RSS feed Get our RSS feed

News by Topic

virtual event

Results 51 - 60 of 60Sort Results By: Published Date | Title | Company Name
By: Stratus Technologies     Published Date: Mar 10, 2009
Lee Kaminski, Product Manager for Stratus Avance High Availability Solution, discusses what an effective availability solution requires and how Avance delivers.
Tags : stratus, avance, high availability, server virtualization, mission critical data, downtime, operations management, disaster prevention
     Stratus Technologies
By: Stratus Technologies     Published Date: Mar 10, 2009
Fault Tolerant is a pretty common term in the world of IT, also an often misused and misleading term.  For 3 decades, Stratus Technologies has been engineering and manufacturing purpose built Fault Tolerant solutions. Check out this short video to understand what it takes to be REAL Fault Tolerant.
Tags : stratus, virtualization, fault tolerance, real fault, it management, industry standard components, disaster prevention
     Stratus Technologies
By: Stratus Technologies     Published Date: Mar 10, 2009
Late comers to the market, talk the talk, but can’t walk the walk for critical workloads.  Stratus Director of Product Management Denny Lane resets the definitions of fault tolerance and high availability.
Tags : stratus, fault tolerance, critical workloads, mission critical business solution, server virtualization, lexicon, high availability, continuous availability
     Stratus Technologies
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100-5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches, and to better understand how businesses are planning to protect themselves against data leaks. The following report presents top line results of the study.
Tags : trend micro, data breach, smb, midsize, breaches, data breaches, data loss prevention, dlp
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Companies rely on knowledge assets, such as product formulas and customer databases. VPNs and network monitors can protect proprietary information from outsiders; but, they won't do much to prevent access by internal users. With the popularity of wireless networks, USB drives and other portable devices, it's all too easy for insiders to leak key data. This white paper explains how Trend Micro LeakProof 3.0 protects sensitive data at rest, in use, and in motion.
Tags : trend micro, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data leak
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks
     Trend Micro, Inc.
By: Tripwire     Published Date: Nov 07, 2012
Cloud computing, virtualization and social networking have several things in common - they create new threat vectors that can leave companies vulnerable to new types of attacks. Read on to learn how to prevent new attacks by getting back to basics.
Tags : security, configuration, basics, security flaw, it assets, it infrastructure, security infrastructure, tripwire
     Tripwire
By: VMTurbo     Published Date: Mar 25, 2015
Intelligent N+X Redundancy, Placement Affinities, & Future Proofing in the Virtualized Data Center Virtualization brought about the ability to simplify business continuity management in IT. Workload portability and data replication capabilities mean that physical infrastructure failures no longer need impact application services, and they can rapidly be recovered even in the event of complete site failure. However, Enterprises and Service Providers face new challenges ensuring they have enough compute capacity in their virtualized data centers to support their business continuity requirements, while at the same time not over provisioning infrastructure capacity resulting in unnecessary capital expenditure.
Tags : continuity requirements, vmturbo, virtualization, workload portability, data replication
     VMTurbo
By: VMware     Published Date: Mar 08, 2012
This online eBook provides insight and advice on how to build an effective disaster recovery strategy in the evolving world of virtual infrastructures, while mitigating the impact of so-called 'Black Swan' events in the datacenter.
Tags : wmware, server virtualization, workload consolidation, simplified management, disaster protection, spending, data backup, recovery
     VMware
By: VMware     Published Date: May 10, 2012
This online eBook provides insight and advice on how to build an effective disaster recovery strategy in the evolving world of virtual infrastructures, while mitigating the impact of so-called 'Black Swan' events in the datacenter.
Tags : capital, operational costs, vmware virtualization, server virtualization, desktop virtualization, public cloud, private cloud, virtual machine
     VMware
Start   Previous    1 2 3     Next   End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics