Data Protection

Continuous data protection (CDP), also called continuous backup, refers to backup of computer data by automatically saving a copy of every change made to that data, essentially capturing every version of the data that the user saves. It allows the user or administrator to restore data to any point in time.
Results 326 - 350 of 825Sort Results By: Published Date | Title | Company Name
White Paper Published By: McAfee     Published Date: Nov 14, 2012
Every database, from the largest corporate data store to a small-scale MySQL deployment, contains valuable information. Hackers are as determined as ever, and employee-related abuses are on the rise.
Tags : 
sql, security, database, mcafee, hackers
    
McAfee
White Paper Published By: Symantec     Published Date: Oct 19, 2012
This report from Dennis Technology Labs compares the effectiveness of anti-malware products designed to run in virtual desktop environments. It aims to compare the effectiveness of current anti-malware software. Read on to figure out which ran best.
Tags : 
virual environments, symantec, data security, malware, anti-malware products
    
Symantec
White Paper Published By: Trend Micro     Published Date: Oct 12, 2012
Learn how agentless security architectures can maintain a high level of security while lowering costs
Tags : 
information security, information technology, protection, security, data protection
    
Trend Micro
White Paper Published By: Trend Micro     Published Date: Oct 12, 2012
This white paper evaluates that "free" claim by examining the additional costs associated with deploying ForeFront and abandoning third party anti-malware solutions.
Tags : 
information security, licensing, software costs, trend micro, security
    
Trend Micro
White Paper Published By: Arbor Networks     Published Date: Sep 29, 2012
Botnets and DDoS attacks are perceived as being malevolent and unstoppable. Fortunately there are companies like Arbor Networks, who are dedicated to analyzing and stopping botnets and DDoS attacks on a global basis.
Tags : 
ddos attacks, distribution denial of service, botnet, network infrastructure, database security
    
Arbor Networks
White Paper Published By: Oracle Corp.     Published Date: Sep 20, 2012
his paper describes how these trends have affected storage technologies and how Oracle's storage solutions enable organizations to reduce IT costs, accelerate provisioning of private cloud services, and achieve higher service levels.
Tags : 
cloud, cloud computing, storage, virtualization, oracle
    
Oracle Corp.
White Paper Published By: HP & Intel     Published Date: Sep 18, 2012
McAfee and Intel create a multilayer endpoint protection against malware, helping protect business PCs against intrusions from security breaches
Tags : 
intel, security, cloud computing, malware, data protection
    
HP & Intel
White Paper Published By: HP & Intel     Published Date: Sep 18, 2012
Whether your goal is to improve security, cut costs, maximize data protection, or improve worker productivity, the 3rd generation Intel® CoreT processor family is built for business and engineered for security.
Tags : 
intel, security management, data protection, desktop performance, desktop virtualization
    
HP & Intel
White Paper Published By: HP & Intel     Published Date: Sep 18, 2012
3rd generation Intel Core vPro processors' built-in security technologies deliver and protect business clients where current technologies cannot reach.
Tags : 
intel, security, it threats, threat management, malware
    
HP & Intel
White Paper Published By: Voltage Security     Published Date: Sep 13, 2012
If there are any lingering doubts that mobile de-vices-such as smartphones and tablets-have profoundly transformed today's business, one study finds that using smart devices for produc-tivity is "now the standard.
Tags : 
data security, smart devices, smart security, data security strtegy, mobile security
    
Voltage Security
White Paper Published By: CDW Symantec     Published Date: Sep 06, 2012
What are you doing to keep your data safe? Check out these backup basics, learn about the options available and get advice on how to choose the right protection system for your needs.
Tags : 
disk backup, backup and recovery, deduplication, data protection, disaster recovery
    
CDW Symantec
White Paper Published By: CDW Symantec     Published Date: Sep 06, 2012
Things have changed and your data backup needs to change with it. To get the basics for VM Data Protection click here.
Tags : 
virtual machines, vm data, data protection, virtualization, disaster recovery
    
CDW Symantec
White Paper Published By: F5 Networks Inc     Published Date: Sep 05, 2012
Private cloud-as an approach to IT operations-calls for organizations to transform their data centers, including the network. Using strategic points of control to aggregate and dynamically provision IT resources can help organizations meet network-related challenges and move past the hype to successfully build, deploy, and secure private clouds.
Tags : 
cloud, cloud computing, technology, operations, data center
    
F5 Networks Inc
White Paper Published By: VMware     Published Date: Aug 22, 2012
The whitepaper talks about the pressures that SMB is facing --including small budgets, limited skill sets among IT staff, and limitations in their existing processes.
Tags : 
vmare, virtualization, cloud initiatives, clustering, data protection
    
VMware
White Paper Published By: EVault Inc.     Published Date: Aug 22, 2012
Learn best practices for guarding your endpoint corporate data so you can mitigate the risk of regulatory and financial exposure, and more. This white paper explores: . Defining security policies for endpoint backup and recovery . Enforcing endpoint controls . Ensuring employee adoption . Keeping IT costs in check
Tags : 
white, paper, best, practices, for protecting
    
EVault Inc.
White Paper Published By: EVault Inc.     Published Date: Aug 22, 2012
Go hybrid and get the best of both data protection worlds. Cloud-connected backup and recovery seamlessly combines cloud-based and onsite data protection technologies for fast, local restores and ensured, offsite disaster recovery. Read the white paper to: . Discover the benefits of transitioning from tape to disk . Learn how to get shorter backup windows and faster recovery times . Ensure your data is totally secure and easily recovered
Tags : 
white paper, cloud, connected, backup, recovery
    
EVault Inc.
White Paper Published By: SunGard     Published Date: Aug 14, 2012
CHALLENGE: Florida Hospital performs recovery tests twice a year, recovering more than 100 applications. The healthcare organization needed a recovery strategy that improved communication and efficiency, managed a complex change control process, and that would keep staff at home during a disaster. SunGard Solution: With the Managed Recovery Program, SunGard is Florida Hospital's recovery team, ensuring recovery configurations keep pace with production changes, managing recovery test execution, and providing a single point of contact for the complete recovery program.
Tags : 
sungard, expertise, management, florida, hospital
    
SunGard
White Paper Published By: HP and Intel     Published Date: Aug 13, 2012
This DCIG report details how HP 3PAR F-class midrange arrays provide enhanced levels of VMware integration and optimized virtual machine density so users experience levels of VMware efficiency, performance and visibility well beyond what other midrange arrays natively provide.
Tags : 
hp 3par storage, vsphere integration, virtualization, virtualized environments, data storage
    
HP and Intel
White Paper Published By: VMware     Published Date: Aug 09, 2012
Learn how small and midsized businesses are increasingly adopting virtualisation to deliver consolidation, improve data back up and disaster recovery and increase security with an in-depth new paper from the Enterprise Strategy Group (ESG).
Tags : 
vsa, vsphere storage appliance, storage, data, clustering
    
VMware
White Paper Published By: VMware     Published Date: Aug 09, 2012
Small and midsize firms virtualize IT infrastructure to meet real-world challenges: simplifying operations to focus on business issues, speeding up application rollouts to get more done, safeguarding data and operations to stay open and productive,
Tags : 
vmware, virtualization, infrastructure, data protection, data security
    
VMware
White Paper Published By: Intel Corp.     Published Date: Aug 08, 2012
The report outlines the benefits of using HP StoreOnce with NetBackup's integrated Network Data Management Protocol (NDMP) backup capabilities to enhance administrators' abilities to effectively manage NDMP-enabled NAS server backup and recovery.
Tags : 
using, storeonce, ndmp, backup, symantec
    
Intel Corp.
White Paper Published By: Intel Corp.     Published Date: Aug 08, 2012
Evaluator Group worked with HP to access the features, performance and enterprise capabilities of the HP StoreOnce B6200 Backup system. HP labs and equipment were utilized, with testing under the direction of on-site Evaluator Group personnel. Testing focused on validating high availability features, performance, and application integration.
Tags : 
evaluator, group, storeonce, b5200, backup
    
Intel Corp.
White Paper Published By: CDW Symantec     Published Date: Aug 02, 2012
Read the results of Symantec's research on the psychology behind intellectual property theft by corporate insiders. This report addresses the organizational anxiety surrounding potential theft of critical data by employees and describes what is known about the people and conditions that contribute.
Tags : 
indicators, intellectual, property, theft, symantec
    
CDW Symantec
White Paper Published By: Equinix     Published Date: Jul 31, 2012
This GigaOM Pro paper explores what functions to consider when selecting and working with hosting providers as it relates to the entire value chain of function and performance. Get your complimentary 6-page report now.
Tags : 
gigaom, pro, enterprise, cloud, equinox
    
Equinix
White Paper Published By: IBM     Published Date: Jul 24, 2012
This white paper discusses survey research by breaking it up into a seven step process - and clearly detailing how you can maximize your efforts every step of the way. Get the white paper now.
Tags : 
ibm, technology, data, data collection, data research
    
IBM
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Search the Library

Add Research

Get your company's research in the hands of targeted business professionals.