RSS feed Get our RSS feed

News by Topic

protection

Results 426 - 450 of 2222Sort Results By: Published Date | Title | Company Name
By: Dell APAC     Published Date: May 30, 2019
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 30, 2019
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 30, 2019
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
     Dell APAC
By: Dell APAC     Published Date: May 30, 2019
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
     Dell APAC
By: CloudFlare     Published Date: Jul 25, 2016
CloudFlare’s advanced DDoS protection, provisioned as a service at the network edge, matches the sophistication and scale of such threats, and can be used to mitigate DDoS attacks of all forms and sizes including those that target the UDP and ICMP protocols, as well as SYN/ACK, DNS amplification and Layer 7 attacks. This document explains the anatomy of each attack method and how the CloudFlare network is designed to protect your web presence from such threats.Below you will find detailed information on these attacks and how the CloudFlare network protects against them.
Tags : cloudflare, best practices, technology, security, access control
     CloudFlare
By: Symantec     Published Date: Jul 11, 2017
Symantec CloudSOC Cloud Data Protection allows enterprises to selectively encrypt or tokenize field-level information in SaaS apps like Salesforce, ServiceNow, and Oracle. Stay agile, competitive and compliant with the freedom to move sensitive or regulated information to the cloud while retaining physical ownership of encryption keys /token vaults.
Tags : cloud data protection, data protection, security, encryption, security infrastructure
     Symantec
By: Neverfail Group     Published Date: Aug 21, 2009
This document introduces Neverfail Heartbeat, a technology that enables the protection of applications against many potential failures, including application failure, operating system failures, and hardware, network or site failures, at a reasonable cost.
Tags : microsoft, ms windows, windows, application security, cost control, it spending, application performance, high availability
     Neverfail Group
By: Kaminario     Published Date: May 05, 2016
This IDC Buyer Case Study reviews how Cobb EMC, a regional not-for-profit electric utility company serving the greater Atlanta metropolitan area, addressed evolving IT infrastructure requirements with flash storage technology to improve performance and substantially improve IT efficiencies. This Buyer Case Study explores what drove Cobb EMC's initial interest in flash, how flash deployment has evolved in the company's environments, how the deployment has impacted its business, and what future plans exist for AFAs at Cobb EMC.
Tags : storage management, performance management, best practices, application integration, software protection, business intelligence
     Kaminario
By: Cohesity     Published Date: May 04, 2018
Cohesity provides the only hyper-converged platform that eliminates the complexity of traditional data protection solutions by unifying your end-to-end data protection infrastructure – including target storage, backup, replication, disaster recovery, and cloud tiering. Cohesity DataPlatform provides scale-out, globally deduped, highly available storage to consolidate all your secondary data, including backups, files, and test / dev copies. Cohesity also provides Cohesity DataProtect, a complete backup and recovery solution fully converged with Cohesity DataPlatform. It simplifies backup infrastructure and eliminates the need to run separate backup software, proxies, media servers, and replication. This paper specifically focuses on the business and technical benefits of Cohesity DataPlatform for the data protection use case. It is intended for IT professionals interested in learning more about Cohesity’s technology differentiation and advantages it offers for data protection - (i) Elim
Tags : 
     Cohesity
By: IBM     Published Date: Apr 09, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : ibm, it security, vulnerability management, virus protection, spyware protection
     IBM
By: IBM     Published Date: Jul 15, 2015
This white paper will discuss how the X-Force team collects, analyzes and distributes threat intelligence to IBM customers, as well as how this data is used to enrich the capabilities of the IBM Security portfolio.
Tags : intelligence technology, security management, threat intelligence, intelligence protection, security solutions
     IBM
By: IBM     Published Date: Oct 06, 2015
The IBM X-Force research and development team collects, analyzes and distributes threat intelligence to IBM customers - and uses it to enrich the IBM Security portfolio - so users can leverage in-depth knowledge and understanding of threats to bring business value to their organizations.
Tags : ibm, ibm x force, threat intelligence, data protection, ibm security, security
     IBM
By: IBM     Published Date: Jun 22, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware. Today’s attacks are often not random, but targeted for maximum financial gain and impact. Rogue individuals and groups are constantly innovating new ways to attack organizations’ most valuable assets. As a result, traditional methods of dealing with threats are no longer enough. Organizations need more threat intelligence than ever before in order to effectively protect themselves.
Tags : cyber security, global threat intelligence, malware prevention, cyber threat, protection
     IBM
By: IBM     Published Date: Jul 26, 2017
Security threats are very real, and the stakes are higher than ever. Each day, tens of thousands of malware variants are created, with new classes of threats continually added and improved upon. Savvy attackers use polymorphic programs to alter malware into new form factors after each delivery. And all of this is exacerbated by the proliferation of mobile devices, cloud computing and social media—in fact, the intersection of these technologies provides fertile new ground for threats and malware.
Tags : mobile devices, security, data protection, data loss, information security
     IBM
By: Lumension     Published Date: Feb 07, 2014
Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.
Tags : lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products
     Lumension
By: Commvault     Published Date: Jul 06, 2016
Two leaders in data protection software and hardware have partnered to bring you a solution that closes the scalability, flexibility and manageability gaps in current oofferings.
Tags : commvault, backup appliances, netapp, data protection, data protection software, turnkey solution, scalability
     Commvault
By: Commvault     Published Date: Jul 06, 2016
Around-the-clock global operations, data growth, and server virtualization all together can complicate protection and recovery strategies. They affect when and how often you can perform backups, increase the time required to back up, and ultimately affect your ability to successfully restore. These challenges can force lower standards for recovery objectives, such as reducing the frequency of backup jobs or protecting fewer applications, both of which can introduce risk. High-speed snapshot technologies and application integration can go a long way toward meeting these needs, and they have quickly become essential elements of a complete protection strategy. But snapshot copies have often been managed separately from traditional backup processes. Features like cataloging for search and retrieval as well as tape creation usually require separate management and do not fully leverage snapshot capabilities. To eliminate complexity and accelerate protection and recovery, you need a solution
Tags : commvault, intellisnap, netapp, backup, recovery, data growth, server virtualization, data protection
     Commvault
By: McAfee     Published Date: Mar 07, 2013
Databases are the primary target of cyber criminals and disgruntled insiders. Traditional perimeter, network security, and built-in database security measures, offer limited protection when it comes to securing the organization’s most sensitive data.
Tags : database security, database security compliance, database activity monitoring
     McAfee
By: WatchGuard Technologies     Published Date: Apr 21, 2010
Find out how you can have full UTM capabilities for comprehensive protection and still have blazing fast throughput to keep your network humming.
Tags : watchguard technologies, unified threat management, utm, network humming, security, firewall, vpn, tco
     WatchGuard Technologies
By: LifeLock     Published Date: Aug 23, 2016
ID theft has escalated to an all-too-possible nightmare that involve weeks, if not months, to resolve. Download this practical comparison guide to learn what are challenges exist and the key benefits for employers to look for in selecting a partner. Compare now!
Tags : best practices, identity theft, security, protection
     LifeLock
By: CommVault     Published Date: Jun 10, 2015
Automate the burden of discovery, classification, filtering and policy assignment for virtual machine protection with Simpana® software.
Tags : protection, data, infrastructure, cloud, operation, retention
     CommVault
By: Carbonite     Published Date: Oct 10, 2018
Data protection is a balancing act between the need to protect data and the need to protect access to data. The trick lies with deploying the right protection across the different systems and types of data, since they each require different forms of protection.
Tags : 
     Carbonite
By: Sponsored by HP and Intel®     Published Date: Nov 02, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability.
Tags : virtualization, data management, it infrastructure, cloud computing
     Sponsored by HP and Intel®
By: HP and Intel® Xeon® processor     Published Date: Aug 10, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability. The key to
Tags : complete, storage, data, protection, architecture, virtual, environments, virtualization
     HP and Intel® Xeon® processor
By: Intel Corp.     Published Date: Aug 08, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability. The key to achieving the best business uptime and cost savings is the effective design of storage management and data protection. This white paper outlines an end-to-end storage and data protection architecture optimized for VMware vSphere and Microsoft® Hyper-V environments.
Tags : complete, storage, data, protection, architecture, virtual, environments, virtualization
     Intel Corp.
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics