app data

Results 2401 - 2425 of 2562Sort Results By: Published Date | Title | Company Name
By: Veracode     Published Date: Oct 26, 2016
Web and mobile applications are now top attack vectors for cyber attackers, accounting for more than a third of data breaches. As a result, securing the application layer has now become a high priority for enterprises. Enterprise application security testing solutions for Web, native, cloud and mobile applications are key to this strategy. In the latest Gartner 2015 Magic Quadrant for Application Security Testing, Veracode has been positioned as a Leader for the third year in a row based on our completeness of vision and ability to execute in the AST market. Download the report for more on why Veracode's automated cloud-based service is in Gartner's “Leaders” quadrant.
Tags : veracode, gartner, magic quadrant, application security testing, security, application security, enterprise applications
     Veracode
By: Veracode     Published Date: Oct 26, 2016
Web application attacks are now the most frequent pattern in confirmed breaches, and organizations know that application security is key to protecting their data. But many organizations lack the resources to develop a comprehensive AppSec program, and need to look to external services. Download this guide for a straightforward, four-step method for acquiring the services you need to support a comprehensive AppSec program.
Tags : veracode, application security, sans, security, enterprise applications
     Veracode
By: Veracode     Published Date: Jun 26, 2019
Applications become vulnerable to an encapsulation attack when they fail to differentiate data or functionality within components. Without clearly defined boundaries between control spheres, bad code can creep across components and attackers can gain unauthorized access to data and functions.
Tags : 
     Veracode
By: Verdasys     Published Date: Mar 28, 2012
In this white paper you will learn how data classification can be one of the most cost-effective methods for ensuring the value of data is maximized while still being used securely and how it can be a critical component to successfully govern information at an enterprise.
Tags : information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection
     Verdasys
By: VeriSign Incorp.     Published Date: May 08, 2009
Web Application Threats Are Evolving. Are Your Security Efforts Keeping Pace? Today, Web application security threats are not only becoming more abundant than ever, but also more difficult to detect, and more complex to solve. Many organizations are responding to these unique vulnerabilities with traditional network security approaches. However, sophisticated Web applications threats require a more sophisticated security strategy. What’s worked in the past won’t necessarily work today; and what’s more, Web application security requires a comprehensive solution, not simply a series of a la carte provisions. For detailed steps toward improving your Web application security strategy, download the VeriSign® Enterprise Security Services white paper, Best Practices That Improve Web Application Security.
Tags : verisign, web application security, sensitive data, intellectual property, business processes, operational costs, verisign enterprise security services, point-of-sale
     VeriSign Incorp.
By: Veritas     Published Date: Oct 03, 2016
Une enquête, organisée pour Veritas par le cabinet Vanson Bourne, auprès de 2 550 personnes dans 22 pays, examine les problèmes entourant le phénomène du databerg et révèle comment les organisations du monde entier encourent des risques de pertes de plus de 3,3 trillions d’euros d’ici 2020. Ce rapport est une lecture indispensable pour tous les responsables IT.
Tags : 
     Veritas
By: Vertica     Published Date: Oct 30, 2009
Independent research firm Knowledge Integrity Inc. examine two high performance computing technologies that are transitioning into the mainstream: high performance massively parallel analytical database management systems (ADBMS) and distributed parallel programming paradigms, such as MapReduce, (Hadoop, Pig, and HDFS, etc.). By providing an overview of both concepts and looking at how the two approaches can be used together, they conclude that combining a high performance batch programming and execution model with an high performance analytical database provides significant business benefits for a number of different types of applications.
Tags : vertica, analytical computing, adbms, mapreduce, application management, data management, data mining
     Vertica
By: Viavi Solutions     Published Date: Apr 01, 2015
With the expanding sophistication of large-scale breaches, the question isn’t whether most organizations will be hacked – it’s when. The APM for Security Forensics white paper shows you how performance monitoring tools can act as a network security camera. It also includes a case study of how one network team used a performance monitoring solution to identify the surprising source of an attack.
Tags : apm, security, application performance management, it infrastructure, it security, data loss, intrusion detection
     Viavi Solutions
By: Viavi Solutions     Published Date: Jan 04, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : 
     Viavi Solutions
By: Viavi Solutions     Published Date: Apr 14, 2017
In the age of information, staying on top of emerging threats requires IT teams to leverage existing tools in innovative ways, such as applying deep packet inspection and analysis from performance monitoring solutions for advanced security forensics. Based on recent insight gathered from 322 network engineers, IT directors and CIOs around the world, 85 percent of enterprise network teams are now involved with security investigations, indicating a major shift in the role of those teams within enterprises. Large-scale and high-profile security breaches have become more common as company data establishes itself as a valuable commodity on the black market. As such, enterprises are now dedicating more IT resources than ever before to protect data integrity.
Tags : network security, security validation, technical security, cyber attacks, database security, it security, traffic analytics, data report
     Viavi Solutions
By: Viavi Solutions     Published Date: Jul 21, 2017
Rapid increases in network traffic volumes, security threats and application complexity all underscore the importance for lossless data capture, analysis and storage to provide crucial raw data for post event analysis and remediation. Viavi commissioned Tolly to evaluate the performance of its Observer GigaStor family of capture, analysis, and storage solutions. Specifically the tests that focuses on bench marking maximum sustained full packet capture/write rates and greatest burst performance with no packet loss while delivered robust encryption of stored network data.
Tags : ethernet, service troubleshooting, storage solutions, stored network data, network traffic, security threats, network analysis, write data
     Viavi Solutions
By: Visible     Published Date: Aug 21, 2009
The biggest problem facing CIO's today is their existing applications. This paper describes the problem and describes our permanent solution, Enterprise Application Integration.
Tags : integration, application integration, application security, collaboration, data sharing, data integration, business integration, efficiency
     Visible
By: Vision Solutions     Published Date: Apr 11, 2008
If you need more than tape backup to protect your critical applications running on AIX operating environments, download this white paper and learn your options and strategies, including how new technologies have significantly improved the recovery time and data recovery points for AIX.
Tags : data management, disaster recovery, business continuity, ibm aix, backup, recovery, vision, vision solutions
     Vision Solutions
By: VMTurbo     Published Date: Apr 11, 2013
VMTurbo is the only vendor that provides a closed-loop management system capable of holistically assuring workload QoS while maximizing infrastructure efficiency. Our solution continuously identifies inefficiencies, resource contention and bottlenecks in the system and is able to determine—and automate—the necessary actions that control the environment in the optimal operating zone. It changes the economics of managing virtualized data centers and delivers operational savings and productivity gains across the organization. And, it is a better approach to IT operations management in today’s virtualized data center.
Tags : operations, management, key points, vmturbo, maximize, infrastructure, resource, efficiency
     VMTurbo
By: VMTurbo     Published Date: Apr 11, 2013
This whitepaper describes VMTurbo’s supply chain economy approach, which uniquely addresses these requirements. VMTurbo combines monitoring, analytics and actions to enable proactive virtualization management. VMTurbo’s Observe Advise Automate model delivers intelligent and holistic visibility, analytics and automation.
Tags : economic, management, operations, virtualization, vmturbo, analytics
     VMTurbo
By: VMTurbo     Published Date: Feb 11, 2014
Moving beyond monitoring, alerting and reporting to deliver an automated control system for today's virtualized data centers.
Tags : vmturbo, sizing up, operations management, virtual infrastructure, it operations, analytic engine, decision-making process, storage infrastructure
     VMTurbo
By: VMTurbo     Published Date: Feb 11, 2014
These new software-defined capabilities, enabling enterprises and service providers bridge the gap between software-defined flexibility and the true business potential of the Software-Defined Datacenter.
Tags : vmturbo, software-defined datacenter, sddc, virtualization, virtualizing business, business-critical, business applications, enabling enterprises
     VMTurbo
By: VMTurbo     Published Date: Feb 11, 2014
VMTurbo’s Observe-­-Advise-­-Automate model delivers intelligent and holistic visibility, analytics and automation.
Tags : vmturbo, virtualization, virtualizing business, business-critical, business applications, controlling interference, consolidation, virtual currency
     VMTurbo
By: VMTurbo     Published Date: Mar 25, 2015
Intelligent N+X Redundancy, Placement Affinities, & Future Proofing in the Virtualized Data Center Virtualization brought about the ability to simplify business continuity management in IT. Workload portability and data replication capabilities mean that physical infrastructure failures no longer need impact application services, and they can rapidly be recovered even in the event of complete site failure. However, Enterprises and Service Providers face new challenges ensuring they have enough compute capacity in their virtualized data centers to support their business continuity requirements, while at the same time not over provisioning infrastructure capacity resulting in unnecessary capital expenditure.
Tags : continuity requirements, vmturbo, virtualization, workload portability, data replication, it management, enterprise applications
     VMTurbo
By: VMTurbo     Published Date: Mar 25, 2015
An Intelligent Roadmap for Capacity Planning Many organizations apply overly simplistic principles to determine requirements for compute capacity in their virtualized data centers. These principles are based on a resource allocation model which takes the total amount of memory and CPU allocated to all virtual machines in a compute cluster, and assumes a defined level of over provisioning (e.g. 2:1, 4:1, 8:1, 12:1) in order to calculate the requirement for physical resources. Often managed in spreadsheets or simple databases, and augmented by simple alert-based monitoring tools, the resource allocation model does not account for actual resource consumption driven by each application workload running in the operational environment, and inherently corrodes the level of efficiency that can be driven from the underlying infrastructure.
Tags : capacity planning, vmturbo, resource allocation model, cpu, cloud era, it management, enterprise applications
     VMTurbo
By: VMTurbo     Published Date: Jul 08, 2015
This paper examines the evolution of enterprise applications, the data centers in which these applications reside and the increasing expectations of businesses and end-users on the Quality of Service (QoS) their applications deliver.
Tags : application control, application performance, enterprise applications, cloud-based applications, apm, application performance monitoring, data center, infrastructure performance
     VMTurbo
By: VMware     Published Date: Feb 26, 2009
This flash provides an overview of how CA ARCserve® Backup r12 provides several new disaster recovery enhancements, including an easy-to-use Disaster Recovery wizard. Together with the replication and application failover functionality in CA XOsoft™ Replication and CA XOsoft™ High Availability, and the integrity testing features in CA XOsoft™ Assured Recovery, these tools enable you to recover servers, applications, and data swiftly and effectively.
Tags : ca arcserve, ca xosoft, vmware, restoring database application, bootable cd, bootable tape, cdp, database sessions
     VMware
By: VMware     Published Date: Feb 26, 2009
The primary goal of this guide is not simply to provide a checklist of tasks, but to help you develop an understanding of the disaster recovery (DR) planning process and the principles that underlie it. Before getting into the details, let’s consider first just what this guide will do for you and equally importantly, what it will not do. What this guide will do is to lay out a framework for DR planning that keeps things conceptually simple and helps you know what steps must be carried out and why, without a lot of jargon or unnecessary formality.
Tags : ca xosoft, vmware, disaster recovery, business impact analysis, bia, outside-in analysis, inside-out analysis, contingency planning guide
     VMware
By: VMware     Published Date: Mar 16, 2009
Mid-sized businesses have long struggled to protect their IT systems. Many firms are inadequately protected and mistakenly think that a disaster is rare and won’t happen to them anytime soon. This custom Yankee Group Report uses customer interviews, statistical data and Yankee Group SMB survey results to examine disaster recovery (DR) issues.
Tags : vmware, disaster recovery, smb, it system, it infastructure, virtualization, storage replication, ups
     VMware
By: VMware     Published Date: May 03, 2011
The VMware SMB Survey is designed to help small and midsize businesses understand the benefits their peers are achieving with virtualization.
Tags : vmware, virtualization, smbs, bc/dr, application availability, backup and data protection, downtime, disaster preparedness
     VMware
Start   Previous    89 90 91 92 93 94 95 96 97 98 99 100 101 102 103    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com