lost data

Results 1 - 25 of 60Sort Results By: Published Date | Title | Company Name
By: Avalere     Published Date: Apr 02, 2007
Laptops, USB devices, and other endpoint devices foster a flexible and more productive work environment, yet also increase a company's exposure to the loss or theft of critical information. Avalere inventories, protects, and controls your company’s laptop, desktop or removable storage device information to mitigate risks of lost or stolen equipment.
Tags : mobile computing, lost laptop, lost equipment, mobile data systems, computer loss, equipment loss, risk management, avalere
     Avalere
By: Blue Coat     Published Date: Dec 03, 2015
10 Tips for Protecting Data in the Cloud from Blue Coat
Tags : 
     Blue Coat
By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime of server migration have locked many IT teams into platforms that are no longer ideal. Migrations are often delayed or avoidedówhether itís moving data to the cloud or back on premises, or upgrading the hardware of the database software. This results in lost opportunities, unnecessary costs, and a lack of agility that todayís IT teams can no longer afford. Carbonite Move Powered by DoubleTake quickly and easily migrates physical, virtual, and cloud workloads over any distance with minimal risk and near-zero downtime. Using efficient real-time, byte-level replication technology, Carbonite Move creates a replica of the data, application, database, or entire server being migrated and keeps it in sync with the production system. The migrated data can be validated without disrupting business operations, and downtime is limited to the seconds or minutes required for cutover to the new server.
Tags : carbonite, doubletake, risk mitigation
     Carbonite
By: Carbonite     Published Date: Apr 09, 2018
IT admins tasked with restoring servers or lost data during a disruption are consumed with a single-minded purpose: successful recovery. But it shouldnít take an adverse event to underscore the importance of recovery as part of an overall backup strategy. This is especially true with large datasets. Before you consider how youíre going to back up large datasets, first consider how you may need to recover the data. Variables abound. Is it critical or non-critical data? A simple file deletion or a system-wide outage? A physical server running onsite or a virtual one hosted offsite? These and a handful of other criteria will determine your backup and disaster recovery (BDR) deployment. What do we mean by large? A simple question with a not-so-simple answer. If your total data footprint is 5 TB or more, thatís considered large. But what kind of data is it? How many actual files are there? How frequently do they change? How much can they be compressed? Itís likely that two different 5 TB en
Tags : 
     Carbonite
By: Carbonite     Published Date: Apr 09, 2018
Malware that encrypts a victimís data until the extortionistís demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually.1 According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands.2 No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.3 Ransomware is the equivalent of catastrophic data loss, except
Tags : 
     Carbonite
By: Carbonite     Published Date: Oct 10, 2018
IT admins tasked with restoring servers or lost data during a disruption are consumed with a single-minded purpose: successful recovery. But it shouldnít take an adverse event to underscore the importance of recovery as part of an overall backup strategy. This is especially true with large datasets. Before you consider how youíre going to back up large datasets, first consider how you may need to recover the data.
Tags : 
     Carbonite
By: Cisco     Published Date: Feb 13, 2009
This white paper details how continuous data protection for files is important in this current day where lost data can significantly affect productivity, customer satisfaction, and, ultimately, revenue.
Tags : cisco, data protection, network storage systems, data recovery, data loss, security, data management
     Cisco
By: CloudEndure     Published Date: Oct 12, 2018
Maintaining business continuity is your highest priority. In todayís commercial landscape, business continuity depends on the efficient, uninterrupted flow of data across the organization Ė from operations to sales to fulfillment. Even a brief lapse in workload continuity can mean thousands of lost sales opportunities, disruption to production, and compromised customer trust. The causes of those lapses can range from natural disasters to mechanical failure or human error. You need a data platform and a proactive disaster recovery (DR) strategy that will help you stay up and running in the event that your physical infrastructure is unavailable for any length of time. BUSINESS CONTINUITY Fulfilling orders, providing a high level of customer service, and keeping consumers engaged all depend on the efficient, uninterrupted flow of data throughout your organization. CUSTOMER TRUST Above all, protecting customer dataóespecially personally identifiable information (PII) óis critical
Tags : 
     CloudEndure
By: Coupa Software     Published Date: Nov 04, 2014
The benefits of eInvoicing include fewer lost invoices, quicker approval cycles, increased on-time payments, and improved vendor satisfaction. Yet only 20% of companies receive more than 50% of their invoices electronically. This Paystream Advisors survey report includes data on how eInvoicing is improving AP efficiency and why some organizations are still slow to adopt (and why they shouldn't be).
Tags : einvoicing, approval cycles, vendor satisfaction, efficiency, on-time payments, invoicing, enterprise applications
     Coupa Software
By: Dell     Published Date: Feb 04, 2016
This infographic shows you how your organizationís lost laptop will not be compromised. Thatís right, with Dellís Data | Encryption unauthorized third parties canít access your data. Within this infographic, learn how you and your employees can finally have the data protection you need.
Tags : 
     Dell
By: Diligent Technologies     Published Date: Apr 11, 2008
Data de-duplication has the power to revolutionize the data protection process by significantly reducing capacity requirements. Plagued by media hype and vendor FUD, this message can be easily lost. This paper serves as a primer on data de-duplication.
Tags : deduplication, diligent, diligent technologies, storage
     Diligent Technologies
By: Double-Take Software     Published Date: Sep 24, 2009
Download this free whitepaper to learn how combining Double-Take Software's replication solutions with virtualization technologies, organizations can achieve additional flexibility and cost-effectively protect their critical data and applications.
Tags : disaster recovery, recoverability, virtualization, double-take, lost data, cdm, cam
     Double-Take Software
By: Druva     Published Date: Nov 09, 2018
The all-encompassing data center is a thing of the past. Modern data environments are distributed and include remote and branch offices, mobile devices, and the Internet of Things (IoT) as well as cloud solutions such as infrastructure as a service (IaaS), platform as a service (PaaS), and software as a service (SaaS). Thereís more critical data to back up than ever before. Plus, data silos and fragmented management mean poor visibility, which can make it difficult to comply with regional data residency and security rules as well as service-level agreements (SLAs). On-premises data protection has not kept pace. According to a survey by Fujitsu, 45% of IT managers said they had lost data or productivity related to data protection inefficiency within the last year.1 Often, this is because on-premises backups are cumbersome and do not always happen on time.
Tags : 
     Druva
By: EMC     Published Date: Nov 06, 2006
Offsite media can be lost or stolen while in transit, exposing sensitive information to potential misuse. By using AES encryption on backup data, a business can feel confident that sensitive customer information will remain safe and secure, even if the backups tapes are lost of stolen.
Tags : disaster plan, encryption, disk backup, tape backup, offsite storage, offsite, off-site, backup data, data backup, aes encryption, data protection, emc, emc insignia, storage
     EMC
By: FITIRI     Published Date: Nov 11, 2008
Traditionally data accusation in plants has been done using paper log sheets and manual spreadsheets, which focuses more on documentation.  As a result, the exercise of taking plant readings has become routine, to the point where the true benefit of the exercise is lost.  Technology and software now gives us the ability to automate data collection and manipulation for increased efficiency.
Tags : fitiri, wireless solutions, ammonia plants, improve safety, process plants operations
     FITIRI
By: Forcepoint     Published Date: Jun 06, 2019
Your people access and share data using a myriad of different cloud apps. The bad news is, you probably have no idea how your data is used, where it travels to and the level of associated risk. Youíve lost visibility and control. The good news is, we can help get it back. Register now for a FREE Cloud Threat Assessment and detailed report of your cloud-application risk posture. This in-depth assessment will show you: Cloud usage patterns. How potentially harmful activities happen in cloud applications across your organization. Geographical usage. Which countries your data is traveling to and from (you may be surprised). Privileged users. Do you have more administrators than you need? Dormant users. Are you overspending on unused licenses? Riskiest users. Who are your riskiest users and why? You'll receive customized assessments on Office365, Box, G Suite, and Salesforce.com.
Tags : 
     Forcepoint
By: GE Power     Published Date: Oct 05, 2016
Ten Billion dollars in production is lost annually from unplanned downtime in the power sector. 95% of alarms donít matter. In this eBook learn how power leaders are leveraging Asset Performance Management (APM) to drive less unplanned downtime, safer operations and a competitive edge with data and predictive analytics.
Tags : power plant asset management software, plants operation management software, asset performance management system, emissions management software
     GE Power
By: GFI     Published Date: Jun 03, 2009
More than ever, SMBs need to focus on security as part of their IT infrastructure, building around it rather than considering it as an afterthought. This has become even more critical over the past few years as many businesses have unwittingly lost their customers’ personal data due to security breaches, and as states and countries have responded by enacting laws to force the businesses to implement additional levels of protection.
Tags : gfi, smbs, small, medium, business, it infrastructure, security, windows nt, exchange server, aup, acceptable use policy, remote access policy, secure, internet policy, it management
     GFI
By: Gigamon     Published Date: Jun 21, 2019
Organisations have invested heavily in cybersecurity tools and yet more than five million data records are lost or stolen every day. The problem is not that todayís cybersecurity tools are badly designed or missing features, the problem is that surging volumes of network traffic overwhelm security tools, causing administrators to use sampling or disable advanced features in order to preserve application performance. Also, security tools and IT staff donít get all the data they need to detect and respond to outside attacks and insider incidents, because they are faced with ďblind spotsĒ in data collection. Read this business brief in local language to find out how
Tags : 
     Gigamon
By: Hewlett-Packard     Published Date: Aug 02, 2013
Every data center IT manager must constantly deal with certain practical constraints such as time, complexity, reliability, maintainability, space, compatibility, and money. The challenge is that business application demands on computing technology often donít cooperate with these constraints. A day is lost due to a software incompatibility introduced during an upgrade, hours are lost tracing cables to see where they go, money is spent replacing an unexpected hardware failure, and so on. Day in and day out, these sorts of interruptions burden data center productivity. Sometimes, itís possible to temporarily improve the situation by upgrading to newer technology. Faster network bandwidth and storage media can reduce the time it takes to make backups. Faster processors ó with multiple cores and larger memory address space ó make it possible to practically manage virtual machines.
Tags : bladesystem, blade, infrastructure, blade infrastructure
     Hewlett-Packard
By: HP     Published Date: Jul 08, 2009
In these days of rampant data growth, a technology that can increase the effective capacity of a disk-based backup system by a ratio of up to 50:1 is big news. Data deduplication allows you to store up to 50 times more backup data into the same disk footprint — giving you a better chance of restoring your users' lost data from exactly the point they need it. This white paper explains how this innovative data deduplication solution works and also establishes how a 50:1 deduplication ratio may be achieved.
Tags : dynamic deduplication, 50:1, disk based backup, data, storage, rack, dedupe, data deduplication, hp storageworks, d2d backup systems, backup, data change
     HP
By: HP Inc.     Published Date: Sep 11, 2018
A point of sale system is unlike any other piece of technology employed by businesses. It is a sophisticated computer system that manages sensitive customer data in a public space, often accessible by a large number of employees, in addition to customers or anyone else in the area. Because of this, itís a unique target for compromised data. Plus, itís mission-critical nature means compromised systems can bring a business to a halt, resulting in lost business. It is estimated that organizations have a one-in-four chance of experiencing a data breach1. Within the business space, itís estimated that 89 percent of retail data breaches were targeted at point of sale systems, according to the 2018 Verizon Data Breach Report2. At HP, data integrity is of utmost importance, and we have prioritized advanced security in our technology at every step of the design process.
Tags : 
     HP Inc.
By: HPE     Published Date: Dec 05, 2014
Data is the lifeblood of your business. To compete in todayís global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limitódemanding more storage and bandwidth, greater security and agility, and higher availability than ever before.
Tags : platform, technology, lync, server, sql, flex-bundles, proliant, processors, server experience, customers, configuration, storage, networking, data management
     HPE
By: HPE     Published Date: Dec 05, 2014
Data is the lifeblood of your business. To compete in todayís global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limitódemanding more storage and bandwidth, greater security and agility, and higher availability than ever before.
Tags : platform, technology, lync, server, sql, flex-bundles, proliant, processors, server experience, customers, configuration, storage, networking, data management
     HPE
By: IBM     Published Date: Oct 10, 2013
Mobile devices, including smartphones and tablets, enable increasing numbers of employees to work "anywhere, anytime."The security of enterprise data is a key concern, particularly on mobile devices that are easily lost or stolen. The security risk is further heightened by the proliferation of employee-owned mobile devices in many enterprises. Employees will almost always take the path of least resistance in leveraging mobile devices for business purposes, which may lead to unsafe computing practices. A clearly documented and enforceable mobile security policy is critical to reducing the risk of data loss.
Tags : mobile, mobile enterprise, mobile environment, security, mobile security, mobile device, wireless, mobile strategy, byod, mobile infastructure, application management, data, security, safeguarding, telecommunications, enterprise applications
     IBM
Start   Previous   1 2 3    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideHPC White Paper Library contact: Kevin@insideHPC.com