Data Protection White Papers

Continuous data protection (CDP), also called continuous backup, refers to backup of computer data by automatically saving a copy of every change made to that data, essentially capturing every version of the data that the user saves. It allows the user or administrator to restore data to any point in time.
Results 1 - 25 of 684Sort Results By: Published Date | Title | Company Name
By: F5 Networks Inc     Published Date: Feb 18, 2015

As a website building service for consumers, Weebly is often the target of DDoS attacks. Previously they mitigated attacks through an internally built security infrastructure but the increasing scale and complexity of DDoS attacks had the company evaluating secondary protection. Learn how Weebly is well protected from DDoS threats of all sizes and complexities after incorporating an added layer of protection and resulting uninterrupted DDoS mitigation and analysis.

Tags : ddos attacks, ddos protection, ddos solutions, mitgation, security, it management, business intelligence, data protection
    
By: IBM     Published Date: Feb 11, 2015

A number of network security technologies have arisen that claim to be the "next generation" of network defense - but what does this concept actually mean? How is the threat landscape changing the way we think about and deploy network security solutions? Scott Crawford, Managing Research Director, Security and Risk Management at EMA Research provides insight into what we can expect in the area of network security and how to leverage new technologies to meet today's security challenges in light of other considerations such as overall complexity and performance.

Tags : network security, threat landscape, network security solutions, network defense, security challenges, security, it management, data protection
    
By: IBM     Published Date: Feb 11, 2015

This white paper explains how organizations can use behavior-based protection strategies to help disrupt malicious attacks in real time. It looks at how integrated, intelligent solutions from IBM can detect and help prevent threats - from the network perimeter to remote endpoints.

Tags : behavior-based protection strategies, remote endpoints, ibm, network perimeter, vulnerability decodes, security, best practices, business intelligence
    
By: IBM     Published Date: Feb 11, 2015

Access the latest Gartner Magic Quadrant for Intrusion Prevention Systems to learn more about IBM's position and the latest developments in the market.

Tags : intrusion prevention, ibm, appliance market, ips, network traffic, security, it management, data protection
    
By: IBM     Published Date: Feb 11, 2015

IBM has been positioned again in the Leaders quadrant of the Gartner Magic Quadrant for Application Security.

Tags : application security testing, application security, ibm, iast, binary code, security, it management, business intelligence
    
By: IBM     Published Date: Feb 11, 2015

Strengthen application protection—from design to deployment—to proactively address cloud security risks.

Tags : cloud environment, web application, cloud-based security, ibm, ibm security, security, it management, business intelligence
    
By: Entrust     Published Date: Jan 16, 2015

With every new data breach revealed or costly identity-theft case reported, confidence in data security and the protection of private identity information transactions — and overall trust — erodes. This loss of confidence in online services and reputation can have a direct impact on trust from end-users, customers, employees, partners, vendors and more. With significant advances in criminal threats — both in sophistication and sheer frequency — all enterprises are urged to bolster defenses, authenticate digital identities and safeguard sensitive information. Entrust offers five specific best practices — with emphasis on strong authentication, identity assurance, mobile enablement and general layered security — that can help protect against targeted attacks now and over the long term.

Tags : entrust, server, risk, assessment, authentication, standards, layered, authentication
    
By: CDW     Published Date: Feb 24, 2015

Learn how software asset management can play the crucial role of cataloging and managing the myriad of software elements that could possibly pose a threat to network security at your enterprise.

Tags : software asset management, network security, licensing, cloud-based apps, licensing security, security management strategies, application security, security management
    
By: CDW     Published Date: Feb 24, 2015

This interactive guide offers a variety of technological insights in order to manage and familiarize your company with CDW's total software management.

Tags : software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
By: CDW     Published Date: Feb 24, 2015

Software asset management (SAM) solutions promise to fix all that. They present a set of tools, practices and processes that take the uncertainty out of software licensing and enable organizations to fully optimize software inventories.

Tags : software license, software compliance, software asset management, sam, strategic license management, cloud-based services, virtualization, network security
    
By: McAfee     Published Date: Feb 23, 2015

This report reveals the key steps organizations can take to harden their infrastructure, improve their responsiveness, and actively disrupt targeted attacks by paying attention IoAs.

Tags : security information, security connected framework, big security data, big data, log management, cyber-attacks, hackers, reference archecture
    
By: McAfee     Published Date: Feb 23, 2015

This White Paper illustrates a magic quadrant analysis including vendors that have technologies designed for SIEM purposes.

Tags : gartner, magic quadrant, security connected framework, big security data, big data, log management, siem, security information
    
By: McAfee     Published Date: Feb 23, 2015

This paper reveals how cloud and compliance could be in one thanks to McAfee Enterprise Security Manager.

Tags : security information, security connected framework, big security data, big data, log management, siem, security event management, application security
    
By: Juniper Networks     Published Date: Feb 18, 2015

The 5 Steps to Firewall Planning and Design Guide provides a step-by-step summary for planning your network firewall. It also contains links to the more detailed guide containing other useful sites and publications on the subject. If you’re designing your company’s firewall architecture, read this first.

Tags : firewall planning, network firewall, security policy, http, terminal server, network, network security, data protection
    
By: Juniper Networks     Published Date: Feb 18, 2015

To understand why an open, scalable network architecture is essential for enhanced IT security in the cloud era, get our eBook. Read how to safeguard virtual and physical workloads & get always-on protection to reduce vulnerabilities.

Tags : juniper, juniper networks, security, network security, firewalls, intrusion prevention, security management, data protection
    
By: Juniper Networks     Published Date: Feb 18, 2015

Discover how a dynamic, intelligent firewall can improve your security with our Webinar. Learn about the dynamic, intelligent protection and active defense and management of resources you can get from a Next-Generation Firewall.

Tags : firewall, network, business assets, security, management, network security, firewalls, security management
    
By: Juniper Networks     Published Date: Feb 18, 2015

To understand how virtualization can help you move seamlessly to a private cloud, watch the Webinar. Understand the challenges Tribune Broadcasting had to solve to achieve, a smooth transition to high-performance, scalable private cloud.

Tags : private cloud, juniper, cloud computing, virtualization, infrastructure, network management, network performance, database development
    
By: Juniper Networks     Published Date: Feb 18, 2015

To learn all about the new dynamically intelligent solutions that are taking security to the next level, watch our webinar where experts explain how to protect clouds from new threats as they evolve.

Tags : cloud, cybercrime, security intelligence, security, security tool, data center, security management, data protection
    
By: IBM     Published Date: Feb 11, 2015

IBM Security offerings can help federal organizations employ a continuous diagnostics and mitigation approach to enhance and automate continuous network monitoring capabilities; correlate and analyze critical data; and increase risk-based decision-making at the federal enterprise level.

Tags : ibm, ibm security, continuous diagnostics, network monitoring capabilities, risk-based decision-making, security, it management, best practices
    
By: IBM     Published Date: Feb 11, 2015

As cloud computing gains more traction, more businesses are beginning to align their security strategy to better manage the privacy and compliance challenges of this new deployment model. Indeed, cloud models are being used not only to add compute and storage resources, they are also becoming an imperative for data analytics and mobility. In this paper, we will look at how the growing adoption of cloud computing is changing the way organizations are implementing security.

Tags : security strategies, ibm, deployment model, cloud security, data analytics, security, business analytics, data protection
    
By: IBM     Published Date: Feb 11, 2015

In this analyst report, EMA compare IBM Security QRadar Incident Forensics vs other industry tool and shows why IBM scored the highest overall rating with a score of 3.92.

Tags : data capture, network forensices, ibm, incident forensics, it security tools, security, it management, enterprise applications
    
By: IBM     Published Date: Feb 11, 2015

This paper explores how companies can more safely introduce employee - or corporate-owned mobile devices into the workplace, identify the risks inherent in their broader access to corporate data, and derive enhanced business value.

Tags : corporate data, business value, mobile devices, client services, security, it management, business intelligence, data protection
    
By: IBM     Published Date: Feb 11, 2015

Securely connect people, applications and devices to cloud environments. While organizations build their cloud environment by choosing from multiple service delivery models – Infrastructure as a Service (IaaS), Platform as a Service (PaaS) and Software as a Service (SaaS) – the security needs for each of the delivery models is different. Read this whitepaper to learn more about how: · Threat-aware identity and access management can strengthen security in each of the cloud delivery models · Self-service IAM solution can provide higher level of Security in Cloud as compared to on-premise

Tags : cloud environment, iaas, paas, saas, access management, security, it management, data protection
    
By: IBM     Published Date: Feb 11, 2015

Maintain visibility and control with proven security solutions for public, private and hybrid clouds IBM Security solutions provide layered protection and deep insight across public, private and hybrid cloud environments. They help organizations manage user identities, protect data and applications, and prevent sophisticated attacks with advanced analytics.

Tags : security solutions, layered protection, protect data, advanced analytics, ibm, security, it management, business intelligence
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End