Data Protection White Papers

Continuous data protection (CDP), also called continuous backup, refers to backup of computer data by automatically saving a copy of every change made to that data, essentially capturing every version of the data that the user saves. It allows the user or administrator to restore data to any point in time.
Results 1 - 25 of 648Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.

Tags : unified data protection, database security, security, storage virtualization, data protection, virtualization
    
By: Symantec     Published Date: Nov 24, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, database security, data loss prevention
    
By: Symantec     Published Date: Nov 24, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, storage management, storage virtualization, data protection
    
By: Symantec     Published Date: Nov 19, 2014

This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.

Tags : unified data protection, database security, security, storage virtualization, data protection, virtualization
    
By: Symantec     Published Date: Nov 19, 2014

This report examines a wide range of business costs, including expense outlays for detection, escalation, notification, and after-the-fact (ex-post) response of a data security breach.

Tags : the cost of a data breach, business costs of a data breach, responses to a data breach, firewalls, internet security, intrusion detection, intrusion prevention, data protection
    
By: Symantec     Published Date: Nov 19, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage management, disaster recovery
    
By: Symantec     Published Date: Nov 19, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, data protection, database security, virtualization
    
By: IBM     Published Date: Nov 19, 2014

Risk Management: OpenPages GRC: Operational risk management in the world of big data - Unlocking the value of loss event data and driving the risk-aware enterprise

Tags : ibm, risk management, big data, data management, operational risk, event data, risk aware, risk solutions
    
By: IBM     Published Date: Nov 19, 2014

Risk Management: Algo Collateral: Evolution for efficiency - Active Collateral Management

Tags : ibm, efficiency, collateral management, risk management, financial landscape, financial transactions, otc market, financial regulation
    
By: Box     Published Date: Nov 09, 2014

Box recommends this report for any growing business or company considering an investment in enterprise content collaboration and cloud file sharing. Both let users access important content simply and securely, on any device: desktop, laptop, phone or tablet.

Tags : box, file sharing, ecm, enterprise content management, cloud file sharing, collaboration, mobile workers, backup and recovery
    
By: SilverSky     Published Date: May 22, 2014

Companies today are able to focus more time on their core competencies by trusting email and other resource-intensive activities to experts in the cloud. Thinking of moving services to the cloud? Read SilverSky’s comprehensive list of things to consider when evaluating cloud-based email solutions.

Tags : silversky, ibm, cloud, cloud-based email, cloud business email, email service, email solutions, cloud based email solutions
    
By: Lumension     Published Date: Feb 07, 2014

In this best practice guide, we are going to take a deep dive into a best practice process for patch and vulnerability management, developed by Lumension over thousands of customer engagements.

Tags : lumension, agent maintenance, value and risk, patch management, microsoft’s patch tuesday, it tasks, remediation process, endpoint management and security suite
    
By: Lumension     Published Date: Feb 07, 2014

Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.

Tags : lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
    
By: Lumension     Published Date: Feb 07, 2014

Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.

Tags : lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products
    
By: Virtela Communications, Inc.     Published Date: Oct 13, 2011

Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.

Tags : cloud computing, technology, virtela, device management, christian kane, mobility management, research, analytical applications
    
By: Netapp     Published Date: Dec 12, 2014

This white paper provides information on how Organizations of all kinds rely on their relational databases for both transaction processing and analytics, but many still have challenges in meeting their goals of high availability, security, and performance. NetApp’s systems, software, and services offer a number of advantages as a foundation for better operational results.

Tags : advantages of netapp's systems, database environment, enterprise database trends, database proliferation, database improvements, olap, storage management, security management
    
By: Netapp     Published Date: Dec 12, 2014

This IDC white paper provides an overview of challenges corporations commonly face when making investment decisions focused on their SAN-based storage. This paper reviews the key SAN storage features required to meet such challenges and also presents the reader with the portfolio of relevant NetApp SAN storage offerings that best address the needs of this market segment.

Tags : san storage features, storage management, storage virtualization, oracle, sap, database development, data integration, data protection
    
By: Corero     Published Date: Dec 05, 2014

Few hosting providers today offer sufficient protection from DDoS attacks, so those that can implement robust DDoS attack protection will be able to more efficiently protect their hosted infrastructure and gain a competitive advantage in the marketplace. They’ll also be positioned to create incremental revenue streams from high-value, managed DDoS attack protection services.

Tags : corero, ddos, distributed denial of service, data protection, ddos attack, threat protection, hosted threats, intrusion prevention
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.

Tags : unified data protection, database security, security, storage virtualization, data protection, virtualization
    
By: Symantec     Published Date: Nov 24, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage virtualization, database security
    
By: Symantec     Published Date: Nov 24, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, storage management, storage virtualization, data protection
    
By: Symantec     Published Date: Nov 24, 2014

This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores. Benefits and challenges of data protection for virtual environments will be discussed, as well as emerging best practices for unified data protection.

Tags : unified data protection, database security, security, storage virtualization, data protection, virtualization
    
By: Symantec     Published Date: Nov 24, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage management, database security
    
By: Symantec     Published Date: Nov 24, 2014

This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.

Tags : modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection, backup and recovery, storage management, storage virtualization, data protection
    
By: Symantec     Published Date: Nov 24, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, database security, virtualization, data loss prevention
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End