RSS feed Get our RSS feed

News by Topic

protection

Results 76 - 100 of 2205Sort Results By: Published Date | Title | Company Name
By: Citrix ShareFile     Published Date: Mar 31, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : financial services, financial security, data security, cloud security, network security, business protection
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Mar 31, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. • Why data encryption is often easier to adopt as part of a cloud initiative • What top security threat your employees are less susceptible to on personal devices • How to manage device updates and passwords for the greatest protection
Tags : data encryption, cloud security, data storage, network security, device protection, information protection
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat your employees are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : healthcare, mobility, data security, security tips, personal device
     Citrix ShareFile
By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : enterprise security, perimeter, security appliance, information management, data protection, data integrity, smb, smbs
     KACE
By: CommVault     Published Date: Jun 10, 2015
Modern data protection solutions must be able to access and restore from backups painlessly, with minimal IT help required.
Tags : backup, data, management, storage, data protection, software, network
     CommVault
By: Cisco     Published Date: Jan 29, 2009
For small and medium-sized businesses (SMBs), the impacts of a disaster can result in loss of or lack of access to data, applications, and work facilities. Those with disaster recovery plans in place fared much better than those without such contingency plans.
Tags : cisco, disaster preparedness, medium-sized businesses, smb, contingency plans, business continuity, recovery management, data protection
     Cisco
By: CommVault     Published Date: Jun 10, 2015
It's no secret that today's unprecedented data growth, data center consolidation and server virtualization are wreaking havoc with conventional approaches to backup and recovery.
Tags : backup, data, management, storage, data protection, software
     CommVault
By: Commvault     Published Date: Jul 06, 2016
It’s no secret that today’s unprecedented data growth, data center consolidation and server virtualization are wreaking havoc with conventional approaches to backup and recovery. Here are five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that you’re poised to meet future demands.
Tags : commvault, data growth, datacenter consolidation, server virtualization, backup, recovery, data management, scalability
     Commvault
By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn 5 strategies to efficiently communicate Disaster Recovery to your C-Level Executives in order to protect your organization from data center interruptions.
Tags : sungard, sungard availability services, disaster recovery, it recovery, data loss protection, disaster recovery program, managed recovery program, risk mitigation
     SunGard Availability Services
By: NETIQ     Published Date: Sep 09, 2013
In your business environment, providing affordable protection for your physical and virtual servers is critical. This free NetIQ Disaster Recovery eBook outlines important topics you need to understand to protect today’s data centers. Download your copy of the guide and learn more.
Tags : netiq, disaster recovery, protection, physical server, virtual server, ebook, multi-platform data center, cloud computing
     NETIQ
By: Cisco     Published Date: Dec 19, 2016
Prevention is your first line of defense. Make sure your Next-Gen Endpoint Security includes: Global Threat Intelligence – a team of threat hunters detecting the newest threats and uncovering zero-days to keep you protected 24/7 Signature-based AV Detection – let your Next-Gen Endpoint Security solution do all the AV heavy lifting and consolidate protection onto one agent Built-in Sandboxing – get static and dynamic analysis of suspicious threats, without having to deploy a third-party sandbox Proactive Protection – identify and patch vulnerabilities, and analyze and stop suspicious low-prevalence executables before they become real problems
Tags : 
     Cisco
By: Riverbed     Published Date: May 19, 2016
Data protection, application performance, and business continuity are essential to staying competitive and profitable.
Tags : data, data protection, data centre, security, data security
     Riverbed
By: Microsoft Office 365     Published Date: May 10, 2016
We’ve pulled together the top five ways Office 365 helps provide the level of security your business needs. From Advanced Threat Protection to secure mobile devices, enterprise-level security from Office 365 is there each step of the way. We’ve made email security our priority, so you don’t have to make it yours. Learn how to secure your email — and your business — today.
Tags : 
     Microsoft Office 365
By: HP Enterprise Services     Published Date: Mar 20, 2014
Learn the three basic elements for risk assessment and see how an understanding of these elements will allow you to better understand risk in your organization.
Tags : data breaches, protection, prevent data breaches, avoid costs, risk prevention, risk, security
     HP Enterprise Services
By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
"The average company uses more than 50 security vendors: firewalls, web proxies, SIEM, appliances, intelligence - and the list goes on. Do you have more security tools than you can handle? There’s an easier way to make the most of your existing investments. We'll share ways you can reduce security alerts and extend your security off network, anywhere users go, with Cisco Umbrella. Built with a bidirectional API, Cisco Umbrella easily integrates with the other systems in your stack, so you can extend protection from on-premises security appliances to devices and sites beyond your perimeter — and amplify investments you’ve already made. Read the eBook to learn more about getting more bang for your security buck."
Tags : 
     Cisco Umbrella EMEA
By: CommVault     Published Date: Jun 10, 2015
Backup and recovery is becoming increasingly complex, cutting into staff time and budgets and slowing operations.
Tags : backup, data, management, storage, data prote
     CommVault
By: Commvault     Published Date: Jul 06, 2016
Think of a wildfire that quickly spreads as it increases in speed and power. That is what is happening today as data growth increases the volume and management complexity of storage, backup and recovery. Now think of trying to stop that fire with a garden hose. Your traditional backup and recovery process is equally under-equipped to manage and facilitate operations that need more speed, efficiency, scalability and reliability to handle today’s 24/7, always-on environment. Here we examine the benefits of moving from a solution comprised of multiple point products to a holistic data protection platform designed to serve today’s enterprise.
Tags : commvault, data protection, storage, backup, recovery, holistic data protection, singe pane of glass, common code base
     Commvault
By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : cloud security, scale, data center, ddos
     Akamai Technologies
By: Infinity     Published Date: Sep 09, 2015
This eBook illustrates how Infinity believes that Europe’s increasingly digital economies are thriving, and that London is the key to this resurgence.
Tags : europe business, london companies, market leader in data centers, london key advantages for us companies, data center, data protection, infinity, infinity data center experts
     Infinity
By: Secureworks ABM UK 2017     Published Date: Oct 23, 2017
SecureWorks provides an early warning system for evolving cyber threats, enabling organisations to prevent, detect, rapidly respond to and predict cyber attacks. Combining unparalleled visibility into the global threat landscape and powered by the Counter Threat Platform — our advanced data analytics and insights engine —SecureWorks minimises risk and delivers actionable, intelligence driven security solutions for clients around the world.
Tags : cyber security, cyber security framework, data security, firewall, general data protection regulation, incident and problem management, information security, intrusion detection
     Secureworks ABM UK 2017
By: Unitrends     Published Date: May 18, 2010
This tongue in cheek white paper explores data loss from a contrarian point of view - exploring the top 7 shortcuts you can take to ensure that you lose your data. And since a fundamental responsibility of any information technology professional, as well as any C-level executive, is to ensure that the data upon which any company is created is protected - scrupulously following these shortcuts should also ensure that you lose not only your data but your job as well.
Tags : unitrends, backup, data protection, data quality, server, replication, data loss, sox
     Unitrends
By: Imation Scalable Storage     Published Date: Apr 06, 2012
Learn how you can use data tiering to transform unstructured data into "content" while keeping protection high and costs low.
Tags : imation, tiering, data, recovery, scalable, scalable storage, protect, connect
     Imation Scalable Storage
By: Vision Solutions     Published Date: Aug 26, 2014
This paper debunks 7 virtualization DR myths
Tags : virtualization myths, disaster recovery, back up, high availability, virtual servers, data protection
     Vision Solutions
By: Veritas     Published Date: Oct 03, 2016
Ce livre blanc vous mettra au fait des dernières tendances et vous y découvrirez huit conseils grâce auxquels vous pourrez exploiter au maximum votre investissement en protection des données et libérer les ressources vous permettant d’innover et de créer de la valeur métier et commerciale.
Tags : 
     Veritas
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

Related Topics