data loss

Results 276 - 300 of 343Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: May 02, 2014
Learn more about Symantec’s unique solution to IT environments looking to take full advantage of virtualization.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, data protection, loss data, virtual environment, virtualization
    
Symantec
Published By: Symantec     Published Date: May 02, 2014
This paper explores the five critical decisions organizations must adhere to when building a backup and recovery plan to prevent the complexity of virtualization that complicates IT services and the day-to-day of IT professionals across industries.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data, virtual environment, data protection, enterprise data
    
Symantec
Published By: Symantec     Published Date: May 02, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data, virtual environment, data protection, enterprise data
    
Symantec
Published By: Cisco     Published Date: Aug 18, 2014
Mitigating Email Threats White Paper: Protect your content with these security measures for inbound and outbound email. Mitigating Web Threats White Paper: Learn about web security options for on-premises, cloud, hybrid, and virtual deployments.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises
    
Cisco
Published By: Cisco     Published Date: Aug 18, 2014
Cisco offers an approach to network security that protects against new and emerging threats while enhancing network visibility and control. Cisco’s proven email and web security products protect 50 percent of Fortune 1000 companies, more than 20 percent of the world's largest enterprises, and eight of the 10 largest Internet service providers.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway
    
Cisco
Published By: Cisco     Published Date: Sep 15, 2014
Mitigating Email Threats White Paper: Protect your content with these security measures for inbound and outbound email. Mitigating Web Threats White Paper: Learn about web security options for on-premises, cloud, hybrid, and virtual deployments.
Tags : 
email, web security, quadrant, solutions, threats, data loss, phishing attacks, protection, gateway, mitigate, cloud, hybrid, on-premises
    
Cisco
Published By: Kaspersky     Published Date: Feb 06, 2017
Kaspersky Lab together with B2B International conducted a global study of more than 4,000 business representatives from 25 countries.
Tags : 
kaspersky, cyber crime, data loss, business security
    
Kaspersky
Published By: HP     Published Date: Aug 26, 2014
Make sense of modern storage technologies and architectures and how they might impact your business. HP helps you understand unstructured data, block and object storage, storage system architectures, and storage networking options. Discover how the right mix or technologies such as virtualization, file sharing, and deduplication can help control storage costs, protect your data from loss or corruption, and provide reliable access to critical business information for every authorized user. See how.
Tags : 
data, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection
    
HP
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Mar 03, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Viavi Solutions     Published Date: Apr 01, 2015
With the expanding sophistication of large-scale breaches, the question isn’t whether most organizations will be hacked – it’s when. The APM for Security Forensics white paper shows you how performance monitoring tools can act as a network security camera. It also includes a case study of how one network team used a performance monitoring solution to identify the surprising source of an attack.
Tags : 
apm, security, application performance management, it infrastructure, it security, data loss, intrusion detection
    
Viavi Solutions
Published By: Backupify     Published Date: Jul 15, 2013
With more than 100 survey respondents, The Aberdeen Group has collected information on the little known subject of SaaS data loss, how it affects companies today, and what IT departments are doing to combat it.
Tags : 
saas, public cloud, private cloud, datacenter
    
Backupify
Published By: Symantec     Published Date: Jun 18, 2015
Learn how to discover, monitor and protect your sensitive information to maximize the efficiency of your data management and see how you can greatly improve your data loss prevention.
Tags : 
security, data loss prevention, data management, monitor and protect, data efficiency
    
Symantec
Published By: Viavi Solutions     Published Date: Jan 04, 2017
The right Network Performance Monitoring and Diagnostics (NPMD) solution can help IT operations deliver superior performance for users. When incorporated into your IT security initiatives, deep packet inspection can strengthen your existing antivirus software, Intrusion Detection System (IDS), and Data Loss Prevention (DLP) defenses.
Tags : 
    
Viavi Solutions
Published By: Symantec     Published Date: Sep 19, 2012
This guide discusses the combined risk of data loss and customer trust, planning, deploying and maintaining SSL certificates and how SSL certificates can protect your business.
Tags : 
information security, information technology, web applications
    
Symantec
Published By: Symantec Corporation     Published Date: Oct 03, 2013
We often think of malware as being designed to sit beneath the radar, collecting data in stealth mode, for the purposes of fraud or corporate espionage. Increasingly however, we’re witnessing attacks on corporations designed to cause substantial economic losses via wholesale destruction. For example, the Shamoon malware that recently hit Saudi Arabia-based Aramco (the world’s largest oil company) and RasGas (a Qatar-based gas company) corrupted files on tens of thousands of workstations, overwriting the Master Boot Records. These malware attacks, which may well have targeted website vulnerabilities, resulted in destruction on an industrial scale. At Aramco, IT professionals were forced to replace 30,000 PCs and laptops. RasGas meanwhile, had to shut down all email communications, and the company’s website was forced offline.
Tags : 
symantec, security, threat, report, key findings, best practice, strategy, technology
    
Symantec Corporation
Published By: Norse     Published Date: Oct 22, 2013
As cyberattacks and fraud continue to increase in frequency and sophistication, organizations are placing a greater emphasis on cyberthreat intelligence as a way to protect against compromise, data breach, and losses from online fraud. Measuring the true value of threat intelligence has been difficult however. For the first time the Ponemon Institute has conducted a study that reveals the facts behind the impact that weak threat intelligence is having on organizations.
Tags : 
threat, cyber security, impact report, threat intelligence, it security, cyber threat, data breach, security attacks, enterprise security, exploits, live threat
    
Norse
Published By: RSA Security     Published Date: Aug 28, 2014
Learn how connecting a Data Loss Prevention (DLP) system to an access governance solution can enable organizations to make informed decisions within a proper access governance framework, appropriately evaluate and manage risk, and obtain maximum benefit from their chosen DLP solution.
Tags : 
    
RSA Security
Published By: Workday Netherlands     Published Date: Aug 07, 2018
Maar executives schrikken er vaak voor terug om informatie buiten de onderneming te verplaatsen. Zij geloven - ten onrechte - dat hun IT-personeel het beste in staat is om gevoelige informatie te beveiligen. Voor een succesvolle toekomst moeten CIO’s hun traditionele visie op beveiliging (on-premise is het beste) laten varen, en het beheer van hun belangrijkste applicaties overdragen aan een cloudprovider.
Tags : 
cloud oplossingen, data oplossingen
    
Workday Netherlands
Published By: Workday Netherlands     Published Date: Aug 07, 2018
De hype rondom de cloud is enorm geweest. En dat is ook terecht gebleken. De meeste organisaties werken momenteel al met een cloudservice als onderdeel van hun IT-infrastructuur. Terwijl on-premisesoftware verouderd raakt en hybride oplossingen tekortschieten, maken cloudtoepassingen nieuwe manieren mogelijk om innovatieve oplossingen te leveren. Deze oplossingen zijn praktisch en ze zijn eenvoudig te gebruiken en te beheren. De cloud biedt nu de fundamentele infrastructuur waarop innovatieve organisaties hun bedrijfsactiviteiten kunnen uitvoeren.
Tags : 
cloud oplossingen, data oplossingen
    
Workday Netherlands
Published By: Workday Netherlands     Published Date: Aug 07, 2018
Maar executives schrikken er vaak voor terug om informatie buiten de onderneming te verplaatsen. Zij geloven - ten onrechte - dat hun IT-personeel het beste in staat is om gevoelige informatie te beveiligen. Voor een succesvolle toekomst moeten CIO’s hun traditionele visie op beveiliging (on-premise is het beste) laten varen, en het beheer van hun belangrijkste applicaties overdragen aan een cloudprovider.
Tags : 
cloud oplossingen, data oplossingen
    
Workday Netherlands
Published By: ProStor Systems     Published Date: Mar 15, 2007
The need for protecting data is universal – whether a small to mid-size business, the largest enterprise data center, or an individual. The recognition of the value of information and the impact of data loss has reached the point where repeating it is no longer required. The issue now has turned to how to protect the data.
Tags : 
smb, archiving, backup, hardware, security, data management, database security, data protection, small business networks, prostor, prostor systems, backup and recovery
    
ProStor Systems
Published By: HP     Published Date: Jul 08, 2009
Data is the backbone of every organization. No matter the business, industry, or size, reliable data access is essential to operations. Should a "worst-case scenario" occur, being prepared with an appropriate disaster recovery strategy is essential. Given the potential high cost associated with data loss, reliable data protection is no longer an option; rather, it is an obligation. This white paper discusses a data protection strategy that takes into consideration the business environment, offering sophisticated features while maintaining simplicity, affordability, and reliability.
Tags : 
storage, data protection, reliability, reliable, disaster recovery, business protection, business continuity, storageworks, rto, rpo, recovery time objective, recovery point objective, tape, lan, san, das, direct attached storage, rdx, d2d, disk to disk
    
HP
Published By: IBM     Published Date: Dec 30, 2008
Does your business need to safeguard information, keep auditors and regulators satisfied, and improve data quality? Data governance is the answer. This informative video outlines the latest challenges and best practices in data governance. IBM data governance solutions help businesses with:• Audit and reporting • Data architecture/infrastructure • Data quality • Information lifecyle management • Metadata/business glossaries • Organizational design/development • Policy/risk management • Security/privacy/compliance • Stewardship/value creation
Tags : 
ibm, data governance, safeguard information, data quality, data architecture, data infrastructure, information lifecycle management, metadata, business glossaries, organizational design, organizational development, policy management, risk management, security, privacy, compliance, stewardship, value creation
    
IBM
Published By: XOsoft     Published Date: Aug 21, 2009
The primary information management concern in the enterprise today is to ensure that the knowledge necessary to drive critical business processes is available where it needs to be, when it needs to be. The costs of failure to do this are high. 
Tags : 
cost control, data loss, data protection, information management, data management, business process management, xosoft
    
XOsoft
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.