Data Loss Prevention White Papers

Results 1 - 25 of 147Sort Results By: Published Date | Title | Company Name
By: SilverSky     Published Date: Mar 26, 2014

In this white paper, we look at the best way for enterprises to make the move to the cloud and explore how to ensure that security, scalability, and flexibility are not compromised.

Tags : silversky, exchange, cloud exchange, cloud, security, scalability, flexibility, hosted exchange
    
By: Corero     Published Date: Dec 05, 2014

Few hosting providers today offer sufficient protection from DDoS attacks, so those that can implement robust DDoS attack protection will be able to more efficiently protect their hosted infrastructure and gain a competitive advantage in the marketplace. They’ll also be positioned to create incremental revenue streams from high-value, managed DDoS attack protection services.

Tags : corero, ddos, distributed denial of service, data protection, ddos attack, threat protection, hosted threats, intrusion prevention
    
By: Symantec     Published Date: Nov 24, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, database security, data loss prevention
    
By: Symantec     Published Date: Nov 24, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, storage management, storage virtualization, data protection
    
By: Symantec     Published Date: Nov 24, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage virtualization, database security
    
By: Symantec     Published Date: Nov 24, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, storage management, storage virtualization, data protection
    
By: Symantec     Published Date: Nov 24, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage management, database security
    
By: Symantec     Published Date: Nov 24, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, storage management, storage virtualization, data protection
    
By: Symantec     Published Date: Nov 24, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, database security, virtualization, data loss prevention
    
By: Symantec     Published Date: Nov 19, 2014

This report examines a wide range of business costs, including expense outlays for detection, escalation, notification, and after-the-fact (ex-post) response of a data security breach.

Tags : the cost of a data breach, business costs of a data breach, responses to a data breach, firewalls, internet security, intrusion detection, intrusion prevention, data protection
    
By: Symantec     Published Date: Nov 19, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage management, disaster recovery
    
By: Symantec     Published Date: Nov 19, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, data protection, database security, virtualization
    
By: Symantec     Published Date: Oct 20, 2014

Regardless of where data resides, in a physical, virtual, or cloud environment, Symantec helps businesses realize the scalability and cost benefits of the agile data center. Read the Solutions Brief, “Achieving Business Agility through an Agile Data Center” to learn more.

Tags : symantec, business agility, data center, it agility, infrastructure, network architecture, backup and recovery, data protection
    
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: Arbor     Published Date: Sep 15, 2014

DDoS attacks are the primary threat to the availability of your network. In 2014, the number of DDoS attacks continues its trend upward in both size and complexity. Today, attacks topping 100Gbps have become common. So have complex threats such as application-layer attacks against DNS and encrypted Web services. Taxing security teams even more is the rise in multi vector attacks which target applications, existing stateful infrastructure like Firewalls and IPS devices and upstream connectivity, all in a single sustained attack.

Tags : ddos attacks, it security, application layer attacks, application security, firewalls, hacker detection, intrusion detection, intrusion prevention
    
By: Arbor     Published Date: Sep 15, 2014

In this whitepaper, noted industry analyst Richard Stiennon examines the emerging requirement in the ongoing arms race with threat actors. Despite years of investment in multiple layers of security defenses, every organization is still wide open to targeted attacks. It is practically impossible to stop all possible attacks. Even next-generation firewalls, complete alerting and logging collected in a SIEM, and universal patch management and vulnerability discovery has proven to be ineffective against threat actors who are motivated, skilled and determined. This paper answers the critical questions about security analytics and explains why it is one of the fastest growing product categories in security.

Tags : cyber defenses, threat actors, it security, security analytics, application security, firewalls, hacker detection, security management
    
By: IBM     Published Date: Aug 08, 2014

Financial institutions need to consider a broad array of key business case components, beyond fraud loss reduction and fraud-management operating costs, when examining the business ramifications of various fraud-prevention technology approaches.

Tags : technology, fraud prevention, finance, fraud loss reduction, application security, intrusion detection, intrusion prevention, web service security
    
By: Websense     Published Date: Jul 08, 2014

A white paper on the shortest path to prevention and risk production.

Tags : protecting ip data, dlp implementation, websense data security suite, anti spam, anti spyware, anti virus, internet security, intrusion detection
    
By: Symantec     Published Date: May 02, 2014

Going without a solid backup and recovery plan for your virtualized data is an unacceptable business risk. Check out this easy-to absorb infographic to learn the five things to look for in a virtual machine backup solution.

Tags : symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data
    
By: Symantec     Published Date: May 02, 2014

Find out why Symantec was named a “Champion” in virtual backup software.

Tags : symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data
    
By: Symantec     Published Date: May 02, 2014

How are savvy CIO's conquering these types of challenges? Find out how in this white paper by vExpert, David Davis

Tags : symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data
    
By: Symantec     Published Date: May 02, 2014

This paper explores the five critical decisions organizations must adhere to when building a backup and recovery plan to prevent the complexity of virtualization that complicates IT services and the day-to-day of IT professionals across industries.

Tags : symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data
    
By: Black Lotus     Published Date: Apr 21, 2014

Newly updated for April 2014 with Q1 attack data, download the latest DDoS Threat Advisory from Black Lotus to learn about the latest threats facing your company.

Tags : black lotus, black lotus communications, ddos, denial of service, security threat, hackers, spam, fishing
    
By: Citrix     Published Date: Apr 16, 2014

Learn how NetScaler has kept pace with industry changes and is winning the hearts and minds of IT leaders.

Tags : data center, adc, cloud computing, virtualization, netscaler, citrix, racks, blades
    
By: Citrix     Published Date: Apr 16, 2014

This white paper examines the current DoS landscape and discusses common approaches for dealing with the modern DoS threat.

Tags : dos, denial of service, citrix, netscaler, http attacks, posts attacks, migration, data protection
    
Start   Previous   1 2 3 4 5 6    Next    End

Add White Papers

Get your company's white papers in the hands of targeted business professionals.