data loss

Results 126 - 150 of 352Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: VMware     Published Date: Feb 24, 2017
Mobile device management (MDM) tools allow companies to connect their employees securely to basic corporate network resources. Enterprise mobility management (EMM) goes a step further by enabling secure mobile versions of business-critical applications and data loss prevention to protect corporate information. But in today's workplace, employees and businesses deal with a vast variety of devices with different operating systems and form factors, from PCs and laptops, to tablets and smartphones, and now, increasingly wearables and Internet of Things (IoT) endpoints. The solution is unified endpoint management (UEM), which enables organizations to take a consistent approach to manage and secure every endpoint, any app and content, and across deployment use cases from a single holistic platform. Read this whitepaper to uncover VMware AirWatch®'s leading UEM approach that is benefiting organizations tremendously.
Tags : 
    
VMware
Published By: Carbonite     Published Date: Feb 22, 2017
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
backup, disaster, recovery, bdr, carbonite, environment
    
Carbonite
Published By: Kaspersky     Published Date: Feb 06, 2017
Kaspersky Lab together with B2B International conducted a global study of more than 4,000 business representatives from 25 countries.
Tags : 
kaspersky, cyber crime, data loss, business security
    
Kaspersky
Published By: Unitrends     Published Date: Jan 05, 2017
Exchange Online, SharePoint Online, and OneDrive for Business are the applications your business relies on every day. But without a smart backup plan, finding and restoring lost Office 365 data can take hours, days, or even longer. The facts are that data loss can occur in cloud-based applications, including Microsoft Office 365 and deleted items will be permanently removed after 14 days. Read our eBook to learn how to broaden your backup and recovery plan to include purpose built protection for Microsoft Office 365.
Tags : 
unitrends, microsoft office 365, backup, recovery, data loss
    
Unitrends
Published By: Viavi Solutions     Published Date: Jan 04, 2017
The right Network Performance Monitoring and Diagnostics (NPMD) solution can help IT operations deliver superior performance for users. When incorporated into your IT security initiatives, deep packet inspection can strengthen your existing antivirus software, Intrusion Detection System (IDS), and Data Loss Prevention (DLP) defenses.
Tags : 
    
Viavi Solutions
Published By: VMware     Published Date: Dec 27, 2016
With Windows 10, Microsoft brings to market a mobile and cloud-ready OS that is poised to have a significant impact on organizations’ end user computing (EUC) strategy. The modern OS offers a unified platform for building apps and extending the organization’s core processes to end users anywhere and using any Windows 10-powered device. However, enterprise wide execution of this business mobility vision comes with its own set of challenges. A 2015 VMware study involving 1,000+ IT decision makers identified the following top concerns for adoption of mobility initiatives: Reduce the overall cost and complexity of management Ensure security and control of devices at all times Minimize the risk of corporate data loss With a unified endpoint management vision, VMware AirWatch® is strategically positioned to address these challenges. AirWatch's EUC solution enables organizations to fully capitalize on their mobility initiatives and IT departments to redefine themselves as true business enab
Tags : 
    
VMware
Published By: Cox Business     Published Date: Dec 19, 2016
Businesses need to plan for unforeseen events that can disrupt productivity, impair the customer experience, and possibly even threaten a business’s existence. A disruption every business needs to plan for is any event that destroys valuable data, inhibits access to data, or causes downtime of core applications. Consider the staggering amount of information your company stores electronically. What if an unforeseen event destroyed all financial records, client contacts, and application data? You wouldn’t be able to send customers accurate invoices. Your marketing efforts might be undermined. You would lack key metrics for measuring quality, profitability, and more. The losses could be staggering. In every aspect of life, it’s smart to plan for unexpected events. That’s especially true for two plans every business must have: a disaster recovery plan and a business continuity plan.
Tags : 
    
Cox Business
Published By: IBM     Published Date: Oct 13, 2016
IBM InfoSphere Information Server connects to many new ‘at rest’ and streaming big data sources, scales natively on Hadoop using partition and pipeline parallelism, automates data profiling, provides a business glossary, and an information catalog, plus also supports IT.
Tags : 
ibm, data, analytics, big data, data integration
    
IBM
Published By: IBM     Published Date: Sep 30, 2016
Read this white paper to learn about how to get smart about insider threat prevention, including how to guard against privileged user breaches, stop data breaches before they take hold, and take advantage of global threat intelligence and third party collaboration.
Tags : 
ibm, data, big data, security, data loss, data protection, threat provention
    
IBM
Published By: Dell EMC     Published Date: Sep 12, 2016
Your business has tiers of applications and data. The protection needs of those application and data across a spectrum—starting with basic low cost daily backup, and ranging up to zero data loss with zero downtime. Along the spectrum, compliance requirements must also be met.
Tags : 
    
Dell EMC
Published By: Flexera     Published Date: Sep 08, 2016
This white paper will discuss the key elements of Software Vulnerability Management and how a properly deployed solution based on Vulnerability Intelligence will help organizations to maintain compliance and further secure their IT systems from breaches, attacks and data loss
Tags : 
    
Flexera
Published By: Microsoft Office 365     Published Date: Sep 08, 2016
Data breaches are more than a security problem. A significant attack can shake your customer base, partner relations, executive staff, profits, and revenue. Historic data breaches have cost executives their jobs, resulted in major revenue losses and damaged brand reputations.
Tags : 
    
Microsoft Office 365
Published By: CA Technologies     Published Date: Aug 26, 2016
It’s impossible for a day to pass in which we don’t hear news of yet another data breach, with its resulting loss of proprietary secrets, financial records or personal information. These incidents span all sectors of the economy: commerce, education and government
Tags : 
    
CA Technologies
Published By: Oracle     Published Date: Aug 19, 2016
This white paper goes into detail about Oracle's cloud-scale zero data loss recovery appliance.
Tags : 
    
Oracle
Published By: Druva     Published Date: Aug 03, 2016
Will your company will lose data in the cloud? Many organizations think SaaS providers will recover their data but that is not the case. Gartner assesses backup and recovery shortcomings of SaaS providers and provides considerations to close the gap.
Tags : 
    
Druva
Published By: Druva     Published Date: Aug 03, 2016
Will your company will lose data in the cloud? Many organizations think SaaS providers will recover their data but that is not the case. Gartner assesses backup and recovery shortcomings of SaaS providers and provides considerations to close the gap.
Tags : 
    
Druva
Published By: Druva     Published Date: Aug 03, 2016
Will your company will lose data in the cloud? Many organizations think SaaS providers will recover their data but that is not the case. Gartner assesses backup and recovery shortcomings of SaaS providers and provides considerations to close the gap.
Tags : 
    
Druva
Published By: Druva     Published Date: Aug 03, 2016
Will your company will lose data in the cloud? Many organizations think SaaS providers will recover their data but that is not the case. Gartner assesses backup and recovery shortcomings of SaaS providers and provides considerations to close the gap.
Tags : 
druva, gartner, best practices, technology, data, cloud
    
Druva
Published By: IBM     Published Date: Jul 12, 2016
Join us for a complimentary webinar with Mark Simmonds, IBM big data IT Architect who will talk with leading analyst Mike Ferguson of Intelligent Business Strategies about the current fraud landscape. They will discuss the business impact of fraud, how to develop a fraud-protection strategy and how IBM z Systems analytics solutions and predictive models can dramatically reduce your risk exposure and loss from fraud.
Tags : 
ibm, z systems, fraud loss reduction, fraud management, fraud prevention, fraud analytics, roi
    
IBM
Published By: Microsoft     Published Date: Jul 07, 2016
Enable, protect, and manage mobile productivity Protecting email and other corporate data on mobile devices—without bogging down workers—is one of today’s biggest challenges faced by IT pros today. With the massive, global proliferation of mobile devices, it can be a struggle to manage and secure these devices and your data, both on approved enterprise applications and shadow IT. Download this free e-book to learn how to control the uncontrollable and create a solution that: • Enables continuous management, so your employees are more productive. • Offers threat protection, so you can detect abnormal user behavior, suspicious activities, known malicious attacks, and security issues right away. • Guards against data leakage. • Provides security after loss or theft of mobile devices. • Helps protect your Microsoft Office email, files, and apps.
Tags : 
mobile devices, enterprise, best practices, management
    
Microsoft
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Resource Library      

Add Resources

Get your company's resources in the hands of targeted business professionals.