protection strategy

Results 1 - 25 of 70Sort Results By: Published Date | Title | Company Name
By: Zscaler     Published Date: Jun 19, 2019
Le regole del gioco sono cambiate: le applicazioni stanno ormai migrando verso il cloud e gli utenti possono avere accesso da qualsiasi location senza mai il bisogno di collegarsi al corporate network. E’ quindi indispensabile ripensare l’architettura della sicurezza. Scoprite con questo documento come proteggere i vostri attivi strategici con le nostre funzionalita’ di Data Protection e Cloud DLP.
Tags : 
     Zscaler
By: Zscaler     Published Date: Jun 20, 2019
Les règles du jeu ont évolué : les applications migrent désormais vers le cloud, et les utilisateurs y accèdent de n’importe où, sans plus passer par le réseau de l’entreprise. Il est donc indispensable de repenser l’aspect sécurité de votre architecture. Découvrez avec ce livre blanc comment protéger vos actifs stratégiques avec les fonctionnalités Zscaler Data Protection et Cloud DLP.
Tags : 
     Zscaler
By: Zscaler     Published Date: Jun 20, 2019
Las reglas han evolucionado: las aplicaciones migran ahora hacia el cloud, y los usuarios acceden a ellas desde cualquier lugar, sin conectarse más a la red corporativa. Parece entonces esencial reconsiderar el aspecto seguridad de su arquitectura. Descubren con ese libro blanco como proteger sus activos estratégicos con las funcionalidades Zscaler Data Protection y Cloud DLP.
Tags : 
     Zscaler
By: Hitachi Vantara     Published Date: Mar 08, 2019
With IT under increasing pressure to deliver on availability service levels and make a positive impact on the business, having a robust, efficient, and reliable modern data protection strategy is a must. Making the right IT investments can be instrumental in moving the needle, and leveraging the right tools and technology can make a substantial impact.
Tags : 
     Hitachi Vantara
By: Hewlett Packard Enterprise     Published Date: May 11, 2018
Security is a looming issue for businesses. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new business opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Businesses need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : 
     Hewlett Packard Enterprise
By: Veritas     Published Date: Sep 30, 2016
This paper summarizes the trends that have made modernizing backup and recovery an urgent priority, the key requirements for solution offerings, and the unique capabilities of Veritas NetBackup™ Appliances in delivering a simple, complete, and cost-effective solution.
Tags : 
     Veritas
By: Hewlett Packard Enterprise     Published Date: Oct 24, 2017
Security is a looming issue for organizations. The threat landscape is increasing, and attacks are becoming more sophisticated. Emerging technologies like IoT, mobility, and hybrid IT environments now open new organization opportunity, but they also introduce new risk. Protecting servers at the software level is no longer enough. Organizations need to reach down into the physical system level to stay ahead of threats. With today’s increasing regulatory landscape, compliance is more critical for both increasing security and reducing the cost of compliance failures. With these pieces being so critical, it is important to bring new levels of hardware protection and drive security all the way down to the supply chain level. Hewlett Packard Enterprise (HPE) has a strategy to deliver this through its unique server firmware protection, detection, and recovery capabilities, as well as its HPE Security Assurance.
Tags : cloud optimization, cloud efficiency, cloud management, cloud assurance, cloud visibility, enterprise management, data management
     Hewlett Packard Enterprise
By: Hewlett Packard Enterprise     Published Date: Sep 25, 2017
IT organizations today must work in an “and” world, rather than an “or” world to meet the demands of their users. In an “and” world, IT architectures and strategies leverage an ever-broadening variety of tools while still supporting and propelling a single strategy.
Tags : 
     Hewlett Packard Enterprise
By: Commvault     Published Date: Jul 06, 2016
Around-the-clock global operations, data growth, and server virtualization all together can complicate protection and recovery strategies. They affect when and how often you can perform backups, increase the time required to back up, and ultimately affect your ability to successfully restore. These challenges can force lower standards for recovery objectives, such as reducing the frequency of backup jobs or protecting fewer applications, both of which can introduce risk. High-speed snapshot technologies and application integration can go a long way toward meeting these needs, and they have quickly become essential elements of a complete protection strategy. But snapshot copies have often been managed separately from traditional backup processes. Features like cataloging for search and retrieval as well as tape creation usually require separate management and do not fully leverage snapshot capabilities. To eliminate complexity and accelerate protection and recovery, you need a solution
Tags : commvault, intellisnap, netapp, backup, recovery, data growth, server virtualization, data protection, cifn, snap management, snapprotect, security
     Commvault
By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app, networking, security, it management, enterprise applications, storage, data management
     Commvault
By: Hewlett Packard Enterprise     Published Date: Aug 23, 2018
IT organizations today must work in an “and” world, rather than an “or” world to meet the demands of their users. In an “and” world, IT architectures and strategies leverage an ever-broadening variety of tools while still supporting and propelling a single strategy.
Tags : 
     Hewlett Packard Enterprise
By: Oracle     Published Date: Aug 02, 2018
Enterprise data protection has grown unwieldy, with systems from various vendors claiming to protect all of an enterprise’s data—and none of them doing a particularly good job of addressing mission-critical data recoverability requirements. It’s a situation that introduces risk and raises concerns about IT’s ability to recover in a timely manner and without data loss from outages caused by cybercrime, system failures, or human error. An integrated strategy that focuses on the complete data recovery needs of an enterprise can eliminate data loss, cut recovery times, and reduce IT complexity—while ensuring data security and positioning the enterprise to seamlessly take advantage of the cloud.
Tags : 
     Oracle
By: Rubrik EMEA     Published Date: Apr 15, 2019
Ransomware is not going away. This makes it imperative for businesses across all industries to adopt a data management strategy of multi-layered security, easy automation, and quick recovery. To learn more about Rubrik and how it can ?t into your ransomware protection strategy while simplifying data protection across your entire datacenter, visit www.rubrik.com. As the leading next-generation data protection solution, Rubrik deploys as a plug-and-play appliance in less than an hour and has been adopted across all verticals and organization sizes including Fortune 50 companies.
Tags : data, backup, recovery, backups, solution, security, encryption, cyber, privacy, infrastructure
     Rubrik EMEA
By: HPE APAC     Published Date: Feb 24, 2017
In this white paper, we will examine the storage challenges faced by businesses. We consider the case for the allflash data center, discuss the importance of a flash-optimized data protection strategy, and provide tips for gaining support from business leaders for your vision.
Tags : flash storage, storage, sata protection, data protection strategy, data center, allflash, best practices
     HPE APAC
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Maintain visibility and control, regardless of device or OS. The consumerisation of enterprise information technology is one of the most significant security concerns today. Gartner's Analyst Ken Delaney explains the impact of consumerisation on enterprise IT.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
     Trend Micro, Inc.
By: Trend Micro, Inc.     Published Date: Jul 19, 2011
Answers to Your Mobile Device Data Protection Questions. The IT landscape is changing quickly, Get expert advice on developing a strategy and learn how your organization can manage security on employee-owned mobile devices.
Tags : trend micro, internet content security, smart protection network, internet security, enterprise business security, worry-free business security, web threat management, australia, cloud, android mobile security, antivirus, consumerisation of it, enterprise mobile management, enterprise mobile security, enterprise network security, mobile device management, ipad mobile device, ipad, iphone, it strategy
     Trend Micro, Inc.
By: LifeLock     Published Date: Mar 02, 2015
Find out why LifeLock identify theft protection is the right choice for your business with this quick guide to our technology, leadership team, marketing strategy and more.
Tags : 
     LifeLock
By: CrowdStrike     Published Date: Feb 01, 2017
The frequency of “mega breaches” continues to rise at an alarming rate. In fact, crippling incidents involving tens of millions of customer records, theft of highly valuable intellectual property, and related criminal activity have become commonplace. This report asserts that many such breaches could be prevented by deploying next-generation endpoint protection technology in concert with an aggressive proactive hunting strategy. This potent combination provides the most effective means to reduce attack surfaces and defend against advanced adversaries.
Tags : 
     CrowdStrike
By: Carbonite     Published Date: Oct 12, 2017
Today it is possible, even for smaller organizations, to establish both backup and full-fledged hybrid data protection under one robust onsite/offsite underpinning. ESG has four recommendations to assist such organizations as they try to pursue a disk-to-disk-to-cloud data protection strategy in the right way, with particular consideration for EVault by Carbonite.
Tags : evault, midsized businesses, data protection strategy, hybrid data protection, backup, recovery
     Carbonite
By: Barracuda     Published Date: May 30, 2019
Use a multi-layered protection strategy to defend your business, data and people
Tags : 
     Barracuda
By: Barracuda     Published Date: Jun 18, 2019
Use a multi-layered protection strategy to defend your business, data and people
Tags : 
     Barracuda
By: Schneider Electric     Published Date: May 20, 2019
Developing an optimal arc flash protection strategy for a given facility can be difficult due to the number of solutions and system variables involved. Effective arc flash hazard reduction is best achieved by establishing an overall system protection strategy that accounts for safety and operational requirements as well as system reliability and availability. An overview of available solution categories and application guidance based on experience in a wide variety of facility types is presented in order to assist engineers trying to implement “safety by design” principles to help deal with arc flash hazards. The approach provided addresses the complexities of the trade-offs between competing priorities and provides tools that help users develop effective protection strategies for the unique circumstances in a given facility.
Tags : consulting, protection strategy, schneider electric
     Schneider Electric
By: Carbonite     Published Date: Jan 04, 2018
Backup and high availability are both essential forms of protection that fulfill different roles within a data protection strategy. So which type of protection is right for different systems? According to recent analyst reports, experts recommend a blended approach that aligns data protection with type of data.By aligning data protection with data urgency, businesses can ensure higher levels of resiliency and reduce demands on internal resources.
Tags : 
     Carbonite
By: NetApp     Published Date: Jan 08, 2016
This white paper examines how existing data protection strategies can prove to be unsuitable or are not optimized for new production capabilities.
Tags : data protection, data protection strategy, optimization, production capabilities, cloud computing, netapp, it management, enterprise applications
     NetApp
By: Carbonite     Published Date: Oct 10, 2018
Backup and high availability are both essential forms of protection that fulfill different roles within a data protection strategy. So which type of protection is right for different systems? According to recent analyst reports, experts recommend a blended approach that aligns data protection with type of data.1 By aligning data protection with data urgency, businesses can ensure higher levels of resiliency and reduce demands on internal resources.
Tags : 
     Carbonite
Start   Previous   1 2 3    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com