Data Protection

Continuous data protection (CDP), also called continuous backup, refers to backup of computer data by automatically saving a copy of every change made to that data, essentially capturing every version of the data that the user saves. It allows the user or administrator to restore data to any point in time.
Results 251 - 275 of 826Sort Results By: Published Date | Title | Company Name
White Paper Published By: Palo Alto Networks     Published Date: Jun 19, 2014
APTs (advanced persistent threats) have changed the world of enterprise security and how networks and organizations are attacked. This book provides an in-depth examination of real-world attacks and APTs, the shortcomings of legacy security solutions, the capabilities of next-generation firewalls, and security best practices.
Tags : 
palo alto, cybersecurity, ebook, internet security, cyberattack
    
Palo Alto Networks
White Paper Published By: HP     Published Date: Jun 09, 2014
HP Records Managed Services - An HP Information Governance Service.
Tags : 
record management, records managed services, information governance service, storage management, analytical applications
    
HP
White Paper Published By: HP     Published Date: Jun 09, 2014
A brochure on the challenges addressed by HP Records Manager.
Tags : 
records manager, edrm, backup and recovery, storage virtualization, data protection
    
HP
White Paper Published By: HP     Published Date: Jun 09, 2014
A Viewpoint paper on HP Information governance
Tags : 
information governance, information storage, backup and recovery, storage management, storage virtualization
    
HP
White Paper Published By: SilverSky     Published Date: May 22, 2014
Companies today are able to focus more time on their core competencies by trusting email and other resource-intensive activities to experts in the cloud. Thinking of moving services to the cloud? Read SilverSky’s comprehensive list of things to consider when evaluating cloud-based email solutions.
Tags : 
silversky, ibm, cloud, cloud-based email, cloud business email
    
SilverSky
White Paper Published By: Kaspersky     Published Date: May 20, 2014
Virtualization promises to boost efficiency and cut costs. Whether you’re running applications on physical or virtual machines, you still need to stay vigilant to guard against the constant and growing hazard of malware and other cyberthreats that can put your business at risk. This guide will show you how.
Tags : 
virtualization, kaspersky, virtualization security, cyberthreat, hackers
    
Kaspersky
White Paper Published By: EarthLink Business     Published Date: May 15, 2014
This paper covers the latest security trends, reinforces best practices in securing a cloud infrastructure, and outlines how best to meet compliance requirements (e.g., PCI, HIPAA).
Tags : 
earthlink, cloud infrastructure, cloud computing, midsize businesses, cloud security
    
EarthLink Business
White Paper Published By: EarthLink Business     Published Date: May 15, 2014
This white paper underscores why it’s critical for SMEs to protect all endpoints – not just mobile devices – in the operating environment. It also explains the challenges of applying stringent security across all endpoints and balancing that with convenience and ease-of-use for employees.
Tags : 
earthlink, smb, small business, medium business, sme
    
EarthLink Business
White Paper Published By: Citrix     Published Date: May 08, 2014
A report into the need for datacenter security and how Citrix NetScaler is the solution.
Tags : 
datacenter security, netscaler, citrix, defense, access control
    
Citrix
Free Offer Published By: Black Lotus     Published Date: Apr 21, 2014
Newly updated for April 2014 with Q1 attack data, download the latest DDoS Threat Advisory from Black Lotus to learn about the latest threats facing your company.
Tags : 
black lotus, black lotus communications, ddos, denial of service, security threat
    
Black Lotus
White Paper Published By: Citrix     Published Date: Apr 16, 2014
This white paper examines the current DoS landscape and discusses common approaches for dealing with the modern DoS threat.
Tags : 
dos, denial of service, citrix, netscaler, http attacks
    
Citrix
White Paper Published By: Symantec     Published Date: Apr 09, 2014
This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.
Tags : 
symantec, unified data protection, data protection, virtualization security, virtual environment
    
Symantec
White Paper Published By: Compass Datacenters     Published Date: Apr 07, 2014
Learn about the central issues that tend to be consistent across all Request for Proposals (RFPs) and see what questions you should be asking in order to maximize the efficiency of your mission critical data center.
Tags : 
rfp, request for proposal, questions, data centers, compass datacenters
    
Compass Datacenters
White Paper Published By: SilverSky     Published Date: Mar 26, 2014
This white paper includes a comprehensive list of things to consider in evaluating cloud-based email solutions, from the hidden costs of hosting your own, to additional services you might need, as well as what questions to ask your provider.
Tags : 
silversky, cloud based email, cloud, email solutions, security
    
SilverSky
White Paper Published By: Rapid7     Published Date: Mar 19, 2014
This paper discusses reasons why visibility is so essential, and outlines how you can use visibility beyond and within the firewall to develop policies and processes that protect what you can’t control.
Tags : 
rapid7, security, cloud security, firewall, mobile applications
    
Rapid7
White Paper Published By: Rapid7     Published Date: Mar 19, 2014
In this guide, penetration testers will learn how to evade anti-virus detection on target machines for your Metasploit pen tests. This guide will be most useful to readers who already have some penetration testing experience and are familiar with Metasploit Pro.
Tags : 
rapid7, security, anti virus, virus protection, antivirus
    
Rapid7
White Paper Published By: Symantec     Published Date: Mar 14, 2014
This IDC Executive Brief document analyzes the evolving threat landscape and how the use of security intelligence services can help organizations to defend against advanced persistent threats and targeted attacks. Challenges of current security approaches and benefits of security intelligence services will be discussed.
Tags : 
symantec, security intelligence, attacks, cyber attacks, hackers
    
Symantec
White Paper Published By: Symantec     Published Date: Mar 06, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture.
Tags : 
symantec, data protection, backup appliances, backup applications, data protection architecture
    
Symantec
White Paper Published By: Webroot Inc     Published Date: Mar 05, 2014
In this white paper we will summarize the decline of Phishing 1.0, discuss how phishing has turned toward business and become more costly, outline the structure of new Phishing 2.0 attacks, delineate how the new campaigns evade standard antiphishing countermeasures, and describe how web security services with real-time antiphishing capabilities can protect against Phishing 2.0 attacks.
Tags : 
phishing, campaigns, antiphishing, security, social media
    
Webroot Inc
White Paper Published By: Adobe     Published Date: Mar 05, 2014
Adobe has an exceptional understanding of, and a vision for, campaign management technology. We’ve drawn from our experience to create this document to help you better differentiate the myriad of solutions on the market. This guide provides a comprehensive list of questions and criteria to help companies evaluate campaign management solutions
Tags : 
adobe, technology, marketing, cmo, campaign management
    
Adobe
White Paper Published By: FireEye     Published Date: Feb 28, 2014
Today's threat landscape has never been more challenging for federal agencies. Governments face a growing torrent of cyber attacks that are growing increasingly sophisticated, stealthy, and dangerous. Legacy signature-based solutions and file-based sandbox analysis cannot detect these advanced attacks, let alone stop them. Without advanced identification and remediation tools, agencies can go weeks or even months before discovering system breaches - long after the damage is done. This paper outlines: The malware ""kill-chain"" model used in today's advanced attacks; What capabilities federal agencies need to combat advanced threats; A reimagined approach to IT security.
Tags : 
fireeye, persistent threats, advanced attacks, multi-vector, multi-stage nature
    
FireEye
White Paper Published By: Dell Software     Published Date: Feb 19, 2014
In an ever-changing world, DBAs are managing more complex, business-critical systems. With demands of high performance and around-the-clock uptime, how can they keep providing maximum service levels? Advanced performance management is the answer. Learn more – read this Dell Software white paper.
Tags : 
oracle performance, dbas, database management, database performance, advanced performance
    
Dell Software
White Paper Published By: Dell Software     Published Date: Feb 19, 2014
Go beyond one-dimensional virtual machine performance. Foglight for Virtualization helps you visualize, analyze and optimize your entire virtual infrastructure health. In this technical brief, learn how Foglight simplifies cross-platform database performance monitoring and management. Read it today.
Tags : 
database infrastructure, key business metrics, dba challenges, database management, database monitoring
    
Dell Software
White Paper Published By: Dell Software     Published Date: Feb 19, 2014
In "Proactive Performance Management for Enterprise Databases," read about the inherent challenges of proactive database management, and what to look for when choosing the right management tool for your company. Get this white paper today.
Tags : 
database infrastructure, key business metrics, dba challenges, database management, database monitoring
    
Dell Software
White Paper Published By: QTS Data Centers     Published Date: Feb 18, 2014
The cloud has been beneficial to many IT departments by enabling quicker responses to the fast-moving market and ever-changing customer needs. So when is your business migrating over?
Tags : 
qts, the cloud, migrating, integration, technology
    
QTS Data Centers
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Search the Library

Add Research

Get your company's research in the hands of targeted business professionals.