HIT Consultant Insightful coverage of healthcare innovation
 

protection strategy

Results 1 - 25 of 70Sort Results By: Published Date | Title | Company Name
Published By: McAfee     Published Date: Mar 31, 2017
Data loss remains a serious issue , and data loss prevention is an important tool for companies to reduce the risk of a breach. The Ponemon Institute conducted a global survey of 1,000 IT decision makers, to develop benchmarks for data loss prevention incidents, visibility, and maturity.
Tags : 
data loss prevention, data loss benchamrks, data breaches, data protection strategy, data protection benchmarks
    
McAfee
Published By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : 
intrusion prevention, network security, data protection, hacker detection, intrusion detection, ips, intrusion prevention systems, host-based ips, security strategy, third brigade
    
Third Brigade
Published By: HP and Intel® Xeon® processors     Published Date: Sep 06, 2011
This white paper discusses how SMBs can effectively address their data protection challenges, implementing solutions that help store and protect their business-critical data as they cut costs and improve efficiency and reliability.
Tags : 
hp + intel, data protection stratefy, smbs, backup and recovery, disk, tape, d2d storage, data deduplication
    
HP and Intel® Xeon® processors
Published By: HPE APAC     Published Date: Feb 24, 2017
In this white paper, we will examine the storage challenges faced by businesses. We consider the case for the allflash data center, discuss the importance of a flash-optimized data protection strategy, and provide tips for gaining support from business leaders for your vision.
Tags : 
flash storage, storage, sata protection, data protection strategy, data center, allflash, best practices
    
HPE APAC
Published By: Cisco     Published Date: Sep 12, 2014
Traditional point-in-time defenses aren’t adequate protection from today’s sophisticated advanced malware and advanced persistent threats (APTs.) Get this white paper to learn how you can evolve your security strategy to address advanced threats before, during, and after attacks.
Tags : 
cybercrime, damage, landscape, sophisticated, infrastructure, attack, resources, network, disruption, operations, organizations, national
    
Cisco
Published By: Palo Alto Networks     Published Date: Sep 30, 2016
Today’s threats are more sophisticated than ever before. All types of organizations and information are being targeted. Attackers exploit vulnerabilities in software and use malware to further their attack objectives.
Tags : 
palo alto, advanced enpoint protection, strategy works, company protection, security
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
Microsoft® announced Windows Server® 2003 End-of-Support (EOS) on July 14, 2015. Many businesses are forced by circumstance to leave these systems in service for some time. Retiring a major enterprise component has always been a challenge for IT departments.
Tags : 
palo alto, advanced enpoint protection, strategy works, company protection, security, microsoft
    
Palo Alto Networks
Published By: Trend Micro, Inc.     Published Date: Jul 19, 2011
The Consumerisation of Enterprise Mobility: A Formidable Challenge for CIOs, but a great opportunity. Download the Trend Micro Enterprise Security Whitepaper: The Consumerisation of Enterprise Mobility to learn the secrets to data protection on mobile devices.
Tags : 
trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
    
Trend Micro, Inc.
Published By: Arcserve     Published Date: Feb 26, 2015
In typical organizations, most data resides outside the data center, so it is important that the protection of desktop and laptop computers is given the same priority as file servers and application servers. Have you deployed the right data protection strategy for endpoints? We’re here to help! Arcserve UDP offers a FREE Workstation edition product that specifically focuses on backing up data on endpoints. Not only can desktops and laptops be protected for FREE with award-winning technology that minimizes bandwidth and storage requirements, but they can participate in the global deduplication schema offered by UDP (for 30 days), and have their data protected in public and private clouds, and more! This is too good to pass up! Get your FREE Arcserve UDP Workstation edition now.
Tags : 
arcserve, unified data protection, software download, bandwidth, deduplication
    
Arcserve
Published By: Eaton     Published Date: Jan 26, 2016
When designing a power protection scheme for their data center, IT and facilities managers must ask themselves whether a distributed or centralized backup strategy makes more sense. Unfortunately, there is no easy answer to that question. Companies must weigh each architecture’s advantages and disadvantages against their financial constraints, availability needs and management capabilities before deciding which one to employ. This white paper will simplify the decision-making process and lessen the potential weaknesses of whichever strategy you ultimately select.
Tags : 
eaton, distributed backup strategy, centralized backup strategy, facility managers, data center solutions
    
Eaton
Published By: Zscaler     Published Date: Jun 20, 2019
Las reglas han evolucionado: las aplicaciones migran ahora hacia el cloud, y los usuarios acceden a ellas desde cualquier lugar, sin conectarse más a la red corporativa. Parece entonces esencial reconsiderar el aspecto seguridad de su arquitectura. Descubren con ese libro blanco como proteger sus activos estratégicos con las funcionalidades Zscaler Data Protection y Cloud DLP.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 20, 2019
Les règles du jeu ont évolué : les applications migrent désormais vers le cloud, et les utilisateurs y accèdent de n’importe où, sans plus passer par le réseau de l’entreprise. Il est donc indispensable de repenser l’aspect sécurité de votre architecture. Découvrez avec ce livre blanc comment protéger vos actifs stratégiques avec les fonctionnalités Zscaler Data Protection et Cloud DLP.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: Jun 19, 2019
Le regole del gioco sono cambiate: le applicazioni stanno ormai migrando verso il cloud e gli utenti possono avere accesso da qualsiasi location senza mai il bisogno di collegarsi al corporate network. E’ quindi indispensabile ripensare l’architettura della sicurezza. Scoprite con questo documento come proteggere i vostri attivi strategici con le nostre funzionalita’ di Data Protection e Cloud DLP.
Tags : 
    
Zscaler
Published By: Commvault     Published Date: Jul 06, 2016
Around-the-clock global operations, data growth, and server virtualization all together can complicate protection and recovery strategies. They affect when and how often you can perform backups, increase the time required to back up, and ultimately affect your ability to successfully restore. These challenges can force lower standards for recovery objectives, such as reducing the frequency of backup jobs or protecting fewer applications, both of which can introduce risk. High-speed snapshot technologies and application integration can go a long way toward meeting these needs, and they have quickly become essential elements of a complete protection strategy. But snapshot copies have often been managed separately from traditional backup processes. Features like cataloging for search and retrieval as well as tape creation usually require separate management and do not fully leverage snapshot capabilities. To eliminate complexity and accelerate protection and recovery, you need a solution
Tags : 
commvault, intellisnap, netapp, backup, recovery, data growth, server virtualization, data protection, cifn, snap management, snapprotect
    
Commvault
Published By: Trend Micro     Published Date: Feb 01, 2013
This whitepaper will explore the anatomy of targeted attacks: the inner workings of the APT lifecycle. It will also provide an in-depth overview of Trend Micro Deep Discovery advanced threat protection solution, and how it enables enterprise IT to adopt a custom defense strategy that modernizes its risk management program to defend against targeted attacks. Deep Discovery is at the heart of the Trend Micro Custom Defense solution against targeted attacks.
Tags : 
advanced persistent, threat challenge, custom defense solution, trend micro, risk management
    
Trend Micro
Published By: Vision Solutions     Published Date: Dec 31, 2007
For AIX IT departments looking to take the next step in data protection strategies, CDP is an essential consideration. Analysts agree that businesses will be incorporating this strategy in the next few years as part of an integrated solution. CDP enables you to reverse data corruption in a fraction of the time and labor required for recovery from tape.
Tags : 
aix, data protection, continuous data protection, cdp, high availability, disaster recovery, disk backup, tape backup, recovery, backup, mimix, vision, vision solutions
    
Vision Solutions
Published By: F5 Networks Inc     Published Date: Jan 31, 2017
By thinking proactively about DDoS defense, organizations can build a comprehensive strategy to mitigate attacks. Choosing from on-premises security devices, cloud-scrubbing services, and a hybrid approach to DDoS protection allows organizations to customize their security strategy to their application architecture and business needs.
Tags : 
ddos, ddos defense, security
    
F5 Networks Inc
Published By: Sponsored by HP and Intel®     Published Date: Nov 02, 2012
This document provides a high level overview of how to build a high performance, IP SAN with deduplicated disk protection and long-term tape archive. This document will also put that solution into context with the rest of a typical IT environment.
Tags : 
it servers, protection strategy, network raid, hp storeonce
    
Sponsored by HP and Intel®
Published By: HP and Intel® Xeon® processor     Published Date: Aug 10, 2012
This document provides a high level overview of how to build a high performance, highly available IP SAN with deduplicated disk protection and long-term tape archive. This document will also put that solution into context with the rest of a typical IT
Tags : 
designing, data, protection, strategy, p4000, storeonce, tape, white, paper, san, deduplicated, disk, protection, archive
    
HP and Intel® Xeon® processor
Published By: Intel Corp.     Published Date: Aug 08, 2012
This document provides a high level overview of how to build a high performance, highly available IP SAN with deduplicated disk protection and long-term tape archive. This document will also put that solution into context with the rest of a typical IT environment.
Tags : 
designing, data, protection, strategy, p4000, storeonce, tape, white, paper, san, deduplicated, disk, protection, archive
    
Intel Corp.
Published By: Unitrends     Published Date: Mar 30, 2010
Clouds are all the rage right now. And the truth is that cloud-based computing can be a tremendous value. Cloud-based computing is not just an opportunity for a bunch of venture capitalists hanging out at Sand Hill Road, it's a wonderful chance for small and medium businesses to take a step toward aligning their information technology spend to increase their focus on revenue-generating opportunities.
Tags : 
unitrends, backup, data protection, data quality, server, replication, strategy, virtualization, cloud, business continuity, cloud-based, revenue, recovery
    
Unitrends
Published By: Unitrends     Published Date: Dec 07, 2009
Backup, despite the breathless hyperbole of many in the industry, is simply a form of insurance. What's important about your backup strategy is getting your systems and data protected in the most effective and affordable manner possible. Speaking plainly - you must be careful that you are in control of your backup strategy rather than your backup strategy (and vendor) being in control of you.
Tags : 
unitrends, backup, data protection, data quality, server, replication, strategy, virtualization, recovery
    
Unitrends
Published By: Sophos     Published Date: Dec 17, 2012
It takes more than antivirus to stop today’s advanced threats. An endpoint protection solution is an important part of your IT security strategy to protect corporate assets.
Tags : 
endpoint, antivirus, anti-spyware, firewall, endpoint security, data loss prevention
    
Sophos
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
    
Commvault
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015.1 However, only half of enterprises today are using some type of endpoint backup.2 That means that the volume of endpoint data that is in jeopardy is nothing short of significant.
Tags : 
encryption, data loss prevention, mobile app
    
Commvault
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.