags : business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability
     DataCore
By: Double-Take Software     Published Date: Apr 16, 2009
Double-Take Move provides migration functionality that dramatically reduces the impact and risk of migrations in the data center and across any geographic distance. Double-Take Move has a patented and award-winning replication engine that provides real-time, byte-level data replication and ensures transaction consistency without affecting users and production applications. Read this whitepaper to learn about the concerns that affect data, application and whole system migration.
Tags : double-take, workload portability, x2x, storage, server migration, p2v, virtualized, virtualization
     Double-Take Software
By: HP     Published Date: Jul 29, 2008
Join Forrester Research and HP in this webinar which explores common myths about IT disasters and analyzes different strategies to protect a company's information assets based on risk and cost. Stephanie Balaouras of Forrester analyzes 5 common myths around IT disasters e.g. disasters and loss of a data centers are rare.
Tags : disaster, disaster recovery, d/r, high availability, mission critical, forrester, webcast, webinar
     HP
By: IBM     Published Date: Feb 02, 2009
A comprehensive solution for leveraging data in today's financial industry. Most organizations realize that the key to success lies in how well they manage data—and the banking industry is no exception. From customer statistics to strategic plans to employee communications, financial institutions are constantly juggling endless types of information.
Tags : ibm, information management software, leveraging data, dynamic warehousing, data management, improve customer service, real-time risk analysis, analytics capabilities
     IBM
By: McAfee     Published Date: Mar 08, 2013
McAfee® Virtual Patching for Databases shields databases from the risk presented by unpatched vulnerabilities by detecting and preventing attempted attacks and intrusions in real time without requiring database downtime or application testing.
Tags : database security, database virtual patching, database vulnerability management, pci dss, hipaa, critical patch updates, database vulnerability detection
     McAfee
By: SAS     Published Date: Apr 16, 2015
Ecclesiastical uses SAS® to improve data quality to make better decisions that enhance the reputation of the business, affect millions of pounds of risk selection/underwriting and help to establish optimum reinsurance levels. Millions of pounds hang on decisions around reinsurance and risk selection. Achieving the best possible outcome means taking data and turning it into ‘decision-making gold’. The key is to have good data going into the process.
Tags : 
     SAS
By: Oracle     Published Date: Oct 20, 2017
This whitepaper explores the new SPARC S7 server features and then compares this offering to a similar x86 offering. The key characteristics of the SPARC S7 to be highlighted are: Designed for scale-out and cloud infrastructures SPARC S7 processor with greater core performance than the latest Intel Xeon E5 processor Software in Silicon which offers hardware-based features such as data acceleration and security The SPARC S7 is then compared to a similar x86 solution from three different perspectives, namely performance, risk and cost. Performance matters as business markets are driving IT to provide an environment that: Continuously provides real-time results. Processes more complex workload stacks. Optimizes usage of per-core software licenses Risk matters today and into the foreseeable future, as challenges to secure systems and data are becoming more frequent and invasive from within and from outside. Oracle SPARC systems approach risk management from multiple perspectiv
Tags : 
     Oracle
By: Oracle CX     Published Date: Oct 20, 2017
This whitepaper explores the new SPARC S7 server features and then compares this offering to a similar x86 offering. The key characteristics of the SPARC S7 to be highlighted are: ? Designed for scale-out and cloud infrastructures ? SPARC S7 processor with greater core performance than the latest Intel Xeon E5 processor ? Software in Silicon which offers hardware-based features such as data acceleration and security The SPARC S7 is then compared to a similar x86 solution from three different perspectives, namely performance, risk and cost. Performance matters as business markets are driving IT to provide an environment that: ? Continuously provides real-time results. ? Processes more complex workload stacks. ? Optimizes usage of per-core software licenses. Risk matters today and into the foreseeable future, as challenges to secure systems and data are becoming more frequent and invasive from within and from outside. Oracle SPARC systems approach risk management from multiple perspectiv
Tags : 
     Oracle CX
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics