RSS feed Get our RSS feed

News by Topic

comprehensive data protection

Results 1 - 25 of 28Sort Results By: Published Date | Title | Company Name
By: Dell EMC Storage     Published Date: Nov 28, 2018
Powerful data protection in a converged appliance that is easy to deploy and manage — at the lowest cost-to-protect. The integrated appliance brings together protection storage and software, search, and analytics — plus simplified system management and cloud readiness. And, the IDPA System Manager, with its clean, intuitive interface, provides a comprehensive view of data protection infrastructure from a single dashboard.
Tags : 
     Dell EMC Storage
By: Druva -AWS     Published Date: Apr 28, 2018
The core capabilities of Office 365, while powerful, are not necessarily built to be a comprehensive solution for companies’ data availability and governance needs. Find out how your business can establish a strong data protection solution at a better price-point in the cloud.
Tags : 
     Druva -AWS
By: NetApp     Published Date: Mar 05, 2018
Read this comprehensive guide to the General Data Protection Regulation and learn how to comply with new regulations and address business implications, establish a holistic data compliance strategy and better manage your data through the lens of data privacy by design.
Tags : netapp, database performance, flash storage, data management, cost challenges
     NetApp
By: IBM     Published Date: Oct 16, 2017
This white paper examines how some of the ways organizations use big data make their infrastructures vulnerable to attack. It presents recommended best practices organizations can adopt to help make their infrastructures and operations more secure. And it discusses how adding advanced security software solutions from IBM to their big-data environment can fill gaps that big-data platforms by themselves do not address. It describes how IBM® Security Guardium®, an end-to- end solution for regulatory compliance and comprehensive data security, supports entitlement reporting; user-access and activity monitoring; advanced risk analytics and real-time threat detection analytics; alerting, blocking, encryption and other data protection capabilities, as well as automated compliance workflows and reporting capabilities, to stop threats.
Tags : security, big data, ibm, data protection
     IBM
By: Secureworks     Published Date: Oct 04, 2017
The General Data Protection Regulation1 is a European Union regulation with the full title of ‘Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, which repeals Directive 95/46/EC (General Data Protection Regulation)’. It’s the first comprehensive overhaul and replacement of European data protection legislation in over twenty years and could be the most significant regulatory framework to hit organizations since Sarbanes-Oxley in 2002. Its purpose is to replace the varying implementations across Europe of the earlier EU Data Protection Directive with a single harmonized EU regulation. The intended outcome is a standardized set of expectations about how an organization must manage and protect personally identifiable information on employees, clients and other applicable data subjects. Any organization that holds data on EU citizens, regardless of where it is domiciled, within the EU or otherwise, is in sco
Tags : 
     Secureworks
By: MobileIron     Published Date: Aug 02, 2017
Reasonable, common-sense security standards are becoming law in many regions of the world. In Europe, the General Data Protection Regulation (GDPR), enacted in April 2016, will become fully applicable on May 25, 2018. GDPR will bring the European Union (EU) under one comprehensive and harmonised legal system for data protection and privacy. The monetary penalties and reputational damage of noncompliance with GDPR are substantial – the maximum fines are the greater of 20 million euros or 4% of the company’s worldwide revenue.
Tags : data security, regulation, legal system, data protection
     MobileIron
By: CBRE     Published Date: Aug 02, 2017
Reasonable, common-sense security standards are becoming law in many regions of the world. In Europe, the General Data Protection Regulation (GDPR), enacted in April 2016, will become fully applicable on May 25, 2018. GDPR will bring the European Union (EU) under one comprehensive and harmonised legal system for data protection and privacy. The monetary penalties and reputational damage of noncompliance with GDPR are substantial – the maximum fines are the greater of 20 million euros or 4% of the company’s worldwide revenue.
Tags : 
     CBRE
By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
     IBM
By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
     IBM
By: IBM     Published Date: Jul 15, 2016
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance.
Tags : ibm, data, security, virtualization
     IBM
By: Citrix Systems     Published Date: Feb 10, 2016
Learn how Citrix NetScaler with Unified Gateway delivers a single, consolidated remote access infrastructure featuring comprehensive access, threat and data protection.
Tags : 
     Citrix Systems
By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how Citrix NetScaler with Unified Gateway delivers a single, consolidated remote access infrastructure featuring comprehensive access, threat and data protection.
Tags : citrix, security, remote access
     Citrix Systems, Inc.
By: Citrix Systems     Published Date: Jul 28, 2015
Learn how Citrix Netscaler with Unified Gateway delivers a single, consolidated remote access infrastructure featuring comprehensive access, threat, and data protection.
Tags : 
     Citrix Systems
By: CDW     Published Date: Jul 08, 2015
Your data is at risk. The threat of data breaches has grown larger than ever before, as attackers become more numerous and sophisticated. And as data becomes more precious, the damage that can be done by a data breach has increased greatly.
Tags : security, data protection, dlp, data breach, vulnerability management
     CDW
By: Dell     Published Date: May 04, 2015
This infographic includes results from a 2015 survey conducted exclusively for CBS Interactive and illustrates: • The top-ranked security threats of 2014 • The percentage of companies adopting mobile security technology • The most popular data protection methods • What to look for in a comprehensive data protection solution
Tags : security breach, data security, privacy, phishing
     Dell
By: IBM     Published Date: Apr 09, 2015
Adopt cloud confidently with the IBM Dynamic Cloud Security Portfolio. A comprehensive set of capabilities that provide access management, data and application protection, and deep visibility.
Tags : cloud, cloud security, ibm, ibm dynamic cloud security portfolio, access management, data protection, application protection, visibility
     IBM
By: HPE     Published Date: Feb 11, 2015
HP Backup & Recovery Modernization Service leverages proven methodologies and best practices to develop comprehensive data protection solutions for HP StoreOnce Backup.
Tags : 
     HPE
By: IBM     Published Date: Jan 23, 2015
Dominant trends in IT today such as Cloud, Mobile and Smarter Physical Infrastructures are generating massive amounts of corporate data. The inherent value of this data coupled with the increasing complexity of IT environments is forcing those tasked with data protection to re-evaluate their approaches. Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core applications and remote sites.
Tags : it trends, it environments, smarter physical infrastructures, data protection
     IBM
By: IBM     Published Date: Nov 04, 2014
Dominate trends in IT today such as Cloud, Mobile and Smarter Physical Infrastructures are generating massive amount of corporate data. The inherent value of this data coupled with the increasing complexity of IT environments is forcing those tasked with data protection to re-evaluate their approaches. Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core application and remote sites.
Tags : it trends, virtual environments, core application, data protection, security
     IBM
By: HP     Published Date: Aug 26, 2014
Eliminate the guesswork from selecting products and services for your evolving network access and business protection needs. HP Just Right IT portfolio solutions help avoid business interruptions by ensuring reliable access to your data. HP servers and storage solutions help consolidate islands of business information while delivering cost savings, reliability, and agility. HP offers the industry’s most comprehensive data protection and retention portfolio for midsize businesses like yours. And through its cloud-based support portal, HP Technology Services can proactively identify and fix them remotely to keep your business running smoothly. Discover how
Tags : data, business, technology, portfolio, cloud-based, support, portal, solution
     HP
By: IBM     Published Date: Jul 22, 2014
Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core application and remote sites.
Tags : ibm, storage, back up, recovery, cost reduction, data, it environments, data protection
     IBM
By: Dell Storage     Published Date: Nov 02, 2011
This white paper take a look at multilayer data protection and disaster recovery approach for the virtualized data center and explains how and why Dell EqualLogic may be the best solution for your business.
Tags : technology, dell, data protection, data recovery, equallogic, disaster recovery
     Dell Storage
By: Dell Storage     Published Date: Oct 17, 2011
This white paper take a look at multilayer data protection and disaster recovery approach for the virtualized data center and explains how and why Dell EqualLogic may be the best solution for your business.
Tags : technology, dell, data protection, data recovery, equallogic, disaster recovery
     Dell Storage
By: IBM     Published Date: Oct 23, 2009
In the Illuminata CDP Paper, you'll see how the IBM Comprehensive Data Protection Express solution can help keep your business running. Discover diverse components and services, like Tivoli Storage Manager FastBack and System x servers, that fit your needs.
Tags : business continuity, ibm, tivoli, data protection, sme
     IBM
By: IBM     Published Date: Oct 23, 2009
Listen to the recording, "CDPS Analyst Interview with John Webster of Illuminata," to see how the IBM Comprehensive Data Protection Express solution addresses the needs of midmarket companies that don't have adequate backup and recovery capabilities for their critical data.
Tags : data loss, ibm, data protection, backup and recovery
     IBM
Previous   1 2    Next    
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics