data loss

Results 301 - 325 of 350Sort Results By: Published Date | Title | Company Name
Published By: Workday Netherlands     Published Date: Aug 07, 2018
Maar executives schrikken er vaak voor terug om informatie buiten de onderneming te verplaatsen. Zij geloven - ten onrechte - dat hun IT-personeel het beste in staat is om gevoelige informatie te beveiligen. Voor een succesvolle toekomst moeten CIO’s hun traditionele visie op beveiliging (on-premise is het beste) laten varen, en het beheer van hun belangrijkste applicaties overdragen aan een cloudprovider.
Tags : 
cloud oplossingen, data oplossingen
    
Workday Netherlands
Published By: ProStor Systems     Published Date: Mar 15, 2007
The need for protecting data is universal – whether a small to mid-size business, the largest enterprise data center, or an individual. The recognition of the value of information and the impact of data loss has reached the point where repeating it is no longer required. The issue now has turned to how to protect the data.
Tags : 
smb, archiving, backup, hardware, security, data management, database security, data protection
    
ProStor Systems
Published By: HP     Published Date: Jul 08, 2009
Data is the backbone of every organization. No matter the business, industry, or size, reliable data access is essential to operations. Should a "worst-case scenario" occur, being prepared with an appropriate disaster recovery strategy is essential. Given the potential high cost associated with data loss, reliable data protection is no longer an option; rather, it is an obligation. This white paper discusses a data protection strategy that takes into consideration the business environment, offering sophisticated features while maintaining simplicity, affordability, and reliability.
Tags : 
storage, data protection, reliability, reliable, disaster recovery, business protection, business continuity, storageworks
    
HP
Published By: IBM     Published Date: Dec 30, 2008
Does your business need to safeguard information, keep auditors and regulators satisfied, and improve data quality? Data governance is the answer. This informative video outlines the latest challenges and best practices in data governance. IBM data governance solutions help businesses with:• Audit and reporting • Data architecture/infrastructure • Data quality • Information lifecyle management • Metadata/business glossaries • Organizational design/development • Policy/risk management • Security/privacy/compliance • Stewardship/value creation
Tags : 
ibm, data governance, safeguard information, data quality, data architecture, data infrastructure, information lifecycle management, metadata
    
IBM
Published By: XOsoft     Published Date: Aug 21, 2009
The primary information management concern in the enterprise today is to ensure that the knowledge necessary to drive critical business processes is available where it needs to be, when it needs to be. The costs of failure to do this are high. 
Tags : 
cost control, data loss, data protection, information management, data management, business process management, xosoft
    
XOsoft
Published By: XOsoft     Published Date: Aug 21, 2009
Traditional backup systems provide a critical layer of insurance, but they represent all-or-nothing strategies that do not cover the minute by minute daily data writes to the disk. Continuous data protection fills in this gap by capturing changes to data while users are working. In the event of a data interruption, administrators can automatically reconstitute the data in reverse order to a point before it was corrupted or lost.
Tags : 
disaster plan, disaster recovery, data protection, storage, backup and recovery, backup, recovery, prevent data loss
    
XOsoft
Published By: Quocirca     Published Date: Jul 27, 2009
With data breaches widespread, no organisation can afford to be complacent, but most data losses are avoidable. Many of the breaches making headline news are caused by the loss or theft of laptops and other portable devices. To protect themselves from financial and reputational damage, encryption technologies can reduce risks by ensuring the information on such devices is secure when users are on the move. They can also add value by allowing the secure sharing of information among authorised users and by enabling more secure remote working.
Tags : 
quocirca, encryption, security, information protection, compliance, data management
    
Quocirca
Published By: Quocirca     Published Date: Oct 17, 2009
Managed print services (MPS) offer organisations the opportunity to control costs, reduce the complexity of managing a heterogeneous infrastructure and improve business processes. With many organisations striving to do more with less, MPS can cut both capital and operational expenses. Now is the time to tackle the huge cost and productivity drain represented by an unmanaged print environment. MPS passes control of this complex infrastructure to the experts leaving an organisation to focus on its core business competencies.
Tags : 
quocirca, data loss, encryption, data security, laptops, information protection, winmagic, information sharing
    
Quocirca
Published By: Avalere     Published Date: Apr 02, 2007
Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.
Tags : 
mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
    
Avalere
Published By: Ecora Software     Published Date: Aug 15, 2007
High-profile data losses are grabbing more and more headlines every week, threatening the reputation, customer base, and overall bottom line of organization whose systems have been exploited. In addition to this lurking threat, now organizations face potential fines for PCI non-compliance from VISA, beginning in September 2007. Ecora Software will provide you with the information you need to proactively address PCI compliance and, of equal importance, minimize your risk of a costly data breach.
Tags : 
pci, pci dss, pcidss, payment card, credit card, pci compliant, compliance, financial
    
Ecora Software
Published By: ElcomSoft     Published Date: Dec 06, 2007
In order to protect important data, we use a large variety of methods and technologies, especially when the data in question is confidential and essential for day-to-day operations of a business and for making important management decisions. "If you have the information, you own the world" has become the basic tenet of our times, where control over data is of the utmost significance. The loss of access to important data can have a very negative impact on the company’s business.
Tags : 
password, password management, access control, server access, network management, windows, windows management, user access
    
ElcomSoft
Published By: ElcomSoft     Published Date: Dec 06, 2007
Information protection gets much attention these days. Many have realized that their data is a treasure, which not only should be treated properly, but should be protected as well. So a few dollars spent on defending against security threats now can reap millions in avoiding future losses due to hacking of your enterprise network.
Tags : 
passwords, password, password management, security management, good password, bad password, data protection, elcomsoft
    
ElcomSoft
Published By: VMware Dell     Published Date: Sep 29, 2008
Business operations that are heavily dependent on information systems may be significantly impacted even by a brief application outage. Impact of a data loss is even more drastic. IDC estimates that in a disaster situation, the average loss is $3 million per incident and $81,000 per hour.
Tags : 
vmware, dell, disaster recovery, storage area network
    
VMware Dell
Published By: Focus     Published Date: Jan 06, 2011
Mitigate the risks of data breach and loss with these best practices for managing security on mobile devices.
Tags : 
amy babinchak, best practices, bob egan, expert content, information technology, it security, josh lipton, ken wineberg
    
Focus
Published By: SAS     Published Date: Apr 16, 2015
We often hear about how the massive volumes of data the US government collects hold a treasure trove of answers to our most challenging questions – be it on population health, national security, education or how to recoup losses from tax fraud. If only the government could figure out how to make use of all that information. Texas is one example of a government that is using analytics to solve complex problems. As the case studies here demonstrate, agencies and academia in the Lone Star State are putting big data and analytics to work to eliminate waste, improve productivity and, in some cases, even enhance transparency.
Tags : 
    
SAS
Published By: Okta     Published Date: May 07, 2015
Bring Your Own Device (BYOD) can be a very polarizing topic for IT. Some view it as a solution that can save money, improve end user satisfaction, and enable remote employees. For others, BYOD represents risk of data leakage, loss of control, and signing up to support an endless ecosystem of unknown devices. No matter what your opinion on BYOD is, the impact on IT policy cannot be overstated. Through 2017, Gartner reports that 90% of organizations will support some aspect of BYOD. Read this eGuide and learn how you can address several new BYOD challenges facing IT.
Tags : 
byod, okta, mobility, safety, dad, mobility management
    
Okta
Published By: Lumension     Published Date: Jan 11, 2012
The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com­plexity. Find out more!
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
Lumension
Published By: Lumension     Published Date: Jan 11, 2012
Find out why fixing 3rd-party app vulnerabilities is at the core of IT security-and how to make sure patch management is optimizing your security.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance
    
Lumension
Published By: nick.morgan     Published Date: Apr 13, 2011
Reducing the security risks organisations are facing by shifting IT operation to the cloud.
Tags : 
cloud environments, virtual environments, security implications, business benefits, virtual machines, organisations, information, data loss
    
nick.morgan
Published By: IBM Corp     Published Date: Sep 23, 2011
ESG Lab Validation Report - Reducing Storage Capacity and Costs without Compromise. Even with the plethora of storage efficiency technologies-such as deduplication and thin provisioning-available in the market today, users have not been able to stem the growth. This ESG Lab report looks at how IBM Real-time Compression can be used to reduce the cost of storing primary file data without impacting performance. The results of hands-on testing of IBM Real-time Compression Appliances performed by ESG at an IBM facility is used to demonstrate the value of non-disruptive deployment, loss-less capacity savings, real-time performance, and non-stop high availability.
Tags : 
ibm, esg, lab validation, storage capacity, real-time compression, technology
    
IBM Corp
Published By: Integrated Business Services, Inc.     Published Date: Jun 06, 2011
An article exploring the new Web 2.0 threats to organizations.
Tags : 
it security, data loss prevention, intrusion protection, breach, bots, mobiliti
    
Integrated Business Services, Inc.
Published By: CDW Symantec     Published Date: Aug 02, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
Tags : 
data, identity, security, network, protection, mobile, security, documents
    
CDW Symantec
Published By: Mimecast     Published Date: Apr 04, 2013
The secure email gateway market is mature. Buyers should focus on strategic vendors, data loss prevention capability, encryption and better protection from targeted phishing attacks.
Tags : 
email, security, dlp, data loss prevention, encryption, business continuity
    
Mimecast
Published By: Kaseya     Published Date: Mar 12, 2015
Providers who add BDR to their offerings can enjoy substantial profit margins and incremental monthly recurring revenue. BDR, therefore, is ideal for solution providers, especially as a first step to a managed services practice.
Tags : 
backup, data loss, risks, recovery services, humor error, program deletions, hardware failures, system crashes
    
Kaseya
Published By: McAfee     Published Date: Nov 12, 2014
Webinar showcasing best practices for implementing data loss preventino (DLP). Featuring Michael Avdeev, Enterprise Security Architect for the Intel Security Group.
Tags : 
data loss prevention, dlp, best practices, dlp implementation
    
McAfee
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.