Data Protection White Papers

Continuous data protection (CDP), also called continuous backup, refers to backup of computer data by automatically saving a copy of every change made to that data, essentially capturing every version of the data that the user saves. It allows the user or administrator to restore data to any point in time.
Results 1 - 25 of 622Sort Results By: Published Date | Title | Company Name
By: Dell     Published Date: Oct 14, 2014

In this webinar, a panel of experts will examine infrastructure security needs. The discussion will provide a framework for addressing the data protection and privacy gaps and include metrics that can help businesses benchmark the success of their investments. The webinar will also present real-world case studies and cloud data protection best practices.

Tags : dell, dell security, security, data protection, privacy, cloud security, cloud computing, network security
    
By: Lenovo     Published Date: Sep 16, 2014

Renewed interest in Virtualized Desktop Infrastructure (VDI) comes largely from the need to solve mobility and BYOD demands. Though traditional VDI vendors bring their own solutions to market, is it time to consider smarter alternatives? By focusing on where VDI excels, where it falls short, and where web and cloud services are most compatible, agencies can take a smarter approach to these difficult decisions. Understand the tradeoffs, and learn why more agencies are taking notice to emerging web technologies through this executive summary.

Tags : vdi, cloud alternatives, byod demands, emerging web technologies, business intelligence, data protection, database security, productivity
    
By: HP     Published Date: Jun 09, 2014

HP Records Managed Services - An HP Information Governance Service.

Tags : record management, records managed services, information governance service, storage management, analytical applications, data protection
    
By: HP     Published Date: Jun 09, 2014

A brochure on the challenges addressed by HP Records Manager.

Tags : records manager, edrm, backup and recovery, storage virtualization, data protection, data warehousing
    
By: HP     Published Date: Jun 09, 2014

A Viewpoint paper on HP Information governance

Tags : information governance, information storage, backup and recovery, storage management, storage virtualization, data protection, database security, data warehousing
    
By: Compass Datacenters     Published Date: Apr 07, 2014

Learn about the central issues that tend to be consistent across all Request for Proposals (RFPs) and see what questions you should be asking in order to maximize the efficiency of your mission critical data center.

Tags : rfp, request for proposal, questions, data centers, compass datacenters, big business, data, business intelligence
    
By: nlyte Software     Published Date: Sep 30, 2014

This new Gartner report reviews 17 vendors of Data Center Infrastructure Management (DCIM) solutions. Based on its own expert analysis and backed up by in-depth interviews with users in the space, Gartner has just published the Magic Quadrant for Data Center Infrastructure Management Tools for the first time.

Tags : nlyte software, nlyte, data center, data center infrastructure, gartner report, infrastructure management, infrastructure, network architecture
    
By: Delphix     Published Date: Sep 10, 2014

Most data masking products can create masked data copies but not distribute or update them, resulting in projects that fail to live up to expectations. Learn why Delphix’s Agile Masking solution is the only product that solves both masked data creation and delivery challenges.

Tags : secure data, digitization, data breaches, privacy regulations, sensitive data, internal, customer information, application landscapes
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper debunks 7 virtualization DR myths

Tags : virtualization myths, disaster recovery, back up, high availability, virtual servers, data protection, backup and recovery, clustering
    
By: Fireblade     Published Date: Aug 21, 2014

Fireblade has developed an innovative behavioral approach to website security. It inspects users’ behavior and interactions with and relays the aggregated information to a central cloud, where a continual, real-time risk assessment process uses big data to discern legitimate users from attackers and abusers. Download this whitepaper to learn about this new approach.

Tags : fireblade, web application security, cloud security, interactions, cloud computing, hackers, attackers, cyberattack
    
By: IBM     Published Date: Aug 08, 2014

As executives witness data’s proven impact on performance and innovation and recognize its strategic significance, they also realize the growing need for a leader whose primary role is to understand and advocate on behalf of data: The Chief Data Officer.

Tags : big data, analytics, technology, chief data officer, business intelligence, data integration, data protection, data quality
    
By: IBM     Published Date: Jul 22, 2014

Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core application and remote sites.

Tags : ibm, storage, back up, recovery, cost reduction, data, it environments, data protection
    
By: IBM     Published Date: Jul 22, 2014

Join this session to learn how you can quickly convert existing storage to Cloud storage, standardize advanced data protection capabilities, and utilize advanced data-driven analytics to optimize tiering across storage systems --- reducing per unit storage costs up to 50% and freeing up valuable IT budget.

Tags : ibm, cloud, cloud storage, storage, storage environment efficiency, environment efficiency, data protection, data driven analytics
    
By: HP     Published Date: Jun 27, 2014

Following a series of in-depth interviews with Senior IT professionals in various industries this video provides their findings and the direct and in-direct value derived from using HPs Backup, Recovery and Archiving solutions.

Tags : backup, recovery and archiving, hp solutions, storage, backup and recovery, storage area networks, storage management, storage virtualization
    
By: HP     Published Date: Jun 25, 2014

An HP commissioned Forrester survey on the storage requirements of IT hardware decision-makers in North America and Europe.

Tags : intel, storage capabilities, storage infrastructure, storage capacity, storage requirements, backup and recovery, storage management, storage virtualization
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.

Tags : palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.

Tags : palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers
    
By: Sitecore     Published Date: May 22, 2014

Be an IT hero. Save the day with connected customer data. Get your Data Apocalypse White Paper here

Tags : database development, data protection, productivity
    
By: SilverSky     Published Date: May 22, 2014

Companies today are able to focus more time on their core competencies by trusting email and other resource-intensive activities to experts in the cloud. Thinking of moving services to the cloud? Read SilverSky’s comprehensive list of things to consider when evaluating cloud-based email solutions.

Tags : silversky, ibm, cloud, cloud-based email, cloud business email, email service, email solutions, cloud based email solutions
    
By: Kaspersky     Published Date: May 20, 2014

Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.

Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
By: EarthLink Business     Published Date: May 15, 2014

This paper covers the latest security trends, reinforces best practices in securing a cloud infrastructure, and outlines how best to meet compliance requirements (e.g., PCI, HIPAA).

Tags : earthlink, cloud infrastructure, cloud computing, midsize businesses, cloud security, mobile security, workforce collaboration, earthlink
    
By: EarthLink Business     Published Date: May 15, 2014

This white paper underscores why it’s critical for SMEs to protect all endpoints – not just mobile devices – in the operating environment. It also explains the challenges of applying stringent security across all endpoints and balancing that with convenience and ease-of-use for employees.

Tags : earthlink, smb, small business, medium business, sme, endpoint security, mobile security, mobile workers
    
By: Citrix     Published Date: May 08, 2014

A report into the need for datacenter security and how Citrix NetScaler is the solution.

Tags : datacenter security, netscaler, citrix, defense, access control, application security, ddos, internet security
    
By: Bit9     Published Date: Apr 23, 2014

Here are 10 ways you can more easily achieve that goal while maintaining required PCI compliance.

Tags : bit9, security, compliance, data breach, cyber attack, threat protection, pci compliance, payment card industry
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End