Data Protection White Papers

Continuous data protection (CDP), also called continuous backup, refers to backup of computer data by automatically saving a copy of every change made to that data, essentially capturing every version of the data that the user saves. It allows the user or administrator to restore data to any point in time.
Results 1 - 25 of 710Sort Results By: Published Date | Title | Company Name
By: Mimecast     Published Date: May 27, 2015

White Paper: 4 Critical Risks Facing Microsoft Office 365 Implementations Migrating to Microsoft® Office 365™ has its risks. In this white paper you’ll learn how to keep email working if Office 365 is offline. Protect critical data with an independent cloud backup. Combat insidious threats to email security. And streamline migration while containing costs.

Tags : mimecast, migration, microsoft office 365, storage, cloud backup, security, it management, data protection
    
By: Acronis EMEA     Published Date: May 21, 2015

This Case Study reveals how companies are addressing today's Disaster Recovery challenges across physical, virtual and cloud environments.

Tags : data protection, cloud, cloud computing, disaster recovery, technologies, recovery, infrastructure, data security
    
By: Acronis EMEA     Published Date: May 18, 2015

This book is a guide to modern data protection for IT professionals that covers the simplest file backup scenarios to comprehensive protection strategies for businesses with complex IT environments.

Tags : backup, data protection, data security, protection strategies, recovery, cloud computing, virtualization, backup types
    
By: Acronis EMEA     Published Date: May 18, 2015

Download this case study to learn about the backup product they chose and how it gave them with a unified data and application database backup solution that simplified the procuring, learning and integrating of additional products, while saving time, lowering costs, and more.

Tags : backup, data protection, database backup application solution, data security, unified data, recovery, backup data, application security
    
By: Acronis EMEA     Published Date: May 18, 2015

Download this case study now to find out about choosing Acronis backup solution and the benefits it came with.

Tags : acronis backup solution, backup solution, backup, recovery, protection, recovery services, benefits of acronis backup solution, remote recovery services
    
By: Seagate Technology     Published Date: May 15, 2015

This paper is the first to explore a recent breakthrough with the introduction of the High Performance Computing (HPC) industry’s first Intelligence Community Directive (ICD) 503 (DCID 6/3 PL4) certified compliant and secure scale-out parallel file system solution.

Tags : multi level security, big data, hpc scale, hpc, high performance comptuting, secure data appliance, mls, multi level security
    
By: Kaspersky     Published Date: May 11, 2015

Cybersecurity is not a numbers game. When it only takes a single breach to inflict serious damage on your business, defending against the majority of attacks isn’t enough.

Tags : kaspersky, cybersecurity, mitigation, online attacks, cyberattack, threat, threat protection, network security
    
By: Seagate Technology     Published Date: Apr 14, 2015

Finding a better place to store an ever-expanding volume of valuables is a near universal challenge—for individuals and their businesses. From physical holes in the ground to the ethereal cloud and beyond, the range of options for stashing stuff is immense. And, depending on what you’re storing and how easily you want others to find it, some options are better than others. Read this white paper to learn how a Network Attached Storage (NAS) system provides the customization, speed, ease-of-use, security and affordability needed to protect and share digital assets for many small business owners.

Tags : cloud, security, network attached storage system, customization, affordability, network security, network attached storage, storage management
    
By: Kaspersky     Published Date: Jan 07, 2015

With users connecting to unsecured public networks and running multiple applications from both company and personal devices, sensitive corporate data is more vulnerable than ever before. For your security policies to be effective, they need to bring all devices and applications under IT control and regulate user behavior

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

With users connecting to unsecured public networks and social media platforms on both company-owned and personal devices, sensitive data can now be accessed--and lost--from more endpoints than ever before.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

Virtualization promises cost savings, improved productivity, and the ability to transform your business. But too often security can either detract from the performance gains that virtualization promises, or just not give you the protection you need. Getting the balance right is critical.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

Do you know the most common risk factor for corporate cybercrime? Employees. Download Kaspersky Lab’s Top 10 Tips for Educating Employees about Cybersecurity.

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Jan 07, 2015

For virtualization security, there’s no one size fits all solution…and trying to fit your organization’s specific needs into the wrong security product can be a costly mistake. Do you know how to pick the right option for your organization?

Tags : kaspersky, cyberthreats, cyberattacks, hackers, cyber security, identity management, education, breach
    
By: Kaspersky     Published Date: Nov 12, 2014

Download Kaspersky Lab’s latest eBook, Rethinking Security: Fighting Known, Unknown, and Advanced Threats, to learn more about the evolution of cyberthreats that put your business at risk.

Tags : kaspersky, cybersecurity, cyberattack, hackers, it security, data protection, network security, anti virus
    
By: Kaspersky     Published Date: May 20, 2014

Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.

Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
By: Kaspersky     Published Date: Feb 14, 2014

Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don’t get caught in the crossfire. Read our special report "Who's spying on you?"

Tags : cybersecurity, hackers, virus, malware, phishing, security, internet security, secure network
    
By: EMC     Published Date: May 28, 2015

In this video for CIOs, David Goulden and Pat Gelsinger describe Hybrid Cloud as a powerful enabler of business and IT success.

Tags : emc, software defined data center, hybrid cloud, sddc, it management, data center, infrastructure, internet security
    
By: Netapp EMEA     Published Date: May 15, 2015

Combine Performance, Agility, and Control of Private NetApp Storage with Efficiency and Elasticity of AWS Public Cloud

Tags : netapp private storage, leveraging private data resources, aws, data protection, database security, web service management, cloud computing, design and facilities
    
By: Netapp EMEA     Published Date: May 15, 2015

Combine Performance, Agility, and Control of Private NetApp Storage with efficiency and Elasticity of AWS Public Cloud

Tags : netapp private storage, aws, data protection, database security, web service management, data center
    
By: Netapp EMEA     Published Date: May 15, 2015

NetApp Private Storage for AWS has the unique opportunity to change the way organizations consume cloud resources and open the market up to high-performance workloads.

Tags : netapp private storage, cloud resources, aws, private cloud, data protection, data quality, database security, cloud computing
    
By: Nexsan by Imation     Published Date: May 11, 2015

It is an inescapable fact that massive, relentless data growth now defines the IT landscape for organizations of all sizes.

Tags : nexsan, imation, data growth, data protection, massive data, dig data, secure storage, infrastructure
    
By: Nexsan by Imation     Published Date: May 11, 2015

Heightened physical security concerns spanning all industries, coupled with technological advancements is driving the requirement for higher camera resolutions, more fields of view with wider dynamic range and longer storage retention periods.

Tags : imation, nexsan, physical security, camera, surveillence, storage, online surveillance, storage management
    
By: IBM     Published Date: May 07, 2015

Hurwitz & Associates announced the findings of its inaugural Victory Index for predictive analytics. This assessment highlights both the diverse uses of predictive analytics and vendors who make those applications.

Tags : predictive analytics, data sources, vendor selection, data mining, analytical applications, data protection, data warehousing
    
By: The Institute for Health Technology Transformation     Published Date: Apr 02, 2015

This exclusive report presents insight from industry analysts, data security specialists, and healthcare IT leaders to form some interesting perspectives on the trends, shortcomings and implications with regard to data breaches, regulatory compliance and security strategies for healthcare organizations.

Tags : security, data breach, heathcare security, compliance, regulatory compliance, network security, hacker detection, intrusion prevention
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End