High Availability White Papers

High Availability is a system design protocol and associated implementation that ensures a certain absolute degree of operational continuity during a given measurement period.
Results 1 - 25 of 183Sort Results By: Published Date | Title | Company Name
By: F5 Networks Inc     Published Date: Oct 31, 2013

This whitepaper utilizes end-user interviews to better understand their DDoS defense plans, where they discovered a clear knowledge gap around the Denial of Service attacks in use and the defenses needed to maintain availability. The paper provides detail on the attacks in use, suggests realistic defensive architectures and tactics and explains the basic process required to have a chance of defending against a DDoS attack.

Tags : denial of service, distributed denial of service, ddos, ddos attacks, denial of service attacks, security, availability, defensive
    
By: Adlib Software     Published Date: Jan 13, 2014

Welcome to the future of 24/7, any-time, anywhere access to digital content - where dynamic publishing solutions are the mantra. Unfortunately most large organizations aren't ready for this brave new world of digital content distribution remaining woefully unsearchable while languishing behind departmental silos. This whitepaper explores how your organization can leverage rapid digital content consumption as a key to business intelligence.

Tags : content marketing, content management, enterprise content management, publishing, data, content transformation, document transformation, document conversion
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: EMC     Published Date: Apr 18, 2013

The RSA business continuity white paper, BCM Regulatory Soup, will help you address: Which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.

Tags : rsa, business continuity, disaster recovery, bcm, regulatory, compliance, anti spam, anti spyware
    
By: EMC     Published Date: Apr 18, 2013

See for yourself how easy it is to implement RSA Archer Business Continuity Management & Operations right out of the box. Try it free for 30 days, then take advantage of the special purchase offer through 7/31/13.

Tags : business continuity, disaster recovery, encryption, hacker detection, high availability, identity management, internet security, intrusion detection
    
By: SilverSky     Published Date: Apr 16, 2013

Threats to the security of your network will never completely go away, but the ability to prepare for, recognize and quickly remediate these threats should be a part of day-to-day company operations. This white paper gives you eight essentials for managing vulnerabilities in a network including internal and external assessments, how frequently you should run scans for threats and the importance of broadening testing beyond basic network services and operating systems.

Tags : vulnerability management, security, threat management, security, assessment, anti spam, anti spyware, anti virus
    
By: Kaseya     Published Date: Apr 04, 2013

A complete and holistic solution can help organizations create system snapshots that can be restored quickly and efficiently, getting users back up and productive immediately.

Tags : disaster recovery, backup, business continuity, virtualization, security, rto, rpo, sla
    
By: Kaseya     Published Date: Apr 04, 2013

A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.

Tags : it security, anti-virus, vulnerability management, intrusion prevention, access control, anti spam, anti spyware, anti virus
    
By: Symantec     Published Date: Apr 04, 2013

This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.

Tags : malware, anti-virus, spyware, scareware, anti-malware, cyber criminals, code signing, security
    
By: Symantec     Published Date: Apr 04, 2013

How Code Signing Can Bolster Security for Mobile Applications

Tags : code signing, mobile, apps, applications, mobile applications, hacking, cyber criminals, mobile security
    
By: Symantec     Published Date: Apr 04, 2013

Stuxnet, a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?

Tags : code signing, cyber attack, anti-virus, intrusion prevention, private keys, asset protection, security, access control
    
By: Symantec     Published Date: Apr 04, 2013

In this business guide, we discuss how the latest code signing technology works to secure software code and content for applications that are directly downloaded to mobile devices from the Internet.

Tags : code signing, mobile, apps, applications, mobile applications, hacking, cyber criminals, mobile security
    
By: Oracle Corporation     Published Date: Apr 01, 2013

Discover how to accelerate database performance, handle change and growth in scalable, incremental steps, and deliver mission-critical data availability and protection with this unique commercial solution.

Tags : database, oracle, storage, data, data warehousing, high availability, database development, data protection
    
By: Oracle Corporation     Published Date: Apr 01, 2013

This paper focuses on configuring Oracle GoldenGate to run on Oracle Exadata. The Oracle Exadata Database Machine can act as the source database, as the target database, or in some cases as both source and target databases for GoldenGate processing.

Tags : database, goldengate, oracle, maximum availability architecture, arcitecture, high availability, configuration management, database development
    
By: TIBCO     Published Date: Mar 27, 2013

What are some of the pitfalls you can avoid when augmenting an existing infrastructure to maximize performance, results, and success? Read on.

Tags : integration, infrastrucutre, performance, enterprise, high availability, application integration, application performance management, best practices
    
By: McAfee     Published Date: Mar 08, 2013

McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.

Tags : database security, database vulnerability manager, database compliance, mysql security, database password security, sql injection, buffer overflow, insecure sql code
    
By: McAfee     Published Date: Mar 07, 2013

McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.

Tags : database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit, database regulatory compliance, database vulnerability management, database vulnerabilities
    
By: Bit9     Published Date: Mar 07, 2013

Download this white paper and learn how to use a progressive, three-step approach to build trust, monitor activity and tailor protection to your enterprise and build an adaptive application control framework.

Tags : security, risk management, roi, cost reduction, enterprise, cyber threat, anti spam, anti spyware
    
By: Bit9     Published Date: Mar 07, 2013

In this whitepaper, Industry Analyst Frost and Sullivan examines today’s advanced threat landscape and recommends that organizations adopt a new approach to server security that is based on trust.

Tags : data breaches, data center, security, cyber threats, server, business continuity, access control, anti spam
    
By: Arbor     Published Date: Mar 06, 2013

Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.

Tags : ddos, market trends, infonetics, ddos prevention, arbor networks, security, network, intrusion prevention
    
By: Arbor     Published Date: Mar 06, 2013

This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches.

Tags : cyber threats, security, ddos, data breaches, atlas, frost & sullivan, cloud, hosting
    
By: EMC Corporation     Published Date: Mar 06, 2013

This technology profile examines how IT decision makers’ expectations and approaches are evolving to address increasing demands for higher levels of IT availability from their organizations and clients.

Tags : high availability, continuous availability, business continuity, risk management, data center, access control, vulnerability management, virtualization
    
By: Silver Peak     Published Date: Feb 12, 2013

An optimized WAN environment can increase network reliability and availability and improve cost profiles. It also improves the performance and reliability of data backup, replication, and recovery processes.

Tags : virtualization, wan, optimization, data center, network, reliability, high availability, business continuity
    
By: Tripwire     Published Date: Feb 08, 2013

It’s no small feat to balance access to data to meet business goals with protecting that very same data from hackers.

Tags : high availability, cloud, security, hacker detection, intrusion prevention, anti spam, anti spyware, anti virus
    
By: HP - Intel®     Published Date: Oct 08, 2012

Genesee Community College uses HP Converged Infrastructure technologies to enrich services, speed time to value and deliver significant savings.

Tags : high availability, converged infrastructure, it infrastructure, servers, blade servers, virtualization
    
Start   Previous   1 2 3 4 5 6 7 8    Next    End