data protection

Results 276 - 300 of 1250Sort Results By: Published Date | Title | Company Name
By: mindSHIFT     Published Date: Nov 29, 2007
Have you adjusted your data retention policies and electronic discovery procedures to comply with the new Federal Rules of Civil Procedure (FRCP)? Learn how email archiving can help you with these electronic discovery requirements.
Tags : frcp, secure content, secure data, data protection, database security, compliance, frcp compliance, data governance, e-discovery, legal, law firm, mindshift, data management
     mindSHIFT
By: NetApp     Published Date: Feb 22, 2010
This paper outlines the considerations for architecting an efficient SAN data storage infrastructure with a focus on the NetApp solutions for increased utilization, improved performance and streamlined protection to reduce operational costs.
Tags : netapp, san environment, data storage infrastructure, utilization, multiprotocol unified storage, data reduction, storage virtualization, backup, remote mirroring
     NetApp
By: NetApp     Published Date: Feb 22, 2010
This paper addresses the many Exchange, SQL Server, and SharePoint implementations running on inefficient storage infrastructures, limiting scalability and complicating what should be fairly simple storage management tasks.
Tags : netapp, storage efficiency, microsoft application environment, exchange, sql server, sharepoint, storage management, tco, server virtualization, server operating system, data protection
     NetApp
By: Neustar     Published Date: Feb 27, 2013
Consumer phone data is changing every day, from the device to the subscriber which leaves you at risk for violating the TCPA. Neustar Information Services provides you with authoritative phone data to help you mitigate risk and increase efficiency.
Tags : tcpa, compliance, risk, authoritative phone data, auto dialing restrictions, telephone consumer protection act, autodialer violations, b2c, business to consumer, verification, on-demand verification, telecom
     Neustar
By: NetApp     Published Date: Sep 24, 2013
"The performance, availability, and data protection associated with tier-1 applications were easy to meet when one application mapped to one server and a dedicated storage system. But to carry these features into a virtual world with pooled, shared storage systems and unpredictable workloads creates new demands. In order to reach an agile state in your business, access this white paper now to gain insight into innovative solutions catered to these new challenging demands."
Tags : performance, availability, data protection, storage systems, virtualization, innovative solutions, technology, netapp, storage, data management, data center
     NetApp
By: Nimble Storage     Published Date: Feb 26, 2016
Download this eBook to learn the steps you can take now to prepare for the all flash data center. flash storage, SSD, all flash data centers, nimble storage, predictive flash platform, application perfomance, data velocity
Tags : flash storage, ssd, all flash data centers, nimble storage, predictive flash platform, application perfomance, data velocity, data protection, high availability, big data, predictive analytics, data center
     Nimble Storage
By: Oracle     Published Date: Mar 09, 2017
In this white paper, IDC discusses the inherent difficulties associated with traditional backup schemes and the changing dynamics of data protection strategies. We examine Oracle's Zero Data Loss Recovery Appliance (ZDLRA) and the role it can play in providing significantly improved service levels for all types of Oracle databases.
Tags : 
     Oracle
By: McAfee     Published Date: Dec 04, 2014
The attacks continue. The breaches occur. Penalties are assessed. While most universities manage to keep pace with the latest digital trends, they have been far less timely when it comes defending their networks and sensitive data against the latest targeted attacks and threats. This lack of protection is evident as recent headlines expose costly data breaches of student records and research, state and federal compliance violations, and a raft of other privacy and security issues that put students, alumni, staff, and the institutions themselves at considerable risk.
Tags : mcafee, security crisis, higher education, breaches, digital trend, privacy, security issues, sensitive data
     McAfee
By: NetApp     Published Date: Aug 14, 2015
Taking advantage of a variety of private and public cloud services.
Tags : data, backup, recovery, protection, cloud, architecture
     NetApp
By: NetApp     Published Date: Jan 08, 2016
This IDC Technology Spotlight examines trends regarding cloud backup and data protection and how NetApp's SnapProtect backup management software and AltaVault cloud-integrated storage can play a role in simplifying the effort.
Tags : data protection, business continuity, cloud backup, snapprotect, backup management software, altavault, cloud-integrated storage, it management
     NetApp
By: NetApp     Published Date: Jan 08, 2016
This IDC Infographic examines trends regarding cloud backup and data protection and how organizations can benefit from NetApp's SnapProtect backup management software and AltaVault cloud-integrated storage.
Tags : data protection, business continuity, cloud backup, snapprotect, backup management software, altavault, cloud-integrated storage, it management
     NetApp
By: NetApp     Published Date: Jan 08, 2016
This white paper explores the data protection spectrum and how NetApp delivers integrated data protection offerings.
Tags : netapp, data protection, data protection spectrum, integrated data protection, cloud computing, it management, data management
     NetApp
By: NetApp     Published Date: Jan 08, 2016
This white paper examines how existing data protection strategies can prove to be unsuitable or are not optimized for new production capabilities.
Tags : data protection, data protection strategy, optimization, production capabilities, cloud computing, netapp, it management, enterprise applications
     NetApp
By: NetApp     Published Date: Jan 08, 2016
This white paper examines some of the key challenges that enterprises face as they try to protect their data, and how NetApp® solutions can help them meet these challenges cost-effectively.
Tags : data protection, netapp, cloud computing, data damage, it management, enterprise applications
     NetApp
By: MobileIron     Published Date: Apr 05, 2017
MobileIron is a proven leader in EMM innovation and mobile security for the modern enterprise. In addition to being the enterprise choice for secure mobility, we rank in the top five for all categories of the Gartner Critical Capabilities for High-Security Mobility Management. We have also been positioned as a Leader in the Gartner Magic Quadrant for Enterprise Mobility Management Suites for six consecutive years. Our platform is fully mature and built from the ground up to address evolving mobility and cloud requirements. Plus, MobileIron integrates with leading technology providers, so customers aren’t tied to proprietary technologies that don’t meet their needs. Our goal is to ensure organizations can choose the best technologies that fit their environment.
Tags : cloud services, enterprise management, cloud security, mobile security, mobile device security, platforms, email security, cloud data, application protection, app security
     MobileIron
By: Intralinks     Published Date: Apr 13, 2015
They say content is king. But if your content isn’t protected, it’s a king with no clothes. The proliferation of mobile devices in the workplace, and the availability of cloud services designed for consumers, can lead to improper sharing of corporate data. Information that leaves your firewalls can live forever, and without adequate protection, can end up in the wrong hands. This report by Ovum takes a look at the challenges of information security and explores how a new generation of Information Rights Management (IRM) technology directly addresses the most critical concerns. Key topics include: • The threat posed by Dropbox and other consumer-grade FSS providers • The need for lifetime control of information and content • The ability to perform audits, and locate files, anywhere, and who accessed them • How next-generation IRM technology is available to add a new layer of security to every file
Tags : 
     Intralinks
By: Dell EMC     Published Date: Aug 03, 2015
This paper examines enterprise-class snapshot technologies, discussing use cases for snapshots as well as classic challenges associated with using snapshot technologies in pure hard disk drive (HDD)–based arrays.
Tags : afa, snapshot technology, data protection, recovery strategies, cloud adoption, production data, emc, snapshot performance, enterprise workflows, hdd
     Dell EMC
By: Mimecast     Published Date: Nov 28, 2017
With the healthcare industry as the #1 target for ransomware attacks, it’s critical to ensure steps are taken to prevent, detect and respond to these attacks without downtime – and without loss of patient data. A multi-layered approach to protective controls – including a Secure Email Gateway (SEG) with advanced threat protection capabilities – will start your healthcare organization on the right path to ransomware resilience. Download and use this top 10 list of how to protect your organization now. Use it as a reference tool for frequent health checks of your own ransomware resilience program.
Tags : healthcare, ransomware, ransomware attack, seg, secure email gateway
     Mimecast
By: Mimecast     Published Date: Jan 19, 2018
The importance of information security and data protection is growing by the day for organizations. This is due to an evolving threat landscape and a higher adoption of internet dependent services, which, in the process of creating new opportunities, also lead to more vulnerabilities. As a consequence, national and international regulations are also changing according to the new challenges, calling for better preparedness. The new BCI Information Security Report 2017 sponsored by Mimecast looks to benchmark how organizations handle sensitive data and how resilient organizations are when it comes to data protection.
Tags : bci information, security and data protection, security report, data protection
     Mimecast
By: Vectra Networks     Published Date: Aug 03, 2015
Organizations invest heavily to block advanced attacks, on both endpoints and networks. Despite all this investment, devices continue to be compromised in increasing numbers and high-profile breaches continue unabated. Something doesn’t add up. It comes down to psychology: security practitioners want to believe the latest shiny widget for preventing compromise will finally work and stop the pain.
Tags : data, security, threats, protection, advanced threat, ips, ids, firewall, antivirus
     Vectra Networks
By: LifeLock     Published Date: Aug 23, 2016
The impact of data breaches and identity theft on a business cannot be overstated. Offering identity theft protection is one solution. Discover how to help protect your business and your employees if they have a non-employer related fraud attack.
Tags : best practices, identity theft, security, protection
     LifeLock
By: Citrix ShareFile     Published Date: Jul 11, 2017
Accounting is full of big, busy deadlines, which means the ability to take your work home with you could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your firm more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat you are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : accounting, mobility, security, data encryption, data
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
Finance moves fast, and the ability to work from anywhere on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage your clients’ sensitive financial data? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat your employees are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : finance, data encryption, mobility, security, data
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
Patients come with lots of paperwork. The ability to securely access it on your smartphone or laptop could be a game-changer. But can your personal devices ever be secure enough to manage PHI? Surprisingly, this informative whitepaper shows that, with the right preparation, using your personal device can actually help you keep your organization more secure. Why data encryption is often easier to adopt as part of a cloud initiative What top security threat your employees are less susceptible to on personal devices How to manage device updates and passwords for the greatest protection
Tags : healthcare, mobility, data security, security tips, personal device
     Citrix ShareFile
By: Citrix ShareFile     Published Date: Jul 11, 2017
Password-protected PDFs tout the ability to share your sensitive data securely. But several factors make them vulnerable, which means your firm and clients’ information could easily be exposed to hackers. Download this white paper to learn how password protection failures cause your firm to: Lose data when colleagues share passwords with others, especially through email. Face risk by not knowing if an unauthorized person has accessed your files. Have clients’ PDF files cracked by hackers in minutes.
Tags : data security, passwords, password protection, data vulnerability
     Citrix ShareFile
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com