Data Protection White Papers

Continuous data protection (CDP), also called continuous backup, refers to backup of computer data by automatically saving a copy of every change made to that data, essentially capturing every version of the data that the user saves. It allows the user or administrator to restore data to any point in time.
Results 1 - 25 of 728Sort Results By: Published Date | Title | Company Name
By: Cisco     Published Date: Jun 29, 2015

In this video F5’s SVP of WW Marketing discusses the benefits of Cisco ACI–F5 Big IQ joint solution.

Tags : partnership cisco aci and f5, cisco aci, data center, solution data center, cisco solutions, storage management, storage virtualization, application integration
    
By: Mimecast     Published Date: Jun 22, 2015

Mimecast commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying its Unified Email Management solution.

Tags : unified email management, uem, mimecast, microsoft office 365, email providers, email security, archiving, continuity
    
By: Tricentis     Published Date: Jun 22, 2015

This paper reveals how Tosca Testsuite assists enterprises in optimising test portfolios by minimising the number of test cases needed to achieve the highest possible business risk coverage.

Tags : testing, tosca testsuit, test, sap, test portfolios, technology support, sap interfaces, technology
    
By: Tricentis     Published Date: Jun 22, 2015

This paper reveals the reason why people love E2E tests.

Tags : end to end testing, testing, test, e2e testing, manual testing, it landscapes, test environment, e2e tests
    
By: Tricentis     Published Date: Jun 22, 2015

Read this paper to find out how Tosca Testsuite can help you to lower the maintenance effort of your test data and operating costs of your test environment while building an efficient test data management strategy.

Tags : data management, tosca testsuit, test data, test data management strategy, testing, test, test and measurement, database development
    
By: IBM     Published Date: Jun 16, 2015

Building and managing cloud resiliency solutions in-house is difficult. Many organizations prefer to work with a third-party technology provider for the development and management of cloud solutions.

Tags : cloud computing, business intelligence, cloud solutions, recovery point objectives, virtualization technologies, recovery solutions, network security, business continuity
    
By: TigerText     Published Date: Jun 11, 2015

Download this guideline for reinforcing existing BYOD security practices and discover how mobile health can minimize expenses, improve patient care and boost staff productivity.

Tags : tigertext, mobile security, wireless security, mobile devices, mobile workers, byod, smart phones, data protection
    
By: Lumension     Published Date: Jun 05, 2015

Lumension’s fourth-annual survey on data protection maturity highlights the threats, responses, policies, and technologies of a shifting data security landscape. It also reveals how organizations have made progress—and where they may still be at risk.

Tags : data protection, threats, security landscape, shifting data, data maturity
    
By: AlienVault     Published Date: Jun 05, 2015

Practical security controls that won't break the bank

Tags : threat management, security, network, web application, network, application security, application integration, data protection
    
By: Mimecast     Published Date: May 27, 2015

White Paper: 4 Critical Risks Facing Microsoft Office 365 Implementations Migrating to Microsoft® Office 365™ has its risks. In this white paper you’ll learn how to keep email working if Office 365 is offline. Protect critical data with an independent cloud backup. Combat insidious threats to email security. And streamline migration while containing costs.

Tags : mimecast, migration, microsoft office 365, storage, cloud backup, security, it management, data protection
    
By: Seagate Technology     Published Date: May 15, 2015

This paper is the first to explore a recent breakthrough with the introduction of the High Performance Computing (HPC) industry’s first Intelligence Community Directive (ICD) 503 (DCID 6/3 PL4) certified compliant and secure scale-out parallel file system solution.

Tags : multi level security, big data, hpc scale, hpc, high performance comptuting, secure data appliance, mls, multi level security
    
By: IBM     Published Date: May 07, 2015

Hurwitz & Associates announced the findings of its inaugural Victory Index for predictive analytics. This assessment highlights both the diverse uses of predictive analytics and vendors who make those applications.

Tags : predictive analytics, data sources, vendor selection, data mining, analytical applications, data protection, data warehousing
    
By: Seagate Technology     Published Date: Apr 14, 2015

Finding a better place to store an ever-expanding volume of valuables is a near universal challenge—for individuals and their businesses. From physical holes in the ground to the ethereal cloud and beyond, the range of options for stashing stuff is immense. And, depending on what you’re storing and how easily you want others to find it, some options are better than others. Read this white paper to learn how a Network Attached Storage (NAS) system provides the customization, speed, ease-of-use, security and affordability needed to protect and share digital assets for many small business owners.

Tags : cloud, security, network attached storage system, customization, affordability, network security, network attached storage, storage management
    
By: F5 Networks Inc     Published Date: Feb 18, 2015

As a website building service for consumers, Weebly is often the target of DDoS attacks. Previously they mitigated attacks through an internally built security infrastructure but the increasing scale and complexity of DDoS attacks had the company evaluating secondary protection. Learn how Weebly is well protected from DDoS threats of all sizes and complexities after incorporating an added layer of protection and resulting uninterrupted DDoS mitigation and analysis.

Tags : ddos attacks, ddos protection, ddos solutions, mitgation, security, it management, business intelligence, data protection
    
By: Simplivity     Published Date: Jul 02, 2015

SimpliVity’s solution is a great fit for today’s midmarket data center. This hyperconverged infrastructure simplifies an otherwise complex system that would require frequent maintenance and upgrades. SimpliVity offers an affordable solution that addresses major challenges of midmarket I&O teams.

Tags : hyperconvergence, midmarket, virtualization, deduplication, compression, optimization, data management, data protection
    
By: Simplivity     Published Date: Jul 02, 2015

ActualTech Media and SimpliVity have partnered to create a new report that presents data from surveyed IT professionals and their experiences with hyperconverged infrastructure. The report defines Hyperconvergence and outlines the future of the industry.

Tags : hyperconvergence, robo, market report, storage, disaster recovery, operational efficiency, high it costs, data protection
    
By: CDW     Published Date: Jun 26, 2015

Learn how software asset management can play the crucial role of cataloging and managing the myriad of software elements that could possibly pose a threat to network security at your enterprise.

Tags : software asset management, network security, licensing, cloud-based apps, licensing security, security management strategies, application security, security management
    
By: Cisco     Published Date: Jun 22, 2015

This paper reveals how today’s businesses demand an IT department that facilitates their business strategies. To get there, they need their IT infrastructure to be more agile, simple, and efficient.

Tags : data center, cisco, it infrastructure, technology, cisco's unified data center, unified data center, application integration, data integration
    
By: Cisco     Published Date: Jun 22, 2015

This white paper shows how Microsoft and Cisco have come together and developed a best-of-breed private cloud ecosystem that combines Cisco’s compute and network expertise with Microsoft’s single operating system, data management, and virtualisation capabilities.

Tags : private cloud, cisco, microsoft, cisco and microsoft, data center, data management, application integration, data protection
    
By: Kaspersky     Published Date: Jun 15, 2015

Download Kaspersky Lab’s “Endpoint Security for Business: Technology in Action” to learn about threats you can see and those you can’t.

Tags : kaspersky, endpoint security, threats, threat management, data protection, network security, email security, hacker detection
    
By: Kaspersky     Published Date: Jun 15, 2015

Download Kaspersky Lab’s Unlock the Key to Repel Ransomware to learn common ransomware scenarios and delivery mechanisms.

Tags : kaspersky, ransomware, cybercrime, cyberattack, hackers, data leakage, spam, malware
    
By: CommVault     Published Date: Jun 10, 2015

Backup and recovery is becoming increasingly complex, cutting into staff time and budgets and slowing operations.

Tags : backup, data, management, storage, data prote, storage management, business management, business intelligence
    
By: CommVault     Published Date: Jun 10, 2015

Modern data protection solutions must be able to access and restore from backups painlessly, with minimal IT help required.

Tags : backup, data, management, storage, data protection, software, network, storage management
    
By: CommVault     Published Date: Jun 10, 2015

Automate the burden of discovery, classification, filtering and policy assignment for virtual machine protection with Simpana® software.

Tags : protection, data, infrastructure, cloud, operation, retention, analytical applications, data protection
    
By: CommVault     Published Date: Jun 10, 2015

For optimum protection while enhancing user productivity, consider the following features in this buyers guide.

Tags : protection, backup, productivity, flexibility, network management, infrastructure, network performance management, storage management
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End