data protection

Results 276 - 300 of 1184Sort Results By: Published Date | Title | Company Name
By: Commvault ABM Oct     Published Date: Nov 13, 2017
The EU's General Data Protection Regulation (GDPR) is the most stringent and burdensome privacy mandate in the world. The penalty for major violations can be up to 20 million euros or 4% of your company's annual global revenue.
Tags : protection, regulation, gdpr, data protection, global, revenue, risk
     Commvault ABM Oct
By: Commvault ABM Oct     Published Date: Feb 15, 2018
Enterprises and managed service providers (MSPs) have some similar challenges in the realm of data protection. Both have to deal with expansive environments—with enterprises protecting distributed offices/geographies, and MSPs protecting many independent subscribers. Both also have been seeing production data storage and secondary protection storage demands rising. Enterprises and MSPs alike should therefore be looking for data protection architectures that have scale-out capabilities built into their core foundation.
Tags : data protection, msps, data storage, scale out data protection
     Commvault ABM Oct
By: Cohesity     Published Date: Apr 24, 2018
In today’s application driven, cloud agnostic world, many organizations still rely on legacy, multiple point backup and recovery products that consist of backup software, target storage, media and master servers, and cloud gateways, all from different vendors. With slow backups and long recovery times of their existing backup products, organizations are unable to meet their tight business SLAs. Constant forklift upgrades and complex management UIs make it expensive to manage the current backup and recovery environments.
Tags : 
     Cohesity
By: Cohesity     Published Date: May 04, 2018
Cohesity provides the only hyper-converged platform that eliminates the complexity of traditional data protection solutions by unifying your end-to-end data protection infrastructure – including target storage, backup, replication, disaster recovery, and cloud tiering. Cohesity DataPlatform provides scale-out, globally deduped, highly available storage to consolidate all your secondary data, including backups, files, and test / dev copies. Cohesity also provides Cohesity DataProtect, a complete backup and recovery solution fully converged with Cohesity DataPlatform. It simplifies backup infrastructure and eliminates the need to run separate backup software, proxies, media servers, and replication. This paper specifically focuses on the business and technical benefits of Cohesity DataPlatform for the data protection use case. It is intended for IT professionals interested in learning more about Cohesity’s technology differentiation and advantages it offers for data protection - (i) Elim
Tags : 
     Cohesity
By: Cohesity     Published Date: May 04, 2018
In today’s application driven, cloud agnostic world, many organizations still rely on legacy, multiple point backup and recovery products that consist of backup software, target storage, media and master servers, and cloud gateways, all from different vendors. With slow backups and long recovery times of their existing backup products, organizations are unable to meet their tight business SLAs. Constant forklift upgrades and complex management UIs make it expensive to manage the current backup and recovery environments. There has to be a simpler, more cost-effective way to keep your data safe. This is the problem that Cohesity is designed to solve, with an entirely new approach to data protection. Download this solution brief to learn more about Cohesity and its advantages!
Tags : 
     Cohesity
By: Cohesity     Published Date: May 09, 2018
The growing importance—and complexity—of data protection means old approaches no longer will get the job done in an era of exploding data volumes and ever-changing business requirements. It’s time to reimagine and reengineer your IT infrastructure for a more efficient, affordable and manageable data protection framework.
Tags : 
     Cohesity
By: Cohesity     Published Date: Oct 02, 2018
Until recently, Manhattan Associates had used a traditional secondary storage solution to manage its large and rapidly expanding data footprint of ~1PB. Designed for traditional workflows, the company’s IT team realized it had become cost prohibitive to add features to their existing environment to support their VM level backups. Like most traditional storage options, the existing solution did not scale-out linearly, and complicated the environment by creating silos. With Cohesity’s scale-out architecture, the team was able to start small and grow their Cohesity environment on the go, yet keep it unified and simple. See how Manhanttan Associates achieved operational efficiency and lowered their TCO by supporting VM data protection, supporting native integration with the public cloud and providing simple converged solution for data protection, target storage and files. Get the case study.
Tags : case, study, manhattan, associates, consolidates, data, protection
     Cohesity
By: Cohesity     Published Date: Oct 02, 2018
The University of California, Santa Barbara (UCSB) is a public research university and one of the 10 campuses of the University of California system. Its secondary storage was a combination of multiple point solutions. The UI/setup and maintenance was complex. Maintaining multiple licensing and maintenance agreements negatively impacted the administrative cost. The skyrocketing cost for additional backup capacity limited the team’s ability to expand their backup protection to many critical systems. With Cohesity's unified hyperconverged secondary storage platform, the IT team provided a single solution for all 13 departments to consolidate their backups on one platform, and scale-out as required. Read the case study and get details on how UCSB consolidated everything from backup to recovery, analytics to monitoring and alerting.
Tags : case, study, ucsb, consolidates, data, protection, cohesity, hyperconverged
     Cohesity
By: Cohesity     Published Date: Oct 02, 2018
Public cloud expansion will continue to see double digit growth over the next five years according to IDC. Making the public cloud interoperable with on-premises solutions needs to be part of your hybrid cloud strategy for secondary data workloads. Legacy solutions, however weren’t architected with the cloud in mind. They require use of cloud gateways and don’t scale well in the cloud. Cohesity integrates with Amazon Web Services, Microsoft Azure, and Google Cloud Platform to extend your on-premises data protection solution to these public cloud services. Our built-in cloud capabilities give you flexibility to use the cloud for multiple use cases. Download the solution brief for more details.
Tags : solution, brief, enterprise, grade, capabilities, public, cloud, data
     Cohesity
By: Symantec     Published Date: Nov 24, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security
     Symantec
By: Riverbed     Published Date: May 19, 2016
Data protection, application performance, and business continuity are essential to staying competitive and profitable.
Tags : data, data protection, data centre, security, data security
     Riverbed
By: Veritas     Published Date: Dec 08, 2016
The latest version - Veritas NetBackup Platform 8.0 - delivers unified data protection for organizations of all sizes, with proven enterprise-class scale, high performance, extensive workload integration, and self-service. No matter where data resides, NetBackup is trusted today in small to the largest and most complex heterogeneous environments.
Tags : cloud, cloud computing, data management
     Veritas
By: Veritas     Published Date: Dec 08, 2016
Read this Infographic to learn about Veritas' Cloud Data Management capabilities.
Tags : cloud computing, cloud data management, data protection
     Veritas
By: Sophos     Published Date: Mar 30, 2017
Many papers on the topic of advanced persistent threats (APTs) begin with ominous references to the changing threat landscape and stories of how highly sophisticated cyber attacks are becoming more prevalent. That can be misleading. The majority of attacks today still use many techniques that have been around for years—social engineering, phishing emails, backdoor exploits and drive-by downloads, to name the biggest ones. Such attacks are neither advanced nor particularly sophisticated when broken down into their individual components and often rely on the weakest link in any organization—the user. However, the way in which hackers use combinations of techniques and the persistent behavior of the attackers is something that does set APTs apart from other attempts to compromise security. This paper is designed to give you an overview of the common characteristics of APTs, how they typically work, and what kind of protection is available to help reduce the risk of an attack.
Tags : network security, firewall, data security, antivirus protection, email protection, virtual security, web protection, wireless protection, it security
     Sophos
By: Sophos     Published Date: Mar 30, 2017
Threats are becoming increasingly dynamic, forcing organizations to defend against both traditional malware and new advanced attacks. As a result, more and more organizations are making the switch to next-gen endpoint protection from Sophos to get the proven, innovative defense they need. Read this solution brief to learn how Sophos Next-Gen Endpoint Protection delivers the protection, usability and support required to stay ahead of the constantly evolving threat landscape.
Tags : cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
     Sophos
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
     Trend Micro, Inc.
By: NetApp     Published Date: Feb 19, 2015
The NetApp EF550 all-flash array provides a robust platform for delivering exceptional performance to mission-critical applications. The EF550 flash array leverages the latest in solid-state disk technologies along with a strong heritage of handling diverse workloads and providing superior business value through the acceleration of latency-sensitive and high-I/O applications. This technical report provides an overview of workload characterizations performed on NetApp EF-series all-flash arrays across a wide variety of I/O types - with best practices and observations based on extensive test data. Characterizations include IOPS, throughput, and latency under varying block loads and RAID levels, SSD rebuild times, EF540 and EF550 performance comparison, and usable capacity sizing guidelines for various protection levels. If you are considering deploying an EF-series flash storage array in your environment, this is an essential technical resource to insure proper configuration and maxim
Tags : 
     NetApp
By: Redstor UK     Published Date: Mar 12, 2018
Backup and recovery have been a constant for organisations over the years, often not seen as glamorous aspects of an IT environment but as solutions that are necessary all the same. Environments have changed over the years and the focal use for backups have changed with them, although your solutions may not have. Taking a simple off-site backup, whether this be to disk, tape or other removable media, would once have been the last line of defence for data protection. Solutions were reliable and ensured data could be recovered in a timely manner.
Tags : recovery, backup, infrastructure, security, data
     Redstor UK
By: Redstor UK     Published Date: Mar 12, 2018
The General Data Protection Regulation, is a piece of legislation that was approved and put in to place by the European Parliament in April 2016. As European Law, it will fully take effect after a 2-year transition ending May 25th 2018. GDPR, replaces the previous Data Protection Directive (DPD), adopted in 1995, and will in the UK, replace and strengthen the Data Protection Act 1998 (DPA). One of the initial differences between GDPR and DPD, is that GDPR is a regulation not a directive; as a regulation, no additional enabling legislation will have to be passed by governments of member states. Redstor have the ability to give insight into the data organisations have on their networks, advise on best practice to protect data and then implement strategies around backup, archiving and disaster recovery. Data is searchable through an intuitive console making compliance simple and achievable for all organisations protecting data through the Backup Pro Platform.
Tags : 
     Redstor UK
By: Redstor UK     Published Date: Mar 12, 2018
The General Data Protection Regulation is set to shake up modern data protection laws. With large-scale data breaches making news headlines on a weekly basis throughout 2017, data regulation authorities across Europe will be hoping this can help resolve the challenges of data protection. However, with so many questions around how to comply it is still unclear how far this regulation spreads. Technologists are now looking for answers, wanting to know how the GDPR will affect backup and nonprimary data sets and what needs to be done to be compliant. This white paper will explore and understand aspects of the regulation to help answer questions and give clarity over what data is covered by the GDPR and what organisations need to do to be compliant. Redstor have specialised in assisting organisations with data protection and management for almost two decades. Providing compliant services around the areas of Data Backup, Disaster Recovery and Archiving.
Tags : 
     Redstor UK
By: Egress ABM Pilot     Published Date: Oct 09, 2017
The EU General Data Protection Regulation (GDPR) represents a significant step change for data protection across EU member states. The EU GDPR also brings with it serious implications for organisations who suffer a breach. People will always make mistakes – and in busy and stressful workplaces such as banks and insurance firms the likelihood of this increases. Without the right processes and technologies in place to help avoid mistakes, sensitive client information remains at risk. This white paper provides financial services organisations with a four-step process to ensure compliance.
Tags : data breach, it security, malicious spyware, security management, cloud security, system protection
     Egress ABM Pilot
By: Egress ABM Pilot     Published Date: Oct 09, 2017
Patients trust healthcare organisations with vast amounts of their sensitive data – not just details on their medical and social wellbeing, but also personally identifiable information such as dates of birth and residential addresses. People will always make mistakes – and, unfortunately, in busy and stressful workplaces, such as hospitals and medical clinics, the likelihood of this increases. Without the right processes and technologies in place to help overcome this to avoid mistakes, sensitive patient information remains at risk.
Tags : data breach, it security, malicious spyware, security management, cloud security, system protection
     Egress ABM Pilot
By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : unified data protection, database security, security
     Symantec
By: Symantec     Published Date: Nov 24, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security
     Symantec
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com