Data Protection White Papers

Continuous data protection (CDP), also called continuous backup, refers to backup of computer data by automatically saving a copy of every change made to that data, essentially capturing every version of the data that the user saves. It allows the user or administrator to restore data to any point in time.
Results 1 - 25 of 612Sort Results By: Published Date | Title | Company Name
By: SilverSky     Published Date: Mar 26, 2014

This white paper includes a comprehensive list of things to consider in evaluating cloud-based email solutions, from the hidden costs of hosting your own, to additional services you might need, as well as what questions to ask your provider.

Tags : silversky, cloud based email, cloud, email solutions, security, archiving, data protection, collaboration
    
By: Global Knowledge     Published Date: Feb 14, 2014

Are you a Business Analyst? Are you taking on the leadership role the proper way? Take a look at this whitepaper to see how the Business Analyst plays an essential role in any project.

Tags : global knowledge, project manager, business analyst, leadership role, professional association, business value, individual contributors, analytic ability
    
By: Kaspersky     Published Date: Feb 14, 2014

Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments and high-profile organizations. Don’t get caught in the crossfire. Read our special report "Who's spying on you?"

Tags : cybersecurity, hackers, virus, malware, phishing, security, internet security, secure network
    
By: Kaspersky     Published Date: Feb 14, 2014

Whether they are working in your headquarters, a home office, or on the road, employees, partners, and vendors need to have confidential data at their fingertips to conduct business effectively. The likelihood of this data becoming exposed through unsecured transfers or lost devices is a frightening reality.

Tags : encypt, encryption, secure file transfer, cyber security, cybersecurity, security, it protection, kaspersky
    
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection".

Tags : business protection, data protection, business security, it security, business continuity, database security, secure content management
    
By: IBM     Published Date: Jan 02, 2014

"The Cincinnati Zoo & Botanical Garden is one of the nation’s most popular attractions, a Top 10 Zagat-rated Zoo, and a Top Zoo for Children according to Parent’s Magazine. Each year, more than 1.3 million people visit its 71-acre site, which is home to more than 500 animal and 3,000 plant species. Although the Zoo is a non-profit organization and is partially subsidized by Hamilton County, more than two thirds of its $26 million annual budgetis generated through its own fundraising efforts."

Tags : ibm, case study, botanical garden, increase revenues, customer experience, boost sales, effective marketing, effective promotions
    
By: Compass Datacenters     Published Date: Apr 07, 2014

Learn about the central issues that tend to be consistent across all Request for Proposals (RFPs) and see what questions you should be asking in order to maximize the efficiency of your mission critical data center.

Tags : rfp, request for proposal, questions, data centers, compass datacenters, big business, data, business intelligence
    
By: Code 42     Published Date: Mar 20, 2014

Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn't provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data.

Tags : code42 software, endpoint backup, data migration, data loss, data management, data risk, encryption, network security
    
By: Rapid7     Published Date: Mar 19, 2014

This paper discusses reasons why visibility is so essential, and outlines how you can use visibility beyond and within the firewall to develop policies and processes that protect what you can’t control.

Tags : rapid7, security, cloud security, firewall, mobile applications, social applications, social media, protection
    
By: Rapid7     Published Date: Mar 19, 2014

In this guide, penetration testers will learn how to evade anti-virus detection on target machines for your Metasploit pen tests. This guide will be most useful to readers who already have some penetration testing experience and are familiar with Metasploit Pro.

Tags : rapid7, security, anti virus, virus protection, antivirus, spam, hackers, internet security
    
By: Arbor Networks     Published Date: Mar 13, 2014

With cloud computing’s paradigm of shared infrastructure, DDoS attacks on a specific target can quickly affect many or all tenants. In this Arbor Insight, we explain why availability should be the top priority for cloud operators, and outlines best current practices for preventing and mitigating attacks.

Tags : arbor, arbor networks, network security, ddos, cloud computing, cloud security, online attacks, hackers
    
By: Webroot Inc     Published Date: Mar 05, 2014

In this white paper we will summarize the decline of Phishing 1.0, discuss how phishing has turned toward business and become more costly, outline the structure of new Phishing 2.0 attacks, delineate how the new campaigns evade standard antiphishing countermeasures, and describe how web security services with real-time antiphishing capabilities can protect against Phishing 2.0 attacks.

Tags : phishing, campaigns, antiphishing, security, social media, malware, block, network
    
By: Adobe     Published Date: Mar 05, 2014

Adobe has an exceptional understanding of, and a vision for, campaign management technology. We’ve drawn from our experience to create this document to help you better differentiate the myriad of solutions on the market. This guide provides a comprehensive list of questions and criteria to help companies evaluate campaign management solutions

Tags : adobe, technology, marketing, cmo, campaign management, customer, data, solutions
    
By: FireEye     Published Date: Feb 28, 2014

Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.

Tags : fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature, combatting advanced attacks, cohesive threat vectors, correlated threat vectors
    
By: Dell Software     Published Date: Feb 19, 2014

In an ever-changing world, DBAs are managing more complex, business-critical systems. With demands of high performance and around-the-clock uptime, how can they keep providing maximum service levels? Advanced performance management is the answer. Learn more – read this Dell Software white paper.

Tags : oracle performance, dbas, database management, database performance, advanced performance, maximum service levels, software, database development
    
By: Dell Software     Published Date: Feb 19, 2014

Go beyond one-dimensional virtual machine performance. Foglight for Virtualization helps you visualize, analyze and optimize your entire virtual infrastructure health. In this technical brief, learn how Foglight simplifies cross-platform database performance monitoring and management. Read it today.

Tags : database infrastructure, key business metrics, dba challenges, database management, database monitoring, best practices, database development, data protection
    
By: Dell Software     Published Date: Feb 19, 2014

In "Proactive Performance Management for Enterprise Databases," read about the inherent challenges of proactive database management, and what to look for when choosing the right management tool for your company. Get this white paper today.

Tags : database infrastructure, key business metrics, dba challenges, database management, database monitoring, best practices, database development, data protection
    
By: QTS     Published Date: Feb 18, 2014

The cloud has been beneficial to many IT departments by enabling quicker responses to the fast-moving market and ever-changing customer needs. So when is your business migrating over?

Tags : qts, the cloud, migrating, integration, technology, it departments, migration, it leaders
    
By: Lumension     Published Date: Feb 07, 2014

In this best practice guide, we are going to take a deep dive into a best practice process for patch and vulnerability management, developed by Lumension over thousands of customer engagements.

Tags : lumension, agent maintenance, value and risk, patch management, microsoft’s patch tuesday, it tasks, remediation process, endpoint management and security suite
    
By: Lumension     Published Date: Feb 07, 2014

Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.

Tags : lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
    
By: Lumension     Published Date: Feb 07, 2014

Memory injections are on the rise. And traditional endpoint security tools can do little to stop them. Here’s what you need to know about memory-based attacks—and how to effectively protect against them.

Tags : lumension, persistent threats, memory-based attacks, information security, it regimes, threat solution, risk mitigation, data security products
    
By: McAfee     Published Date: Jan 22, 2014

Leading analyst firm Gartner has positioned McAfee as a Leader in the Gartner Magic Quadrant for Endpoint Protection Platforms for six consecutive years.

Tags : mcafee, gartner, endpoint protection, network security, application security, email security, hacker detection, intrusion prevention
    
By: CA Technologies     Published Date: Jan 06, 2014

Why should organizations take insider threats seriously? Because the stakes have never been higher, especially given the value enterprises place on intellectual capital and trade secrets.

Tags : mediacom, insider threats, substantial threats, bladley manning, edward snowden, malicious insiders, exploited insiders, sensitive information
    
By: CA Technologies     Published Date: Jan 06, 2014

This report presents new research into the use and benefits of IAM and the relationship it has with these three drivers. The research is based on over three hundred interviews with senior IT managers in medium sized to large organisations in a range of business sectors across Europe. The report should be of interest to anyone wanting to better serve all types of users, whilst still keeping control over applications and data.

Tags : mediacom, digital identities, open business, business growth, access management, identity management, iam, open interaction
    
By: Cisco Systems     Published Date: Dec 23, 2013

Faced with trends like cloud and the rapid rise of mobile devices, IT needs a new, simpler model of building networks to support and optimize applications. In this Lippis Report, learn how the Cisco ISR Application Experience Router helps you improve application speed, security, and control. Read Now

Tags : cisco, lippis, centric networking, cloud computing, network engineers, bandwidth, wan, wide area networks
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End