data protection

Results 301 - 325 of 1179Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : unified data protection, database security, security
     Symantec
By: Symantec     Published Date: Nov 24, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security
     Symantec
By: Symantec     Published Date: Nov 24, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection
     Symantec
By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication, biometrics, fraud prevention, transaction authentication, identification
     DigitalPersona UK
By: Citrix Systems     Published Date: Jul 28, 2015
Learn how Citrix Netscaler with Unified Gateway delivers a single, consolidated remote access infrastructure featuring comprehensive access, threat, and data protection.
Tags : 
     Citrix Systems
By: Forrester     Published Date: May 10, 2012
In the never-ending race to stay ahead of the competition, companies are developing advanced capabilities to store, process, and analyze vast amounts of data from social networks, sensors, IT systems, and other sources to improve business intelligence and decisioning capabilities.This report will help security and risk professionals understand how to control and properly protect sensitive information in this era of big data.
Tags : data-centric security, information protection, information management, data protection, security, risk and compliance, data warehousing
     Forrester
By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn 5 strategies to efficiently communicate Disaster Recovery to your C-Level Executives in order to protect your organization from data center interruptions.
Tags : sungard, sungard availability services, disaster recovery, it recovery, data loss protection, disaster recovery program, managed recovery program, risk mitigation, managed recovery service provider, data center
     SunGard Availability Services
By: HP     Published Date: Feb 02, 2015
Everyone agrees that data is the lifeblood of any business. Just think how tense you get when your laptop crashes and you realize you have not saved that critical document. Or put yourself in the shoes of your company’s sales teams when they suddenly find themselves unable to access information related to a deal in the pipeline at the end of the quarter because it is corrupted or went missing because of a database or server issue. Data protection is—and always will be—a constant concern.
Tags : 
     HP
By: HP     Published Date: Feb 11, 2015
Everyone agrees that data is the lifeblood of any business. Just think how tense you get when your laptop crashes and you realize you have not saved that critical document. Or put yourself in the shoes of your company’s sales teams when they suddenly find themselves unable to access information related to a deal in the pipeline at the end of the quarter because it is corrupted or went missing because of a database or server issue. Data protection is—and always will be—a constant concern.
Tags : 
     HP
By: Intel Security     Published Date: Oct 20, 2015
Gartner Magic Quadrants offer visual snapshots, in-depth analyses and actionable advice that provide insight into a market's direction, maturity and participants.
Tags : data protection, mobile, security
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both Windows and Apple devices.
Tags : mcafee, intel, encryption, apple, filevault, microsoft, bitlocker, security, enterprise applications
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
Encryption solutions are a key component of data protection and are part of Intel Security protection suites.
Tags : mcafee, intel, data, security, protection, networking
     Intel Security
By: Intel Security     Published Date: Oct 21, 2015
McAfee Data Loss Prevention offers comprehensive protection for your most sensitive data regardless of where it resides or where it travels—in the cloud or on premises.
Tags : mcafee, intel, security, content, protection, business technology, data center
     Intel Security
By: MobileIron     Published Date: May 07, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : mobile, threat, detection, machine, ransomware, confidential, networks
     MobileIron
By: MobileIron     Published Date: Aug 20, 2018
MobileIron knows that cybercriminals are continuously generating more advanced ways to steal your data by any means necessary. That’s why we are committed to continually innovating and delivering new solutions that help our customers win the race against time to get ahead of the latest mobile security threats. As part of that commitment, MobileIron Threat Defense supports the five critical steps to deploying advanced, on-device mobile security. Our solution provides a single, integrated app that delivers several key advantages: • A single app of threat protection is fully integrated with EMM. • No user action is required to activate or update on-device security. • Advanced mobile security blocks known and zero-day threats across iOS and Android devices with no Internet connectivity required. • Machine-learning algorithms instantly detect and remediate on-device DNA threats.
Tags : mobile, threat, defense, strategy, mobileiron, innovation
     MobileIron
By: MobileIron     Published Date: Aug 20, 2018
The types of threats targeting enterprises are vastly different than they were just a couple of decades ago. Today, successful enterprise attacks are rarely executed by the “lone wolf” hacker and instead come from highly sophisticated and professional cybercriminal networks. These networks are driven by the profitability of ransomware and the sale of confidential consumer data, intellectual property, government intelligence, and other valuable data. While traditional PC-based antivirus solutions can offer some protection against these attacks, organizations need highly adaptive and much faster mobile threat defense (MTD) for enterprise devices.
Tags : mobile, threat, detection, machine, learning
     MobileIron
By: Mimecast     Published Date: Mar 13, 2017
The EU General Data Protection Regulation (GDPR) is arriving soon. You may think your organization is immune from its impact, but if you do business with any customers in the EU, think again. You’ll need to rethink and possibly re-do your organizational processes around compliance and oversight. It may seem like a daunting task. The Forrester Research Brief “You Need an Action Plan for the GDPR” helps your security, regulatory and privacy teams grasp five must-have changes necessary to comply with the GDPR.
Tags : 
     Mimecast
By: Mimecast     Published Date: Mar 13, 2017
The European Union’s General Data Protection Regulation (GDPR) is triggering a change in how organizations need to protect personal data, including data contained in email and contact databases. Regardless of your organization’s physical location, you must be in GDPR compliance for EU resident personal data by May 2018—or face dire consequences. Download the White Paper, to learn: • Why compliance requires unprecedented levels of effort if you control or process personal data • What specific security, privacy, and protection measures you need to take to comply with GDPR • How a majority (58%) of mid-sized and large organizations have a poor understanding of the wide scope of the regulation and its associated penalties
Tags : 
     Mimecast
By: ArborNetworks     Published Date: Feb 12, 2016
Security Analytics is one of the two fastest growing product categories in security.
Tags : arbor networks, insegment, security analytics, data protection, cyber defense, cyber security, security, data management
     ArborNetworks
By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod, cloud, credit union, email protection, hosted exchange, email security, messaging, cloud computing, dlp, encryption, data loss prevention, content filtering, email services
     BAE Systems
By: IBM     Published Date: Oct 06, 2016
IBM® i2® Analyst’s Notebook® provides rich visual analysis capabilities that help to quickly turn complex sets of disparate information into high-quality, actionable intelligence. It is designed to help analysts, and others involved in intelligence analysis, identify, predict, and prevent criminal, terrorist and fraudulent activities.
Tags : cyber security, intelligence, prevention, ibm, data protection
     IBM
By: Veritas     Published Date: Apr 06, 2016
Data protection has never been more in the forefront, as information increasingly is the lifeblood and differentiator in a constantly changing world. As the leader we see across the enterprise, which helps solve the larger information management problems that come from accelerating digital business. Keep up with the latest trends and use the following tips to maximize the value of your data protection investment —meeting more demanding SLAs, simplifying management across a complex IT environment, and reducing costs— so you can free up resources to innovate and create business value. Download this whitepaper to learn 8 tips to stay ahead of the top 2016 data protection trends.
Tags : 
     Veritas
By: Veritas     Published Date: Apr 06, 2016
Download this whitepaper for five critical pitfalls to avoid when building a successful data protection strategy for your organization.
Tags : 
     Veritas
By: Veritas     Published Date: May 12, 2016
Read this solution brief to explore: 1. Five key questions to ensure your data protection infrastructure is able to deliver data anytime and anywhere 2. Four guiding principles required for your data protection strategy to enable your digital business 3. Key tools to enable your digital enterprise
Tags : 
     Veritas
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the Energy Efficiency Markets White Paper Library contact: Kevin@EnergyEfficiencyMarkets.com