lost data

Results 26 - 50 of 63Sort Results By: Published Date | Title | Company Name
By: Sage People     Published Date: May 04, 2018
How do you measure up as a business leader? As a business executive your time is incredibly valuable, right? And if you aren’t maximally time efficient or productive then you – and your business – will soon fall behind. It’s a fact of life in today’s highly-competitive digital marketplace. But how do you stem the flow of lost time? And how are other leaders making the most of this scarce resource so they can be as efficient, productive and valuable as possible? This report was produced specifically for the UK and Ireland (UK/I) region and is based on data gathered from real-world business leaders explaining how they perform tasks on a daily basis. In the report, we look at how business managers can step up from operational tasks and focus on work that will propel their business forward. We will: • Touch on the priorities of what could be termed ‘accelerated business leaders’: those
Tags : 
     Sage People
By: HP Inc.     Published Date: Sep 11, 2018
A point of sale system is unlike any other piece of technology employed by businesses. It is a sophisticated computer system that manages sensitive customer data in a public space, often accessible by a large number of employees, in addition to customers or anyone else in the area. Because of this, it’s a unique target for compromised data. Plus, it’s mission-critical nature means compromised systems can bring a business to a halt, resulting in lost business. It is estimated that organizations have a one-in-four chance of experiencing a data breach1. Within the business space, it’s estimated that 89 percent of retail data breaches were targeted at point of sale systems, according to the 2018 Verizon Data Breach Report2. At HP, data integrity is of utmost importance, and we have prioritized advanced security in our technology at every step of the design process.
Tags : 
     HP Inc.
By: Oracle     Published Date: Oct 20, 2017
In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical. These challenges have dramatically changed the way that IT systems are architected, provisioned, and run compared to the past few decades. Most compani
Tags : 
     Oracle
By: Oracle     Published Date: Oct 20, 2017
ESG Lab evaluated the Zero Data Loss Recovery Appliance from Oracle with a focus on its ability to deliver reliable data protection by recovering Oracle databases to any point in time with sub-second RPO in a highly scalable scale-out solution that is easy to use and manage. Year after year, ESG respondents consistently cite improving data backup and recovery among the top IT priorities in our annual spending intentions survey (including 2016’s iteration). Why? Because when unforeseen infrastructure failures or data corruptions occur, the ability to restore not only business-critical information but also application and end-user access to that information become paramount. Lost or prolonged inaccessibility to business-critical data and applications most often means lost revenue and productivity to the business, and possibly the inability to meet regulatory requirements.
Tags : 
     Oracle
By: Forcepoint     Published Date: Jun 06, 2019
Your people access and share data using a myriad of different cloud apps. The bad news is, you probably have no idea how your data is used, where it travels to and the level of associated risk. You’ve lost visibility and control. The good news is, we can help get it back. Register now for a FREE Cloud Threat Assessment and detailed report of your cloud-application risk posture. This in-depth assessment will show you: Cloud usage patterns. How potentially harmful activities happen in cloud applications across your organization. Geographical usage. Which countries your data is traveling to and from (you may be surprised). Privileged users. Do you have more administrators than you need? Dormant users. Are you overspending on unused licenses? Riskiest users. Who are your riskiest users and why? You'll receive customized assessments on Office365, Box, G Suite, and Salesforce.com.
Tags : 
     Forcepoint
By: Veeam '18     Published Date: Nov 18, 2019
"Data is increasingly at the core of any business or organization and is fueling new Digital Transformation (DX) initiatives. And as data becomes more distributed, dynamic and diverse, data Availability has never been more essential in an effective and holistic data management strategy. IDC recently conducted a study of organizations utilizing Veeam® Availability solutions in conjunction with NetApp Data Fabric technologies to determine the business value of the combined solution. The study found: 286% five-year ROI, saving $31,642 per 100 users per year ($2.32M per organization) Key discoveries: Reduced risk and cost by enabling more effective and timely data backup and recovery efforts Decreased cost of data-related outages in terms of lost user productivity and revenue Minimized the staff time required to manage and support data backup and recovery environments Optimized the cost of storage hardware through longer life spans and improved data deduplication and compression capab
Tags : 
     Veeam '18
By: Veeam '18     Published Date: Nov 18, 2019
"Downtime isn’t an option for companies who are adopting data-centric strategies. Inability to access information and applications translates into lost customers and negative exposure. With the stakes growing ever larger, organizations need to put a modern data management solution at the center of their digital transformation initiatives—both to protect their most precious assets and to catalyze business agility. Read this CIO.com white paper to learn about how having a modern data management solution powered by NetApp and Veeam® can advance data protection from being purely a cost center to a value creation center."
Tags : 
     Veeam '18
By: Worldpay     Published Date: Apr 29, 2015
In 2014, the UK saw online sales exceed £10bn per month. For small businesses, getting online is a great way to increase revenue. However, there’s no escaping the fact that small e-retailers are most at risk of suffering a data breach and that breaches are increasing. It is your responsibility to keep the card payment data of your customers safe and a failure to secure your systems could be a costly mistake which leads to penalty fines, lost custom and bad publicity. Worldpay is the leading payments provider in the UK and Europe. Whilst Worldpay has fewer businesses suffering data breaches, compared to our market size, we have a unique oversight on most UK card data breaches. We have compiled our insight and advice into this guide so all businesses, new or old, can ensure they are prepared.
Tags : ecommerce, payments, online payments, small business, fraud, security, card payments, card data, pci dss, e-retail, data breach, hacking, sql injection, malicious web shells, cyber security, sme
     Worldpay
By: Motorola     Published Date: Aug 09, 2007
Mobile devices represent a tremendous productivity advantage for today’s mobile worker. However, IT organizations must give consideration to the deployment of device security policies in order to provide the level of security that enterprises require.
Tags : mobile workers, mobile security, wireless security, mobile computing, mobility, enterprise security, network security, lost, stolen, disgruntled, data erase, authentication, compliance, wireless, encryption, motorola, good technology
     Motorola
By: Coupa Software     Published Date: Nov 04, 2014
The benefits of eInvoicing include fewer lost invoices, quicker approval cycles, increased on-time payments, and improved vendor satisfaction. Yet only 20% of companies receive more than 50% of their invoices electronically. This Paystream Advisors survey report includes data on how eInvoicing is improving AP efficiency and why some organizations are still slow to adopt (and why they shouldn't be).
Tags : einvoicing, approval cycles, vendor satisfaction, efficiency, on-time payments, invoicing, enterprise applications
     Coupa Software
By: Cisco     Published Date: Feb 13, 2009
This white paper details how continuous data protection for files is important in this current day where lost data can significantly affect productivity, customer satisfaction, and, ultimately, revenue.
Tags : cisco, data protection, network storage systems, data recovery, data loss, security, data management
     Cisco
By: CloudEndure     Published Date: Oct 12, 2018
Maintaining business continuity is your highest priority. In today’s commercial landscape, business continuity depends on the efficient, uninterrupted flow of data across the organization – from operations to sales to fulfillment. Even a brief lapse in workload continuity can mean thousands of lost sales opportunities, disruption to production, and compromised customer trust. The causes of those lapses can range from natural disasters to mechanical failure or human error. You need a data platform and a proactive disaster recovery (DR) strategy that will help you stay up and running in the event that your physical infrastructure is unavailable for any length of time. BUSINESS CONTINUITY Fulfilling orders, providing a high level of customer service, and keeping consumers engaged all depend on the efficient, uninterrupted flow of data throughout your organization. CUSTOMER TRUST Above all, protecting customer data—especially personally identifiable information (PII) —is critical
Tags : 
     CloudEndure
By: FITIRI     Published Date: Nov 11, 2008
Traditionally data accusation in plants has been done using paper log sheets and manual spreadsheets, which focuses more on documentation.  As a result, the exercise of taking plant readings has become routine, to the point where the true benefit of the exercise is lost.  Technology and software now gives us the ability to automate data collection and manipulation for increased efficiency.
Tags : fitiri, wireless solutions, ammonia plants, improve safety, process plants operations
     FITIRI
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Data breaches can carry very serious consequences, such as the revelation in February 2008 that that the Hannaford Brothers chain of supermarkets lost more than four million debit and credit card numbers to hackers. The bottom line is that organizations must implement Data Loss Prevention (DLP) systems to protect themselves against the growing array of threats they face from inadvertent and malicious data leaks from email, instant messaging and other systems.
Tags : trend micro, data breach, dlp, credit cards, breaches, data breaches, data loss prevention, dlp, hackers, sensitive information, malicious data leaks, threats, confidential information, data loss, data protection, encryption, ip loss, intellectual property, loss of intellectual property, loss of reputation
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Apr 29, 2009
Encryption will help to protect data against unauthorized access by outsiders from lost or stolen devices such as laptops, thumb drives, and other removable media. But it does not protect against the insider threat-employees and contractors with authorized access to data who mistakenly or maliciously leak your most valuable assets.
Tags : trend micro, encryption, laptop, ediscovery, e-discovery, data protection, threats, leaks, assets, true protection, dlp, data breach, breaches, data breaches, data loss prevention, dlp, hackers, data protection solutions, midsize organizations, smb
     Trend Micro, Inc.
By: SAP     Published Date: Jun 30, 2011
This white paper will outline possible mobile device security threats and review how IT can effectively manage and secure a fleet of devices, whether they are personally owned or corporate owned. By following the strategies outlined in this paper, IT managers will learn what the greatest security risks are for mobile devices and how to effectively protect end users, their devices, and the network infrastructure from attack, harm, or lost data.
Tags : sap, security, smartphones, tablets, productivity, mobility, security configuration, security enforcement, secure apps, mobile management
     SAP
By: Qualys     Published Date: Jan 11, 2017
When web applications are breached, enormous amounts of sensitive business data can be lost. According to Verizon’s 2014 Data Breach Investigations Report, web application attacks more than doubled in 2013 to become the #1 cause of security incidents
Tags : information security, it compliance, it audit, it security, network security, web application security, application security
     Qualys
By: Double-Take Software     Published Date: Sep 24, 2009
Download this free whitepaper to learn how combining Double-Take Software's replication solutions with virtualization technologies, organizations can achieve additional flexibility and cost-effectively protect their critical data and applications.
Tags : disaster recovery, recoverability, virtualization, double-take, lost data, cdm, cam
     Double-Take Software
By: Vision Solutions     Published Date: Sep 24, 2009
Download this free white paper to learn how combining Double-Take Software's replication solutions with virtualization technologies, organizations can achieve additional flexibility and cost-effectively protect their critical data and applications.
Tags : disaster recovery, recoverability, virtualization, double-take, lost data, cdm, cam, vision
     Vision Solutions
By: Hewlett-Packard     Published Date: Aug 02, 2013
Every data center IT manager must constantly deal with certain practical constraints such as time, complexity, reliability, maintainability, space, compatibility, and money. The challenge is that business application demands on computing technology often don’t cooperate with these constraints. A day is lost due to a software incompatibility introduced during an upgrade, hours are lost tracing cables to see where they go, money is spent replacing an unexpected hardware failure, and so on. Day in and day out, these sorts of interruptions burden data center productivity. Sometimes, it’s possible to temporarily improve the situation by upgrading to newer technology. Faster network bandwidth and storage media can reduce the time it takes to make backups. Faster processors — with multiple cores and larger memory address space — make it possible to practically manage virtual machines.
Tags : bladesystem, blade, infrastructure, blade infrastructure
     Hewlett-Packard
By: IBM     Published Date: Jul 26, 2017
IBM Security and Ponemon Institute are pleased to release the 2017 Cost of Data Breach Study: Global Overview. According to our research, the average total cost of data breach for the 419 companies participating in this research decreased from $4.00 to $3.62 million The average cost for each lost or stolen record containing sensitive and confidential information also significantly decreased from $158 in 2016 to $141 in this year’s study. However, despite the decline in the overall cost, companies in this year’s study are having larger breaches. The average size of the data breaches in this research increased 1.8 percent
Tags : data breach, security, research study, data trends
     IBM
By: SAS     Published Date: Nov 16, 2018
Fraud is costing government programs more than ever. For example, Medicaid lost $36 billion in 2017 – 10 percent of its total expenditures – which represents a 27 percent increase over 2015. As explored in this paper, fraud numbers are on the rise because fraud rings are not only getting more effective at what they do, but because it’s easy for them to find soft targets across multiple government programs simultaneously. Learn about how next-generation analytic tools from SAS cut across data and program silos and empower investigators to go on the offensive with fraud operators – without disrupting the efficient and timely delivery of benefits, services or tax refunds.
Tags : 
     SAS
By: IBM     Published Date: Oct 10, 2013
Mobile devices, including smartphones and tablets, enable increasing numbers of employees to work "anywhere, anytime."The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen. The security risk is further heightened by the proliferation of employee-owned mobile devices in many enterprises. Employees will almost always take the path of least resistance in leveraging mobile devices for business purposes, which may lead to unsafe computing practices. A clearly documented and enforceable mobile security policy is critical to reducing the risk of data loss.
Tags : mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy, byod, mobile infastructure, application management, data, security, safeguarding, telecommunications, enterprise applications
     IBM
By: Microsoft Office 365     Published Date: Jan 21, 2016
Learn how much money your business can save. In an objective study commissioned by Microsoft, Forrester Consulting investigated the Total Economic Impact™ for small to medium sized businesses, with 1 to 250 employees, using Office 365. The study revealed a sizeable return on investment. One business founder had this to say, “The productivity gain is the main thing for me with Office 365. It’s allowed everybody to be more productive, and if there is any element of downtime on hardware, it’s just a case of moving into another location, whether it’d be the next desk, office, or Starbucks.” Discover these findings and more when you download the free report: • Improved Business Continuity. How enhanced business continuity lead to an avoidance in lost billable hours of $15,000 annually. • Increased mobile worker productivity. How an investment in mobility saved45 hours per year per worker. • Lowered Security, Risk, and Compliance Costs. How an organization went from 15 data breaches per year
Tags : it management
     Microsoft Office 365
By: HP     Published Date: Jul 08, 2009
In these days of rampant data growth, a technology that can increase the effective capacity of a disk-based backup system by a ratio of up to 50:1 is big news. Data deduplication allows you to store up to 50 times more backup data into the same disk footprint — giving you a better chance of restoring your users' lost data from exactly the point they need it. This white paper explains how this innovative data deduplication solution works and also establishes how a 50:1 deduplication ratio may be achieved.
Tags : dynamic deduplication, 50:1, disk based backup, data, storage, rack, dedupe, data deduplication, hp storageworks, d2d backup systems, backup, data change
     HP
Start   Previous    1 2 3    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com