business protection

Results 201 - 225 of 287Sort Results By: Published Date | Title | Company Name
Published By: Symantec     Published Date: Jun 02, 2011
Learn how Symantecs SBE Solutions faired when benchmarked by PassMark Software.
Tags : 
symantec sbe solutions, passmark software, performance testing, small business, endpoint protection security software, windows 7 ultimate edirion, performance metrics
    
Symantec
Published By: BlackBerry Cylance     Published Date: Sep 18, 2019
“More than 70 percent of cyber attacks target small businesses," according to a National Cyber Security Alliance estimate. Yet 68 percent of small business owners in a recent survey seemed oblivious to the threat. Why the disconnect? What should they be doing to protect their business-critical systems and data? How can small businesses wring maximum value from their cybersecurity investments? Where do AI-based endpoint protection, detection, and response platforms fit into the mix? Read this BlackBerry Cylance sponsored white paper, Small Organizations Still Need Big Security, to find out.
Tags : 
    
BlackBerry Cylance
Published By: CDW     Published Date: Feb 27, 2015
Man Investments is one of the world’s largest independent alternative asset managers. With a fast moving and diverse IT infrastructure, Man needed to be able to automate software license compliance reporting in conjunction with optimizing license usage and sourcing.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
Published By: Cohesity     Published Date: May 04, 2018
In today’s application driven, cloud agnostic world, many organizations still rely on legacy, multiple point backup and recovery products that consist of backup software, target storage, media and master servers, and cloud gateways, all from different vendors. With slow backups and long recovery times of their existing backup products, organizations are unable to meet their tight business SLAs. Constant forklift upgrades and complex management UIs make it expensive to manage the current backup and recovery environments. There has to be a simpler, more cost-effective way to keep your data safe. This is the problem that Cohesity is designed to solve, with an entirely new approach to data protection. Download this solution brief to learn more about Cohesity and its advantages!
Tags : 
    
Cohesity
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Chartered in 1973, San Francisco-based Spectrum Federal Credit Union serves over 12,000 members. When the issue arose on how to protect their members’ personal data residing on backup tapes, Spectrum FCU took no chances – they and their Techical Advisory Board made the decision to encrypt this important information with the help of NeoScale Systems, an undisputed leader in this emerging market.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Venafi     Published Date: Jul 27, 2015
Read the solution brief to close SSH security gaps and protect your business.
Tags : 
ssh security gaps, business protection, cybersecurity, cryptographic security, data protection, security controls, ssh key usage, ssh keys management
    
Venafi
Published By: IBM     Published Date: Jul 15, 2016
A white paper discussing why global threat intelligence is more important than ever in the fight against web fraud, and how IBM uses this threat intelligence to deliver automated threat protection to financial institutions.
Tags : 
best practices, business intelligence, ibm, finance, automated protection
    
IBM
Published By: HP and Intel® Xeon® processors     Published Date: Dec 20, 2012
Learn more about HP Business Protection, which offers select, preconfigured disaster recovery solutions, helps hospitals manage risk and keep critical IT infrastructure up and running.
Tags : 
strategy guide, healthcare, business protection, healthcare, hospitals, practice, information technology, practice management
    
HP and Intel® Xeon® processors
Published By: HP-Intel®     Published Date: Jul 22, 2013
Strategy guide to Business Protection for Hospitals
Tags : 
hp business protection, business protection, hp converged infrastructure, off-site disaster recovery
    
HP-Intel®
Published By: Sponsored by HP and Intel®     Published Date: Nov 14, 2012
In this strategy guide to business protection, you will learn about HP Business Protection and it's offerings in pre-configured disaster recovery solutions and how it helps hospitals to manage risk and keep critical IT structures running.
Tags : 
business protection, hp businses protection, hp converged infrastructure
    
Sponsored by HP and Intel®
Published By: HP and Intel® Xeon® processors     Published Date: Dec 20, 2012
Learn more about HP Business Protection, which includes components that improve reliability, disaster recovery and overall systems management, help physician practices manage IT risk, improve services and protect their business.
Tags : 
strategy guide, business protection, physician practices, healthcare, information technology, practice management
    
HP and Intel® Xeon® processors
Published By: HP-Intel®     Published Date: Jul 22, 2013
When it comes to IT risk, most people think in terms of disaster recovery and protecting critical patient data in the event of a natural disaster like a hurricane or an earthquake.
Tags : 
strategy guide, disaster recovery, healthcare, hp healthcare, off-site disaster recovery
    
HP-Intel®
Published By: Spectrum Enterprise     Published Date: Oct 05, 2017
Most businesses have experienced an IT or technology outage in the past five years. Outages and disruptions result in business and IT challenges. Business continuity and disaster recovery (BCDR) plans ensure a company's ability to continue business uninterrupted and survive unforeseen disruptions. By adopting network diversity, IT pros expect to experience a variety of business and IT benefits, including protection against unexpected disruptions. Check out this easy-to-absorb infographic, based on Forrester survey data, to learn how your peers view the importance and structure of BCDR strategies.
Tags : 
    
Spectrum Enterprise
Published By: Symantec     Published Date: Nov 09, 2006
Security and compliance risks are greater than ever, and businesses depend on their data being protected when stored internally and taken offsite. New encryption capabilities offered by Backup Exec 11d for Windows Servers offer secure protection from unauthorized access. Learn more about encryption capabilities in Backup Exec 11d.
Tags : 
backup, backup and recovery, disaster recovery, compliance, data protection, encryption, access control, backup exec
    
Symantec
Published By: Tyco Integrated Security     Published Date: Dec 08, 2014
Running a business is hard. So don’t make it even harder on yourself by piling on security tasks without involving an outside expert.
Tags : 
business protection, intrusion, fire safety
    
Tyco Integrated Security
Published By: HP     Published Date: Aug 26, 2014
Make sense of modern storage technologies and architectures and how they might impact your business. HP helps you understand unstructured data, block and object storage, storage system architectures, and storage networking options. Discover how the right mix or technologies such as virtualization, file sharing, and deduplication can help control storage costs, protect your data from loss or corruption, and provide reliable access to critical business information for every authorized user. See how.
Tags : 
data, business, technology, portfolio, cloud-based, support, portal, solution
    
HP
Published By: Cohesity     Published Date: May 09, 2018
The growing importance—and complexity—of data protection means old approaches no longer will get the job done in an era of exploding data volumes and ever-changing business requirements. It’s time to reimagine and reengineer your IT infrastructure for a more efficient, affordable and manageable data protection framework.
Tags : 
    
Cohesity
Published By: Cohesity     Published Date: Aug 09, 2019
The growing importance—and complexity—of data protection means old approaches no longer will get the job done in an era of exploding data volumes and ever-changing business requirements. It’s time to reimagine and reengineer your IT infrastructure for a more efficient, affordable and manageable data protection framework.
Tags : 
    
Cohesity
Published By: DataCore     Published Date: Jun 06, 2019
With so many moving pieces involved in business continuity and disaster recovery planning, anticipating the downstream impact of new SAN arrays, hyperconverged systems, and disaster recovery site relocation is increasingly more difficult. Learn how DataCore™ SDS services help you adapt your safeguards accordingly in the face of these common initiatives and business challenges: - Storage Array Replacement - Mergers and Acquisitions - Cloud Replication - Hyperconverged Infrastructure - Multi-Site Metro Cluster
Tags : 
business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability
    
DataCore
Published By: EMC Backup & Recovery Solutions     Published Date: Mar 22, 2010
In this Solution Profile, we will concentrate on the importance of optimizing data protection for evolving virtual networks, and on working with a trusted partner. Virtualization technology works across all sizes of business to reduce costs, control management overhead, and increase flexibility. However, virtualization also requires that companies adapt their traditional backup and data protection practices to suit the rapidly changing virtualization infrastructure.
Tags : 
emc, vmware, taneja, virtual environments, virtualization, backup, data protection
    
EMC Backup & Recovery Solutions
Published By: CDW     Published Date: Feb 27, 2015
CDW’s Technology Insights guides provide a high-level, informative take on today’s most pressing IT solution areas and related issues. Speaking to the interests and concerns of IT managers and their staff, as well as their enterprise counterparts, the guides provide up-to-date summaries, strategic guidance and best practice tips on the technologies driving IT operations forward.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security
    
CDW
Published By: mindSHIFT Technologies     Published Date: Jul 01, 2014
In this whitepaper, you will learn how your company can benefit from cloud-based business continuity and the 10 steps it can take to execute an effective plan.
Tags : 
mindshift, cloud, cloud based business continuity plan, business continuity plan, data management, data protection, scalability, cloud architecture
    
mindSHIFT Technologies
Published By: Lumension     Published Date: Feb 07, 2014
Do you know about advanced threats? Would you know how to deal with them? This white paper will teach you the 5 tactics for dealing with those advanced persistent threats.
Tags : 
lumension, persistent threats, information security, it regimes, threat solution, risk mitigation, vulnerability management, layered defenses
    
Lumension
Published By: Vision Solutions     Published Date: Dec 31, 2007
Downtime and data loss pose intolerable risks to every business today. From IT departments to the Board Room, managers have seen the importance of business uptime and data protection to continued success, productivity and profitability.
Tags : 
aix, data protection, continuous data protection, cdp, high availability, disaster recovery, disk backup, tape backup
    
Vision Solutions
Published By: Trend Micro SaaS     Published Date: Dec 17, 2008
All businesses face a daily bombardment of email spam that consumes valuable IT staff time as well as end-user productivity. In addition, email is an attack vector for many types of security threats to businesses, including phishing, viruses, spyware, and malicious URLs. Given that all businesses are experiencing the financial pressures of a tightening world economy, coupled with the uncertainty of any near-term recovery, small and medium-sized business (SMB) managers are searching for ways to cut costs while continuing to maintain a consistent level of service and protection for their businesses.
Tags : 
saas, trend, trend micro, software as a service, smb, spyware, hacker, trendlabs
    
Trend Micro SaaS
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.