Data Protection White Papers

Continuous data protection (CDP), also called continuous backup, refers to backup of computer data by automatically saving a copy of every change made to that data, essentially capturing every version of the data that the user saves. It allows the user or administrator to restore data to any point in time.
Results 1 - 25 of 760Sort Results By: Published Date | Title | Company Name
By: Google     Published Date: Aug 20, 2015

This white paper examines the role of IT in the new landscape, offering insights from IT and businesses that have leveraged Google Apps for Work to empower employees with collaboration tools they know and love while providing robust security and controls that protect data.

Tags : shadow it, tools for employees, keep your company safe, security risks, minimising risk, google apps for work, collaboration tools for employees, google apps for your team
    
By: Google     Published Date: Aug 20, 2015

Ce livre blanc étudie le rôle des services informatiques dans ce nouveau paysage. Il présente également l'expérience vécue par des équipes informatiques et entreprises qui sont passées à Google Apps for Work pour permettre à leurs collaborateurs d'utiliser les outils qu'ils connaissent et apprécient, tout en offrant un niveau de sécurité élevé et des dispositifs de protection des données.

Tags : shadow it, tools for employees, keep your company safe, security risks, minimising risk, google apps for work, collaboration tools for employees, google apps for your team
    
By: NetApp     Published Date: Aug 14, 2015

Evolve integrated and converged infrastructure.

Tags : infrastructure, converged, cloud computing, data center, business intelligence, data protection
    
By: EMC     Published Date: Aug 04, 2015

Understand how Vidant Health System transforms health IT strategy and accelerates meaningful use of Epic EHR with EMC XtremIO

Tags : vidant health system, multiple emc solutions, business operations, it storage infrastructure, storage transformation, it initiatives, storage management, security management
    
By: Adobe     Published Date: Aug 04, 2015

Learn how e-signatures remove the last barrier between a hybrid paper to digital workflow to an all-electronic process, dramatically accelerating closure in any type of transaction that requires a contract.

Tags : electronic signatures, digital signatures, paper to digital, business intelligence, database, e-signatures, online signatures, authentication
    
By: Vectra Networks     Published Date: Aug 03, 2015

Protect against advanced attacks.

Tags : threat, data, security, it management, budget, firewall, intrusion detection, intrusion prevention
    
By: Vectra Networks     Published Date: Aug 03, 2015

Protect prominent securities.

Tags : firewall, intrusion detection, intrusion prevention, ips, ids, advanced persistent threat, apt, identity management
    
By: Vectra Networks     Published Date: Aug 03, 2015

The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.

Tags : malware, data, malware, banking, malware sandbox, authentication, two-factor authentication, identity management
    
By: Vectra Networks     Published Date: Aug 03, 2015

Recent research from Kaspersky has revealed a massive criminal campaign that was able to infiltrate more than 100 different banks and steal upwards of $1 billion from the affected institutions. Kaspersky dubbed this operation the Carbanak APT due to a connection between the malware used in the attacks and the now infamous Carberp banking botnet. You may recall the headlines in 2013 that revealed the Carberp source code had been leaked into the wild, making it accessible to virtually any would-be criminal group that may want it. The accessibility of Carberp source code could easily have provided a starting point for the Carbanak as they built their malware.

Tags : threat, data, security, it management, malware, banking, cyber theft, remote access tool
    
By: EMC     Published Date: Aug 03, 2015

The infographic provide leading analyst insights on the all-flash array market and how innovation accelerators are driving the agile data center through high data growth and the need for increased scalability and performance.

Tags : innovation, industry, data center, data growth, scalability, business intelligence, database development, data protection
    
By: Venafi     Published Date: Jul 27, 2015

Learn how security professionals responded about the risk and impact to enterprises from attacks on keys and certificates.

Tags : cybersecurity, keys, certificates, cyber attacks, server certificate misuse, code-signing certificate misuse, ssh key misuse, cryptographic misuse
    
By: Simplivity     Published Date: Jul 02, 2015

SimpliVity’s solution is a great fit for today’s midmarket data center. This hyperconverged infrastructure simplifies an otherwise complex system that would require frequent maintenance and upgrades. SimpliVity offers an affordable solution that addresses major challenges of midmarket I&O teams.

Tags : hyperconvergence, midmarket, virtualization, deduplication, compression, optimization, data management, data protection
    
By: Simplivity     Published Date: Jul 02, 2015

ActualTech Media and SimpliVity have partnered to create a new report that presents data from surveyed IT professionals and their experiences with hyperconverged infrastructure. The report defines Hyperconvergence and outlines the future of the industry.

Tags : hyperconvergence, robo, market report, storage, disaster recovery, operational efficiency, high it costs, data protection
    
By: Tricentis     Published Date: Jun 22, 2015

This paper reveals how Tosca Testsuite assists enterprises in optimising test portfolios by minimising the number of test cases needed to achieve the highest possible business risk coverage.

Tags : testing, tosca testsuit, test, sap, test portfolios, technology support, sap interfaces, technology
    
By: Tricentis     Published Date: Jun 22, 2015

This paper reveals the reason why people love E2E tests.

Tags : end to end testing, testing, test, e2e testing, manual testing, it landscapes, test environment, e2e tests
    
By: Tricentis     Published Date: Jun 22, 2015

Read this paper to find out how Tosca Testsuite can help you to lower the maintenance effort of your test data and operating costs of your test environment while building an efficient test data management strategy.

Tags : data management, tosca testsuit, test data, test data management strategy, testing, test, test and measurement, database development
    
By: Kaspersky     Published Date: Jun 15, 2015

Download Kaspersky Lab’s “Endpoint Security for Business: Technology in Action” to learn about threats you can see and those you can’t.

Tags : kaspersky, endpoint security, threats, threat management, data protection, network security, email security, hacker detection
    
By: Kaspersky     Published Date: Jun 15, 2015

Download Kaspersky Lab’s Unlock the Key to Repel Ransomware to learn common ransomware scenarios and delivery mechanisms.

Tags : kaspersky, ransomware, cybercrime, cyberattack, hackers, data leakage, spam, malware
    
By: Mimecast     Published Date: May 27, 2015

White Paper: 4 Critical Risks Facing Microsoft Office 365 Implementations Migrating to Microsoft® Office 365™ has its risks. In this white paper you’ll learn how to keep email working if Office 365 is offline. Protect critical data with an independent cloud backup. Combat insidious threats to email security. And streamline migration while containing costs.

Tags : mimecast, migration, microsoft office 365, storage, cloud backup, security, it management, data protection
    
By: Seagate Technology     Published Date: May 15, 2015

This paper is the first to explore a recent breakthrough with the introduction of the High Performance Computing (HPC) industry’s first Intelligence Community Directive (ICD) 503 (DCID 6/3 PL4) certified compliant and secure scale-out parallel file system solution.

Tags : multi level security, big data, hpc scale, hpc, high performance comptuting, secure data appliance, mls, multi level security
    
By: Kaspersky     Published Date: May 11, 2015

Cybersecurity is not a numbers game. When it only takes a single breach to inflict serious damage on your business, defending against the majority of attacks isn’t enough.

Tags : kaspersky, cybersecurity, mitigation, online attacks, cyberattack, threat, threat protection, network security
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End