rto

Results 151 - 175 of 209Sort Results By: Published Date | Title | Company Name
By: ESET     Published Date: Jan 30, 2008
Anti-virus does much more than reactively detect known viruses; it proactively scans for unknown ones too. So, how do scanners really work? The aim of this paper is to reduce some of the confusion around the workings of AV technology, and to clarify what is realistic to expect from AV protection, particularly heuristic analysis.
Tags : heuristics, threat analysis, how av works, av signatures, traditional antivirus, norton, symantec, trend micro, mc afee, malware, threats, email, threat summary, threat report, viruses, eset, antivirus, nod32, internet threats, web-borne threats
     ESET
By: ESET     Published Date: Jan 30, 2008
Steganography is the science of hiding data inside of items, such as sound and picture files.  Listen to this podcast to learn more about steganography and the potential IT security concerns it poses.
Tags : embedded files, steganography, hiding data, secret files, coding, av signatures, traditional antivirus, norton, symantec, trend micro, mcafee, malware, threats, email, viruses, eset, antivirus, nod32, internet threats, web-borne threats
     ESET
By: Asure Software     Published Date: Jun 30, 2014
At the beginning of 2013, Asure Software undertook a survey of workplace managers around the globe. The objective was to further understand workplace utilisation, the challenges in managing shared workspace and the trends for the future.
Tags : asure, workplace space, space utilisation, efficient measurements, work productivity, effective use of space, workplace space software, enterprise applications
     Asure Software
By: CDW     Published Date: Apr 22, 2015
To get a handle on what was possible, and all that would be involved, Bob Stirton, director of information technology for the Kansas City Chiefs football organization, sent Network Engineer Scott Fletcher on a scouting mission to the 2012 Super Bowl at Lucas Oil Stadium in Indianapolis. Fletcher watched first-hand the inner workings of a recently installed Cisco Systems wireless network in full-on, gameday action.
Tags : wifi, wireless, technology, network, it management
     CDW
By: Kaseya     Published Date: Apr 04, 2013
A complete and holistic solution can help organizations create system snapshots that can be restored quickly and efficiently, getting users back up and productive immediately.
Tags : disaster recovery, backup, business continuity, virtualization, security, rto, rpo, sla
     Kaseya
By: NetApp     Published Date: Sep 19, 2013
Learn about FlexPod Select with Hadoop and how this enterprise class Hadoop has validated, pre-configured components that allow for faster deployment, higher reliability, and smoother integration with your existing applications and infrastructure.
Tags : flexpod select, hadoop, netapp, cisco, validated designs, cloudera, hortonworks, data, multi-structured data
     NetApp
By: Zerto     Published Date: May 31, 2016
Download this case study today to learn more about how ARA was able to complete a datacenter migration in a compressed window, and how they continue to use ZVR to deliver aggressive service levels across their infrastructure with a product that is very easy to use.
Tags : zerto, virtual replication, medical imaging, datacenter, servers
     Zerto
By: Carbonite     Published Date: Feb 22, 2017
Learn how Disaster Recovery as a Service (DRaaS) is tested by one of the industry’s leading authorities—and find out what results and documentation you should gain from recovery testing.
Tags : business backup, cloud backup, cloud disaster recovery, cloud recovery, data recovery, digital file recovery, disaster recovery, draas, full recovery, it environment recovery, recovery in the cloud, recovery testing, recovery plan, recovery time objective, rto, server recovery
     Carbonite
By: Carbonite     Published Date: Feb 22, 2017
Ensure the survival of your business data—and therefore your business—with these best practices for building a simple and effective disaster recovery plan.
Tags : backup and disaster recovery, bdr, business backup, cloud backup, cloud disaster recovery, cloud recovery, data center backup, data recovery, disaster recovery, draas, full recovery, hybrid backup, recovery plan, recovery point objective, recovery time objective, rpo, rto, server recovery
     Carbonite
By: Sponsored by HP and Intel®     Published Date: May 13, 2013
Learn how to design, build and manage an integrated, innovative cloud environment in your data center and sharpen your cloud computing knowledge to help your IT organization become more agile and efficient.
Tags : 
     Sponsored by HP and Intel®
By: VMware AirWatch     Published Date: Nov 12, 2015
Recentemente, una delle domande più comuni dei clienti è: “In che modo AirWatch supporta Office 365?” Molti chiedono se AirWatch possa controllare l’accesso ad Office 365 (O365) non solo sul loro sistema del desktop aziendale, ma soprattutto dai dispositivi mobili. Per fortuna AirWatch® by VMware® fornisce un alto livello di assistenza in modo che le aziende possano sfruttare al meglio O365 sui loro dispositivi mobili e la nostra recente integrazione con VMware® Identity Manager fornisce il primo framework nel settore del controllo di accesso flessibile per garantire che tutte le applicazioni di lavoro, tra cui O365, possano ottenere l’accesso solo da dispositivi gestiti e conformi.
Tags : airwatch, emm, office365, cloud, software development, it management, platforms, data management
     VMware AirWatch
By: VMware AirWatch     Published Date: Nov 12, 2015
L’une des questions que de nombreux clients se posent récemment est « Comment Office 365 est-il pris en charge par AirWatch ? » Beaucoup se demandent si AirWatch peut contrôler l’accès à Office 365 (O365) non seulement sur leurs systèmes de Bureau d’entreprise mais surtout sur leurs terminaux mobiles. AirWatch® by VMware® apporte un soutien complet aux organisations qui souhaitent utiliser O365 sur leurs terminaux mobiles. Notre récente intégration à VMware® Identity Manager fournit un cadre de contrôle d’accès adaptatif pour s’assurer que toutes les applications professionnelles, dont O365, sont uniquement consultées depuis des terminaux gérés et conformes.
Tags : airwatch, emm, office365, cloud, software development, it management, platforms, data management
     VMware AirWatch
By: Mimecast     Published Date: May 20, 2009
Mimecast delivers Software-as-a-Service based enterprise email management including archiving, discovery, continuity, security and policy. By unifying disparate and fragmented email environments into one holistic service that is always available from the cloud, Mimecast minimizes risk and reduces cost and complexity, while providing total end-to-end control of email.
Tags : mimecast, saas, software as a service, rto, email archive, seamless, medium-size business, zhara, compliance, esg, webmail, storage capacity, storage
     Mimecast
By: Symantec     Published Date: Jun 02, 2011
Download this white paper and learn how system-level protection can help your business keep data secure, available, and organized.
Tags : symantec, esg, data backup and recovery, system-level protection, data protection, rto, recovery time objective, rpo, cost reduction
     Symantec
By: Acxiom Corporation     Published Date: Jun 20, 2014
Consumers demand – no, expect – marketers to deliver highly relevant communications. Yet, daily headlines about security and privacy keep them on guard about use of their personal information. How do you reconcile the personalization privacy paradox? Guest speaker, Forrester Research, Inc.’s Fatemeh Khatibloo and Bryan Throckmorton of Acxiom will offer fresh findings on customer expectations regarding privacy and examples of how companies are building transparency and trust – and differentiating themselves – with preference centers that put more control in the hands of customers.
Tags : acxiom, forrester research, privacy, personalization, personal information, marketing, personalization privacy
     Acxiom Corporation
By: Riverbed     Published Date: Jul 11, 2017
Four Stages to Successful Cloud Adoption Forrester Research predicts 81% of companies expect to leverage the cloud for business-critical applications and services in the next two years. If you’re planning to move applications to the cloud, watch this webinar to learn how Asurion, an insurance provider with 280 million customers worldwide, undertook their cloud migration.
Tags : cloud, adoption, application, migration, performance
     Riverbed
By: SmartFocus     Published Date: Sep 04, 2015
Existen 1,75 millones de usuarios de smartphone constantemente conectados y tu cliente podría ser uno de ellos. Por ello, para que tus campañas de marketing sean un éxito, es vital comprender la experiencia del usuario de móviles y garantizar que cada detalle de tu campaña está perfectamente optimizado para dispositivos móviles. Si no lo haces, podrías perder la oportunidad de generar engagement y, lo que es peor, que tus mejores clientes se vayan a la competencia. Nuestros sencillos consejos de marketing móvil son muy fáciles de implementar y añadirán valor y relevancia a tus campañas.
Tags : marketing móvil, personalización, contextualización, itinerario del cliente, comportamiento del cliente, experiencia del cliente, engagement, relaciones con clientes, estrategia de marketing, campañas
     SmartFocus
By: SAS     Published Date: Mar 06, 2018
Machines learn by studying data to detect patterns or by applying known rules to: • Categorize or catalog like people or things • Predict likely outcomes or actions based on identified patterns • Identify hitherto unknown patterns and relationships • Detect anomalous or unexpected behaviors The processes machines use to learn are known as algorithms. Different algorithms learn in different ways. As new data regarding observed responses or changes to the environment are provided to the “machine” the algorithm’s performance improves. Thereby resulting in increasing “intelligence” over time.
Tags : 
     SAS
By: Double-Take Software     Published Date: Sep 24, 2009
Double-Take for Hyper-V allows customers to quickly recover virtual machines after any type of outage without the expense and complexity of clustering or shared storage.
Tags : double-take, virtualization, rpo, storage virtualization, hyper-v, recovery point objective, recovery time objective, rto
     Double-Take Software
By: Double-Take Software     Published Date: Dec 03, 2009
Download this paper today to learn about new solutions that use real-time data replication software to automatically backup branch office data to a central server to provide a simpler, more reliable and cost-effective way to protect your branch offices.
Tags : double-take, data protection, branch offices, backup, vss, rpo, rto, cdp
     Double-Take Software
By: Double-Take Software     Published Date: Jul 27, 2010
Application and data availability can make or break a business. These days backing up to the Cloud is a simple, cost effective way to get the advantages of a datacenter without the expense of creating and managing a physical center. Double-Take Cloud is a simple way to migrate, backup and restore data and applications to the cloud with minimal downtime and complete control over your expenses.
Tags : doubletake, cloud, backup, disk-to-disk, failure, recovery, physical center, rto, rpo
     Double-Take Software
By: Vision Solutions     Published Date: Jul 27, 2010
Double-Take Cloud is a simple way to migrate, backup and restore data and applications to the cloud with minimal downtime and complete control over your expenses.
Tags : doubletake, cloud, backup, disk-to-disk, failure, recovery, physical center, rto, rpo, vision
     Vision Solutions
By: Vision Solutions     Published Date: Sep 24, 2009
Double-Take for Hyper-V allows customers to quickly recover virtual machines after any type of outage without the expense and complexity of clustering or shared storage.
Tags : double-take, virtualization, rpo, storage virtualization, hyper-v, recovery point objective, recovery time objective, rto, vision
     Vision Solutions
By: Vision Solutions     Published Date: Dec 03, 2009
Download this paper today to learn about new solutions that use real-time data replication software to automatically backup branch office data to a central server to provide a simpler, more reliable and cost-effective way to protect your branch offices.
Tags : double-take, data protection, branch offices, backup, vss, rpo, rto, cdp, vision
     Vision Solutions
By: DoubleTake     Published Date: Jul 14, 2010
The Department of Homeland Security puts businesses in two categories: those who have already experienced the pain of losing valuable electronic data, and those who will at some point in the future. Well-prepared businesses know that deploying the right resources, processes and technology to protect vital HR information is important, but having adequate resources and technology in place to protect the same invaluable data in branch offices is just as important, though often overlooked. This paper will teach you how real-time data replication software can automatically backup branch office data to a central server for a simpler, more reliable and cost-effective way to protect your branch.
Tags : double-take, data protection, branch offices, backup, vss, rpo, rto, cdp
     DoubleTake
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com