data protection

Results 301 - 325 of 1199Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: Mar 14, 2019
"Things are not as they used to be in the enterprise. Today’s employees are mobile, they’re storing and accessing data in cloud apps, and are in disparate networks. Yet, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive"
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 14, 2019
As more and more companies are encouraging their employees to work from anywhere, on any device, data loss prevention (DLP) has evolved from an option to a requirement. Yet DLP is not so much a product but a strategy—success depends on methodology and execution. Download the whitepaper for insightful guidance on implementing DLP.
Tags : 
data protection, data security, critical data, intellectual property, intellectual property protection, dlp, cybersecurity, data loss prevention
    
Forcepoint
Published By: Forcepoint     Published Date: Mar 14, 2019
Security spending is expected to reach $120 billion by 2021, yet the amount of data loss events seems to be increasing. Legacy DLP solutions, which rely on traditional threat blocking policies, have been unable to evolve to address these threats. Watch this webcast to understand how taking a Risk-Adaptive approach enables security to fluctuate based on the threat environment.
Tags : 
data protection, data loss prevention, data leak prevention, data security, risk-adaptive, critical data, intellectual property protection, cybersecurity, cyber security, analytics, behavior analytics, dlp, data centric security
    
Forcepoint
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
In a new video, security analyst Rich Mogull discusses mobile data protection topics and addresses many issues, including, the latest trends in mobile security, mobile device management, and mobile data protection.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: NetApp     Published Date: Feb 19, 2015
The NetApp EF550 all-flash array provides a robust platform for delivering exceptional performance to mission-critical applications. The EF550 flash array leverages the latest in solid-state disk technologies along with a strong heritage of handling diverse workloads and providing superior business value through the acceleration of latency-sensitive and high-I/O applications. This technical report provides an overview of workload characterizations performed on NetApp EF-series all-flash arrays across a wide variety of I/O types - with best practices and observations based on extensive test data. Characterizations include IOPS, throughput, and latency under varying block loads and RAID levels, SSD rebuild times, EF540 and EF550 performance comparison, and usable capacity sizing guidelines for various protection levels. If you are considering deploying an EF-series flash storage array in your environment, this is an essential technical resource to insure proper configuration and maxim
Tags : 
    
NetApp
Published By: Redstor UK     Published Date: Mar 12, 2018
Backup and recovery have been a constant for organisations over the years, often not seen as glamorous aspects of an IT environment but as solutions that are necessary all the same. Environments have changed over the years and the focal use for backups have changed with them, although your solutions may not have. Taking a simple off-site backup, whether this be to disk, tape or other removable media, would once have been the last line of defence for data protection. Solutions were reliable and ensured data could be recovered in a timely manner.
Tags : 
recovery, backup, infrastructure, security, data
    
Redstor UK
Published By: Redstor UK     Published Date: Mar 12, 2018
The General Data Protection Regulation, is a piece of legislation that was approved and put in to place by the European Parliament in April 2016. As European Law, it will fully take effect after a 2-year transition ending May 25th 2018. GDPR, replaces the previous Data Protection Directive (DPD), adopted in 1995, and will in the UK, replace and strengthen the Data Protection Act 1998 (DPA). One of the initial differences between GDPR and DPD, is that GDPR is a regulation not a directive; as a regulation, no additional enabling legislation will have to be passed by governments of member states. Redstor have the ability to give insight into the data organisations have on their networks, advise on best practice to protect data and then implement strategies around backup, archiving and disaster recovery. Data is searchable through an intuitive console making compliance simple and achievable for all organisations protecting data through the Backup Pro Platform.
Tags : 
    
Redstor UK
Published By: Redstor UK     Published Date: Mar 12, 2018
The General Data Protection Regulation is set to shake up modern data protection laws. With large-scale data breaches making news headlines on a weekly basis throughout 2017, data regulation authorities across Europe will be hoping this can help resolve the challenges of data protection. However, with so many questions around how to comply it is still unclear how far this regulation spreads. Technologists are now looking for answers, wanting to know how the GDPR will affect backup and nonprimary data sets and what needs to be done to be compliant. This white paper will explore and understand aspects of the regulation to help answer questions and give clarity over what data is covered by the GDPR and what organisations need to do to be compliant. Redstor have specialised in assisting organisations with data protection and management for almost two decades. Providing compliant services around the areas of Data Backup, Disaster Recovery and Archiving.
Tags : 
    
Redstor UK
Published By: Egress ABM Pilot     Published Date: Oct 09, 2017
The EU General Data Protection Regulation (GDPR) represents a significant step change for data protection across EU member states. The EU GDPR also brings with it serious implications for organisations who suffer a breach. People will always make mistakes – and in busy and stressful workplaces such as banks and insurance firms the likelihood of this increases. Without the right processes and technologies in place to help avoid mistakes, sensitive client information remains at risk. This white paper provides financial services organisations with a four-step process to ensure compliance.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
Egress ABM Pilot
Published By: Egress ABM Pilot     Published Date: Oct 09, 2017
Patients trust healthcare organisations with vast amounts of their sensitive data – not just details on their medical and social wellbeing, but also personally identifiable information such as dates of birth and residential addresses. People will always make mistakes – and, unfortunately, in busy and stressful workplaces, such as hospitals and medical clinics, the likelihood of this increases. Without the right processes and technologies in place to help overcome this to avoid mistakes, sensitive patient information remains at risk.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
Egress ABM Pilot
Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : 
unified data protection, database security
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : 
purpose built backup appliances, pbbas, backup performance, data protection, data security
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : 
modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : 
unified data protection, database security
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : 
purpose built backup appliances, pbbas, backup performance, data protection, data security
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : 
modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.
Tags : 
unified data protection, database security
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.
Tags : 
purpose built backup appliances, pbbas, backup performance, data protection, data security
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : 
modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection
    
Symantec
Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : 
fingerprint authentication, identity management, identity protection, data security, identity theft, loss prevention, compliance, strong authentication, biometrics, fraud prevention, transaction authentication, identification
    
DigitalPersona UK
Published By: Citrix Systems     Published Date: Jul 28, 2015
Learn how Citrix Netscaler with Unified Gateway delivers a single, consolidated remote access infrastructure featuring comprehensive access, threat, and data protection.
Tags : 
    
Citrix Systems
Published By: Forrester     Published Date: May 10, 2012
In the never-ending race to stay ahead of the competition, companies are developing advanced capabilities to store, process, and analyze vast amounts of data from social networks, sensors, IT systems, and other sources to improve business intelligence and decisioning capabilities.This report will help security and risk professionals understand how to control and properly protect sensitive information in this era of big data.
Tags : 
data-centric security, information protection, information management, data protection, security, risk and compliance, data warehousing
    
Forrester
Published By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn 5 strategies to efficiently communicate Disaster Recovery to your C-Level Executives in order to protect your organization from data center interruptions.
Tags : 
sungard, sungard availability services, disaster recovery, it recovery, data loss protection, disaster recovery program, managed recovery program, risk mitigation, managed recovery service provider
    
SunGard Availability Services
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.