HIT Consultant Insightful coverage of healthcare innovation
 

enterprise data protection

Results 51 - 75 of 104Sort Results By: Published Date | Title | Company Name
Published By: Proofpoint     Published Date: Apr 22, 2010
Learn more about Proofpoint Encryption, Proofpoint's easy-to-deploy and easy-to-use policy-based email encryption solution and why email encryption is a critical component of today's email security solutions.
Tags : 
proofpoint, enterprise data protection, email encryption, security, data loss prevention
    
Proofpoint
Published By: EMC Corporation     Published Date: Jun 14, 2013
Private cloud improves performance and reliability for mission-critical applications supporting humanitarian projects.
Tags : 
private cloud, cloud, reliability, performance, applications, data growth, digital, technology
    
EMC Corporation
Published By: CDW     Published Date: Feb 24, 2015
The fundamentals of security and management of software have not changed. But the new computing environment – mobile devices, cloud computing and virtualization – requires new approaches to familiar challenges. What’s more, software publishers are bringing a new energy to their own vigilance. A capricious economy has many of them stepping up the number of customer audits. As organizations deal with these software licensing challenges, they also face increasingly sophisticated security threats that continuously morph, just a step ahead of remedies to stop them. Organizations need a comprehensive approach to security and software asset management. This white paper will examine the interconnection between SAM and security, offering practical advice on how enterprises can protect themselves and where to go for support.
Tags : 
software asset management, it enterprise, software licensing, mobility, cloud computing, data protection
    
CDW
Published By: CDW     Published Date: Feb 27, 2015
CDW’s Technology Insights guides provide a high-level, informative take on today’s most pressing IT solution areas and related issues. Speaking to the interests and concerns of IT managers and their staff, as well as their enterprise counterparts, the guides provide up-to-date summaries, strategic guidance and best practice tips on the technologies driving IT operations forward.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
Published By: Kaseya     Published Date: Mar 13, 2013
A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.
Tags : 
kaseya, it security, security threats, scott crawford, enterprise management associates, ema, disaster recovery, data protection
    
Kaseya
Published By: AWS     Published Date: Nov 08, 2018
In this webinar, you’ll learn how a major Healthcare organization is using integrated, reliable, and secure cloud-based solutions from Commvault and Amazon Web Services (AWS) to help address significant data growth while reducing infrastructure costs.
Tags : 
    
AWS
Published By: Trend Micro, Inc.     Published Date: Apr 29, 2009
The greatest threat to enterprise data security comes from inside threats. Securing the enterprise requires an understanding of the data leak points, environment, people, and processes for managing sensitive information. This white paper explains how network-based and endpoint-based solutions can work together to provide the broadest protection available while ensuring scalability and manageability, and that employee productivity is not impacted.
Tags : 
trend micro, datadna, data leak, threat, leak, network boundaries, vulnerability threats, data leak
    
Trend Micro, Inc.
Published By: Arcserve     Published Date: May 29, 2015
Find out what you need to know about data protection appliances in this video brief by the Enterprise Strategy Group’s Sr. Data Protection Analyst, Jason Buffington. In this short video he’ll analyze: -Various types of data protection appliances -Market trends regarding appliance adoption -What data protection specialists expect from appliances -How Arcserve has evolved to solve the issues of today’s complex organizations Watch this video brief today!
Tags : 
data protection appliances, appliance adoption, arcserve, security
    
Arcserve
Published By: Symantec     Published Date: Jul 11, 2017
This white paper explores the challenges associated with protecting data in today’s enterprise and starts to detail how a modern data loss prevention (DLP) solution, delivered as part of a cloud-based web security gateway, can provide continuous monitoring and protection of sensitive data on mobile devices, on-premises and in the cloud.
Tags : 
data protection, security, encryption, cloud, web security
    
Symantec
Published By: Group M_IBM Q3'19     Published Date: Aug 20, 2019
This commissioned study conducted by Forrester Consulting evaluates the state of enterprises’ data privacy compliance in a shifting regulatory landscape. The survey of 218 global enterprise decision makers with responsibility over privacy or data protection analyzed how they are evolving to meet the heightened data protection and privacy expectations of legislators and consumers, along with the benefits they can expect from a holistic data privacy approach.
Tags : 
    
Group M_IBM Q3'19
Published By: IBM     Published Date: May 01, 2017
Today's enterprises support an assortment of end-user devices, including laptops and desktops (both PCs and Macs), tablets and hybrid devices, and, of course, smartphones. Not only do employees use a variety of form factors, but they run a variety of platforms on those devices, including: Apple iOS and Apple macOS Google Android Microsoft Windows To complicate the situation further, they run different versions of those platforms for example, Microsoft Windows XP SP3, Microsoft Windows 10 or anything in between. In addition, IT is being tasked more and more with managing and securing wearables, ruggedized devices and the Internet of Things (IoT). Read this whitepaper to learn more.
Tags : 
enterprise management, mobile management, organization optimization, security management, microsoft, data protection, bug prevention, information management
    
IBM
Published By: InMage     Published Date: Feb 18, 2009
Companies of all sizes realize that near real-time business recovery is no longer a nice-to-have – it is becoming a new corporate must have. Competition, regulations and the 24x7 nature of businesses all push for continual application and data availability under almost any circumstances.
Tags : 
inmage, service level agreements, slas, enterprise business continuity, dcig, continuous data protection, cdp, host-based
    
InMage
Published By: Druva     Published Date: Mar 30, 2016
Why the public cloud has become the state-of-the-art target for backup, archiving, and disaster recovery
Tags : 
druva, public cloud, enterprise data protection, backup, archiving, disaster recovery, cloud
    
Druva
Published By: Symantec     Published Date: May 02, 2014
How are savvy CIO's conquering these types of challenges? Find out how in this white paper by vExpert, David Davis
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, power and cooling, data protection, loss data
    
Symantec
Published By: Symantec     Published Date: Jul 11, 2014
Today's datacenters face a gauntlet of challenges including protection of physical and virtual environments, fast recovery of data, reducing backup times and storage requirements, server consolidation, and disaster recovery. How are savvy CIO's conquering these types of challenges? Find out how in this white paper by Expert, David Davis.
Tags : 
data, protection, physical and virtual environment, recovery, storage, consolidation, cio's
    
Symantec
Published By: Nativeflow     Published Date: Feb 25, 2014
Is your company using Office365? Are you concerned that your enterprise mail is not protected on mobile devices? Do you want to secure your data instead of managing devices? Download the datasheet to learn in depth approaches to addressing these challenges.
Tags : 
office365, secure data, data, datasheet, mobile protection, enterprise mail, security, mobile device management
    
Nativeflow
Published By: Nativeflow     Published Date: Feb 25, 2014
Are your employees using WhatsApp? Is mobile messaging taking over an ever-growing portion of your enterprise communications? Is your enterprise running into compliance considerations around messaging? Learn about approaches to addressing these challenges so that your employees can communicate on the go and your enterprise data will be protected.
Tags : 
whatsapp, enterprise communication, employees, enterprise data protection, enterprise data, mobile protection, mobile messaging
    
Nativeflow
Published By: Nativeflow     Published Date: Feb 25, 2014
Are your company’s employees using Sharepoint, Dropbox for Business or other enterprise cloud file-sharing services? Do your users want to use standard market aps to view and edit shared files on the go? Are you concerned about preventing enterprise data leakage from mobile devices? Download the datasheet to learn about approaches that address these challenges so that your enterprise can use these services while ensuring enterprise data is protected.
Tags : 
enterprise file-sharing, mobile devices, sharepoint, dropbox, cloud file-sharing, standard market app, datasheet, file leakage
    
Nativeflow
Published By: Nativeflow     Published Date: Jun 06, 2014
Download the solution brief to learn more about protecting your organization’s enterprise data.
Tags : 
nativeflow, healthcare, enterprise app, physicians, mobile app, doctors, healthcare solutions, data encryption
    
Nativeflow
Published By: HP     Published Date: Aug 08, 2014
Enterprise IT organizations are challenged by accelerating data growth and increasing reliance on the data. This requires a fundamental rethinking of how data is protected and accessed. HP StoreOnce backup and CommVault Simpana deliver an integrated, end-to-end data protection and rapid recoverability solution to enhance business continuity and resiliency.
Tags : 
it organizations, storage, commvault simpana, data protection, recoverability, enterprise, data, storeonce
    
HP
Published By: Riverbed     Published Date: Sep 05, 2014
This white paper details the current challenges organizations face with respect to their evolving IT requirements, growing storage needs, and more extensive data protection requirements. It focuses on an expanding set of cloud-based storage offerings and the buying considerations of those who want to improve the data management metrics associated with data protection services such as backup and recovery. The paper also takes a closer look at the solutions offered by Riverbed Technology that allow organizations to integrate cloud-based storage withing solutions that address a growing set of data protection demands.
Tags : 
cloud, enterprise storage, data protection, it requirements, metrics
    
Riverbed
Published By: Absolute Software     Published Date: Feb 04, 2010
Absolute Software has announced it has completed its acquisition of the LANrev systems management platform. Absolute plans to integrate LANrev's popular Mac and PC lifecycle configuration management technology with its flagship security and asset management suite, Computrace.
Tags : 
absolute, laptop, saas, lifecycle management, enterprise management, lock down, rapid recovery, stolen
    
Absolute Software
Published By: Bocada     Published Date: Aug 21, 2009
Today, the common approach to collecting information about computing activity across the enterprise is to use software agents installed on individual clients and servers. However, when this approach is applied to data protection management in the enterprise environment, it has proven both ineffective and inefficient.
Tags : 
data protection, network security, software agent, agentless, bocata, bocada
    
Bocada
Published By: KACE     Published Date: Nov 14, 2006
The classic definition of information security states that the goal is to protect information from possible breaches in confidentiality, integrity, or availability. This paper provides some context, then five simple solutions to help mid-sized organizations keep their end point security under control.
Tags : 
enterprise security, perimeter, security appliance, information management, data protection, data integrity, smb, smbs
    
KACE
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
CCU sought to encrypt its backup tapes for keeping customer data secure in transit and in storage at the offsite tape-vault vendor’s facility. As a financial institution, CCU was subject to stringent government regulations. With nearly 60 gigabytes of data to encrypt each night, CCU knew that a software solution was out of the question.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Start   Previous    1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.