Data Protection White Papers

Continuous data protection (CDP), also called continuous backup, refers to backup of computer data by automatically saving a copy of every change made to that data, essentially capturing every version of the data that the user saves. It allows the user or administrator to restore data to any point in time.
Results 1 - 25 of 627Sort Results By: Published Date | Title | Company Name
By: Lenovo     Published Date: Sep 16, 2014

Renewed interest in Virtualized Desktop Infrastructure (VDI) comes largely from the need to solve mobility and BYOD demands. Though traditional VDI vendors bring their own solutions to market, is it time to consider smarter alternatives? By focusing on where VDI excels, where it falls short, and where web and cloud services are most compatible, agencies can take a smarter approach to these difficult decisions. Understand the tradeoffs, and learn why more agencies are taking notice to emerging web technologies through this executive summary.

Tags : vdi, cloud alternatives, byod demands, emerging web technologies, business intelligence, data protection, database security, productivity
    
By: EMC     Published Date: Sep 11, 2014

This paper outlines the top reasons for entry level storage and data protection from EMC, focusing on VNXe3200 and Data Domain DD2200 products.

Tags : data storage, entry level data storage, data protection, emc, backup and recovery, network attached storage, storage area networks, storage management
    
By: EMC     Published Date: Sep 11, 2014

This paper focuses on Data Domain Boost and the many benefits it provides compared to doing traditional backups. Its purpose is to explain the technical and business reasons why DD Boost will change the way you do backups.

Tags : data domain boost, ddb, backups, data protection, data backup, benefits of ddb, emc, backup and recovery
    
By: EMC     Published Date: Sep 11, 2014

This paper focuses on Data Domain technology leadership and differentiation and why it matters to you. The purpose of this paper is to explore the technical and financial reasons why Data Domain systems are ideal for backup and archiving in your environment.

Tags : data domain technology, benefits of data domain, backup and archiving emc, backup and recovery, storage management, storage virtualization, data protection, database security
    
By: Delphix     Published Date: Sep 10, 2014

Most data masking products can create masked data copies but not distribute or update them, resulting in projects that fail to live up to expectations. Learn why Delphix’s Agile Masking solution is the only product that solves both masked data creation and delivery challenges.

Tags : secure data, digitization, data breaches, privacy regulations, sensitive data, internal, customer information, application landscapes
    
By: McAfee     Published Date: Sep 04, 2014

Sepa cómo gestionar el riesgo hoy significa comprender más los datos: análisis de vulnerabilidad, registros de aplicaciones y bases de datos, flujos, registros de acceso y sesiones, alertas y análisis de tendencias.

Tags : arquitectura de seguridad conectada, big security data, big data, administración de registros, administración de logs, siem, seguridad, security
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper debunks 7 virtualization DR myths

Tags : virtualization myths, disaster recovery, back up, high availability, virtual servers, data protection, backup and recovery, clustering
    
By: Fireblade     Published Date: Aug 21, 2014

Fireblade has developed an innovative behavioral approach to website security. It inspects users’ behavior and interactions with and relays the aggregated information to a central cloud, where a continual, real-time risk assessment process uses big data to discern legitimate users from attackers and abusers. Download this whitepaper to learn about this new approach.

Tags : fireblade, web application security, cloud security, interactions, cloud computing, hackers, attackers, cyberattack
    
By: IBM     Published Date: Aug 08, 2014

As executives witness data’s proven impact on performance and innovation and recognize its strategic significance, they also realize the growing need for a leader whose primary role is to understand and advocate on behalf of data: The Chief Data Officer.

Tags : big data, analytics, technology, chief data officer, business intelligence, data integration, data protection, data quality
    
By: IBM     Published Date: Jul 22, 2014

Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core application and remote sites.

Tags : ibm, storage, back up, recovery, cost reduction, data, it environments, data protection
    
By: IBM     Published Date: Jul 22, 2014

Join this session to learn how you can quickly convert existing storage to Cloud storage, standardize advanced data protection capabilities, and utilize advanced data-driven analytics to optimize tiering across storage systems --- reducing per unit storage costs up to 50% and freeing up valuable IT budget.

Tags : ibm, cloud, cloud storage, storage, storage environment efficiency, environment efficiency, data protection, data driven analytics
    
By: HP     Published Date: Jun 27, 2014

Following a series of in-depth interviews with Senior IT professionals in various industries this video provides their findings and the direct and in-direct value derived from using HPs Backup, Recovery and Archiving solutions.

Tags : backup, recovery and archiving, hp solutions, storage, backup and recovery, storage area networks, storage management, storage virtualization
    
By: HP     Published Date: Jun 25, 2014

An HP commissioned Forrester survey on the storage requirements of IT hardware decision-makers in North America and Europe.

Tags : intel, storage capabilities, storage infrastructure, storage capacity, storage requirements, backup and recovery, storage management, storage virtualization
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

The Application Usage And Threat Report provides an analysis of applications and their link to cyber threats within the enterprise. The report summarizes network traffic assessments performed worldwide in more than 5,500 organizations where 2,100 applications, 16,000 unique threats and billions of threat logs were observed.

Tags : palo alto, application security, security, cyberattack, hackers, cybercrime, online threat, internet security
    
By: Palo Alto Networks     Published Date: Jun 19, 2014

APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.

Tags : palo alto, cybersecurity, ebook, internet security, cyberattack, cybercrime, network security, hackers
    
By: HP     Published Date: Jun 09, 2014

HP Records Managed Services - An HP Information Governance Service.

Tags : record management, records managed services, information governance service, storage management, analytical applications, data protection
    
By: HP     Published Date: Jun 09, 2014

A brochure on the challenges addressed by HP Records Manager.

Tags : records manager, edrm, backup and recovery, storage virtualization, data protection, data warehousing
    
By: HP     Published Date: Jun 09, 2014

A Viewpoint paper on HP Information governance

Tags : information governance, information storage, backup and recovery, storage management, storage virtualization, data protection, database security, data warehousing
    
By: Sitecore     Published Date: May 22, 2014

Be an IT hero. Save the day with connected customer data. Get your Data Apocalypse White Paper here

Tags : database development, data protection, productivity
    
By: SilverSky     Published Date: May 22, 2014

Companies today are able to focus more time on their core competencies by trusting email and other resource-intensive activities to experts in the cloud. Thinking of moving services to the cloud? Read SilverSky’s comprehensive list of things to consider when evaluating cloud-based email solutions.

Tags : silversky, ibm, cloud, cloud-based email, cloud business email, email service, email solutions, cloud based email solutions
    
By: Kaspersky     Published Date: May 20, 2014

Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.

Tags : virtualization, kaspersky, virtualization security, cyberthreat, hackers, phishing, security breach, intrusion prevention
    
By: EarthLink Business     Published Date: May 15, 2014

This paper covers the latest security trends, reinforces best practices in securing a cloud infrastructure, and outlines how best to meet compliance requirements (e.g., PCI, HIPAA).

Tags : earthlink, cloud infrastructure, cloud computing, midsize businesses, cloud security, mobile security, workforce collaboration, earthlink
    
By: EarthLink Business     Published Date: May 15, 2014

This white paper underscores why it’s critical for SMEs to protect all endpoints – not just mobile devices – in the operating environment. It also explains the challenges of applying stringent security across all endpoints and balancing that with convenience and ease-of-use for employees.

Tags : earthlink, smb, small business, medium business, sme, endpoint security, mobile security, mobile workers
    
By: Citrix     Published Date: May 08, 2014

A report into the need for datacenter security and how Citrix NetScaler is the solution.

Tags : datacenter security, netscaler, citrix, defense, access control, application security, ddos, internet security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End