lost data

Results 51 - 60 of 60Sort Results By: Published Date | Title | Company Name
By: GFI     Published Date: Jun 03, 2009
More than ever, SMBs need to focus on security as part of their IT infrastructure, building around it rather than considering it as an afterthought. This has become even more critical over the past few years as many businesses have unwittingly lost their customers’ personal data due to security breaches, and as states and countries have responded by enacting laws to force the businesses to implement additional levels of protection.
Tags : gfi, smbs, small, medium, business, it infrastructure, security, windows nt
     GFI
By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
With horror stories in the news every week about lost or stolen laptops and backup tapes, the senior management team at Oregon Community Credit Union knew they had to do everything within their powers to protect their critical data as it traveled offsite to a third-party tape vaulting vendor. They were tasked with finding an affordable solution that would strike a balance between security, ease of use, and scalability.
Tags : storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
     Neoscale Systems, Inc.
By: Diligent Technologies     Published Date: Apr 11, 2008
Data de-duplication has the power to revolutionize the data protection process by significantly reducing capacity requirements. Plagued by media hype and vendor FUD, this message can be easily lost. This paper serves as a primer on data de-duplication.
Tags : deduplication, diligent, diligent technologies, storage
     Diligent Technologies
By: VMware     Published Date: Feb 20, 2009
According to the National Archives and Records Administration, 93 percent of companies that lost their data center for 10 days or more due to a disaster filed for bankruptcy within one year of the disaster. Don't let that happen to you, learn more today!
Tags : vmware, vmware virtualization, business continuity, it infrastructure, vmware esx platform, distributed resource scheduler, drs, recovery infrastructure
     VMware
By: VMware     Published Date: May 02, 2011
The cost of downtime and/or lost data can be devastating. For this reason, business continuity and disaster recovery (BC/DR) is becoming a critical mandate. Virtualization can keep your business running through many types of planned and unplanned IT outages. Download this white paper to learn more.
Tags : smb, vmware, virtualization, business continuity, disaster re vsphere, downtime, it failure, vms
     VMware
By: Idera     Published Date: Jan 22, 2013
STOLEN DATA LIVES ON; LOST DATA IS LOST FOREVER.
Tags : idera, data breaches, 2012, lost data, sony data thefts of 2011, data thefts, sony online entertainment, play station network
     Idera
By: Unitrends     Published Date: Jan 05, 2017
Exchange Online, SharePoint Online, and OneDrive for Business are the applications your business relies on every day. But without a smart backup plan, finding and restoring lost Office 365 data can take hours, days, or even longer. The facts are that data loss can occur in cloud-based applications, including Microsoft Office 365 and deleted items will be permanently removed after 14 days. Read our eBook to learn how to broaden your backup and recovery plan to include purpose built protection for Microsoft Office 365.
Tags : unitrends, microsoft office 365, backup, recovery, data loss, it management, enterprise applications
     Unitrends
By: Lookout     Published Date: Mar 28, 2017
In today’s Bring Your Own Device (BYOD) world more than a few IT managers have lost sleep over the thought of an employee device, loaded with sensitive company data, falling into the wrong hands. Lookout commissioned Forrester Consulting to conduct a national survey of IT managers in the Fall of 2013 that uncovered substantial security concerns related to mobile devices, especially around malware and data loss. Ultimately, the survey revealed that IT managers do not believe existing security solutions can adequately address the mobile security challenges faced by businesses today.
Tags : insights, mobile, security, byod, lookout
     Lookout
By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime of server migration have locked many IT teams into platforms that are no longer ideal. Migrations are often delayed or avoided—whether it’s moving data to the cloud or back on premises, or upgrading the hardware of the database software. This results in lost opportunities, unnecessary costs, and a lack of agility that today’s IT teams can no longer afford. Carbonite Move Powered by DoubleTake quickly and easily migrates physical, virtual, and cloud workloads over any distance with minimal risk and near-zero downtime. Using efficient real-time, byte-level replication technology, Carbonite Move creates a replica of the data, application, database, or entire server being migrated and keeps it in sync with the production system. The migrated data can be validated without disrupting business operations, and downtime is limited to the seconds or minutes required for cutover to the new server.
Tags : carbonite, doubletake, risk mitigation
     Carbonite
By: SAP Concur     Published Date: Aug 07, 2019
"If you’re automating routine Accounts Payable tasks such as matching payments and invoices, that’s a great start, but you’re only scratching the surface. Learn how to take your AP team to the next level by grabbing your copy of this SAP Concur sponsored CFO eBook on artificial intelligence for AP management. By deploying AI strategically for AP processing, you will: - Reduce the headaches of manual processing, lost invoices and other barriers - Achieve greater visibility into data to improve cash forecasting - Augment human decision-making to position your company for growth"
Tags : 
     SAP Concur
Start   Previous    1 2 3     Next   End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com