system protection

Results 51 - 75 of 142Sort Results By: Published Date | Title | Company Name
Published By: Arbor     Published Date: Feb 07, 2013
HOW TO PROTECT YOUR DATA CENTER’S AVAILABILITY
Tags : 
arbor, firewalls, ddos protection, intrusion prevention systems, ips
    
Arbor
Published By: Egress ABM Pilot     Published Date: Oct 09, 2017
The EU General Data Protection Regulation (GDPR) represents a significant step change for data protection across EU member states. The EU GDPR also brings with it serious implications for organisations who suffer a breach. People will always make mistakes – and in busy and stressful workplaces such as banks and insurance firms the likelihood of this increases. Without the right processes and technologies in place to help avoid mistakes, sensitive client information remains at risk. This white paper provides financial services organisations with a four-step process to ensure compliance.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
Egress ABM Pilot
Published By: Egress ABM Pilot     Published Date: Oct 09, 2017
Patients trust healthcare organisations with vast amounts of their sensitive data – not just details on their medical and social wellbeing, but also personally identifiable information such as dates of birth and residential addresses. People will always make mistakes – and, unfortunately, in busy and stressful workplaces, such as hospitals and medical clinics, the likelihood of this increases. Without the right processes and technologies in place to help overcome this to avoid mistakes, sensitive patient information remains at risk.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
Egress ABM Pilot
Published By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod, cloud, credit union, email protection, hosted exchange, email security, messaging, cloud computing, dlp, encryption, data loss prevention, content filtering, email services
    
BAE Systems
Published By: Akamai Technologies     Published Date: Apr 25, 2018
DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
ddos, protection, practices, systems, attackers, applications, systems
    
Akamai Technologies
Published By: Druva     Published Date: Nov 09, 2018
The rise of virtualization as a business tool has dramatically enhanced server and primary storage utilization. By allowing multiple operating systems and applications to run on a single physical server, organizations can significantly lower their hardware costs and take advantage of efficiency and agility improvements as more and more tasks become automated. This also alleviates the pain of fragmented IT ecosystems and incompatible data silos. Protecting these virtualized environments, however, and the ever-growing amount of structured and unstructured data being created, still requires a complex, on-prem secondary storage model that imposes heavy administrative overhead and infrastructure costs. The increasing pressure on IT teams to maintain business continuity and information governance are changing how businesses view infrastructure resiliency and long-term data retention—they are consequently looking to new solutions to ensure immediate availability and complete protection of the
Tags : 
    
Druva
Published By: Akamai Technologies     Published Date: Jul 02, 2018
What to expect and how to prepare your best defense DDoS attackers launch hundreds of DDoS attacks every day. When a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, who to call, or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared is your best defense against DDoS attacks. This white paper explores best practices for building and maintaining a DDoS protection plan. You’ll learn what to expect from a DDoS attack, how to prepare, what to put in a DDoS runbook, and how to test your plan.
Tags : 
    
Akamai Technologies
Published By: IBM APAC     Published Date: Mar 19, 2018
IBM’s Spectrum Protect offering boasts more than 20 years of achievement in the protection and recovery of key IT systems. So, it would be easy to suppose that IBM’s new Spectrum Protect Plus and Spectrum Copy Data Management software offerings simply represent “Spectrum Protect with extra features.” That assumption would be incorrect. They are standalone, reimagined approaches aiming to solve a daunting IT challenge—virtualization protection/recovery—and aspiring to attain a coveted IT outcome—effective data management and enablement (DM&E), referred to by many as “copy data management” (CDM).
Tags : 
data protection, data availability, software defined storage
    
IBM APAC
Published By: Nasuni     Published Date: Nov 19, 2014
The global architecture and engineering firm Environmental Systems Design, Inc., had enough capacity to handle its data. The challenge was protecting that data. The firm would often have 15TB of data in production at a given time and its existing backup solutions simply could not keep pace. After quickly outgrowing several other systems, ESD turned to Nasuni’s enterprise storage as a service. Now, thanks to Nasuni’s automated backup, which delivers unlimited versioning, fast disaster recovery and an unmatched RPO, IT can stop worrying about backup and focus on its core mission of enhancing business productivity.
Tags : 
automated protection, enhanced productivity, data protection, backup solutions
    
Nasuni
Published By: STANLEY Healthcare     Published Date: Mar 24, 2015
Electronic infant protection systems have, to date, been department-level solutions. A new generation of Wi-Fi technology, however, expands infant protection hospital-wide, presenting new opportunities. This white paper reviews the steps required for healthcare IT professionals to select, design and deploy a Wi-Fi Infant Protection solution, in cooperation with clinical and security peers.
Tags : 
wi-fi, infant protection, hospitals, security, healthcare, information technology, practice management
    
STANLEY Healthcare
Published By: HP Inc.     Published Date: Sep 11, 2018
A point of sale system is unlike any other piece of technology employed by businesses. It is a sophisticated computer system that manages sensitive customer data in a public space, often accessible by a large number of employees, in addition to customers or anyone else in the area. Because of this, it’s a unique target for compromised data. Plus, it’s mission-critical nature means compromised systems can bring a business to a halt, resulting in lost business. It is estimated that organizations have a one-in-four chance of experiencing a data breach1. Within the business space, it’s estimated that 89 percent of retail data breaches were targeted at point of sale systems, according to the 2018 Verizon Data Breach Report2. At HP, data integrity is of utmost importance, and we have prioritized advanced security in our technology at every step of the design process.
Tags : 
    
HP Inc.
Published By: Oracle     Published Date: Oct 20, 2017
Your enterprise runs its critical applications on Oracle Databases, and as an enterprise IT leader, maintaining the performance and availability of your databases is among your top priorities. Any degradation in performance or loss of data could result in serious business disruption and loss of revenue, so protecting this vital asset is a must. There are many causes of data loss— administration errors, system or media failures, cyberattacks, and more—but we often overlook design flaws in the very systems meant to protect data: general-purpose backup systems. Many existing data protection solutions fail to meet the demands of critical databases because they treat them as generic files to copy as opposed to specialized resources. Taking a generic approach to database backup and recovery not only exposes you to the risk of data loss, it also negatively impacts performance and makes it difficult to recover within acceptable timeframes.
Tags : 
    
Oracle
Published By: Oracle     Published Date: Oct 20, 2017
Traditional backup systems fail to meet the needs of modern organizations by focusing on backup, not recovery. They treat databases as generic files to be copied, rather than as transactional workloads with specific data integrity, consistency, performance, and availability requirements. Additionally, highly regulated industries, such as financial services, are subject to ever?increasing regulatory mandates that require stringent protection against data breaches, data loss, malware, ransomware, and other risks. These risks require fiduciary?class data recovery to eliminate data loss exposure and ensure data integrity and compliance
Tags : 
    
Oracle
Published By: Oracle     Published Date: Apr 03, 2012
Although more than two-thirds of confidential information is regulated through database management systems, no computer security program offers adequate protection for the databases against the main threats affecting them today. Oracle, the leader in databases technologies, offers security solutions for the protection of all layers of the database.
Tags : 
grid computing, oracle, database applications
    
Oracle
Published By: Tripp Lite     Published Date: Jun 28, 2018
One of the fundamental decisions in the design of data centers, server rooms and network closets is which uninterruptible power supply (UPS) systems to use. You cannot be certain that the power you receive from your local utility will be suitable for your equipment, or that it will always be available. And even when you are receiving good-quality power from the utility, equipment inside your facility (such as electric motors) can introduce power problems. A network/server UPS system conditions input power 24x7 to ensure that your equipment always receives reliable power and protection from damaging and disruptive power problems. A network/server UPS system also supports your equipment during power failures, providing enough battery backup runtime to outlast shorter outages. During longer outages, the UPS system will provide enough runtime to save files and gracefully shut down systems or to ensure that equipment is powered until standby generators are ready to support the load. Choosi
Tags : 
    
Tripp Lite
Published By: Kaspersky     Published Date: Feb 05, 2015
This White Paper provides information on how to ensure protection from both regular malware and sophisticated targeted attacks.
Tags : 
cyberthreats to ics systems, protect from malware, protect from targeted attacks, ics, it security, ensure ics security, protection measures
    
Kaspersky
Published By: Symantec.cloud     Published Date: Sep 12, 2012
Download this whitepaper to learn three useful steps to protect your virtual systems. There's no better time than the present to give your virtual systems top-of-the-line backup and restore protection.
Tags : 
virtual systems. virtualization, backup and recovery, backup automation, symantec
    
Symantec.cloud
Published By: Quest Software     Published Date: Jul 28, 2011
In this white paper Quest's data protection experts offer five tips for effective backup and recovery to help you avoid the challenges that might keep you from fully protecting your virtual assets and infrastructure.
Tags : 
quest, storage virtualization, it management, systems management solutions, virtualization managemen, windows, database, application, oem, innovation accelerator, smb, recovery, data protection, identity management, development, optimization, access management, migration, consolidation, performance
    
Quest Software
Published By: Cloudian     Published Date: Feb 15, 2018
Not so long ago, if you asked a business executive, “what is the most irreplaceable part of your business?” they might have pointed at their building or their employees. The really forward-thinking execs may have chosen their customers. But the reality is that businesses have insurance to deal with the loss of a building; they can hire new employees; and they can acquire new customers. The one thing that is truly irreplaceable is their data. Lose that and you really are out of business. The potential risks to your data can be as subtle as the malfunction of tiny areas on a disk drive or as enormous as the failure of an entire data center. That means it’s not enough just to protect your data — you must also select the best way to protect it. To deliver that protection in an economical and rapidly recoverable way requires a system that gives you complete control to determine levels of data protection based on the type of data. In this paper, we’ll talk about the science of data protect
Tags : 
    
Cloudian
Published By: Veeam '18     Published Date: Mar 13, 2018
In today’s digital economy, IT organizations are increasingly using public cloud technologies and services to meet their needs for increased agility and innovation, as well as cost management. This use of public cloud technologies is further complicated when companies use multiple cloud service providers, a concept also known as multi-cloud, and attempt to integrate on- and off-premises environments, known as hybrid cloud. IT organizations now must manage systems that span across both multi-cloud and hybrid cloud environments, which presents new challenges for data protection. The Veeam Availability Platform offers solutions that can provide data protection to, from, and within multi-cloud environments, ensuring companies can fully leverage their public cloud providers and existing on-premises systems.
Tags : 
cloud, enterprise, solutions, digital, organizations
    
Veeam '18
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Security Innovation Alliance Partners have integrated, tested, and certified their security solutions to work with McAfee Enterprise Security Manager. We have collaborated with our partners to simplify the integration of these products in even the most complex customer environments. This provides a truly connected security ecosystem that optimizes the value of your existing investments, improves efficiency, maximizes protection, and reduces operational costs.
Tags : 
entity, analytics, mcafee, enterprise, security, customer, environments
    
McAfee EMEA
Published By: Webroot UK     Published Date: Jan 30, 2014
In 2014, hackers and cyber thieves will continue to change their tactics, using new exploits to infect systems and steal data. This Executive Brief discusses the top five malware trends to keep an eye out for in 2014 and how Webroot SecureAnywhere can provide the endpoint protection that companies will need to be safe in 2014.
Tags : 
webroot, security, esecurity, cyber threat, malware, malware trends, breaches, safeguard, data protection, ddos attacks, web gateway security, online threats, virus, spyware protection, anti-phishing protection
    
Webroot UK
Published By: Shavlik Technologies     Published Date: Dec 14, 2010
Whalen Furniture needed an improved patch management solution that was more efficient, less time consuming, reduced risk, and ensured uptime on a 24/7 basis to support the needs of a rapidly growing global company.
Tags : 
shavlik security, system protection, automated patch management, risk, antivirus, patch deployment, manufacturing
    
Shavlik Technologies
Published By: Citrix ShareFile     Published Date: Apr 14, 2017
With Citrix for chartered accountants you can securely connect to clients, files and QuickBooks from any device. We make it easy to streamline your file sharing and secure your firm’s data as well as your clients’. You get seamless access to all of the files you need—and even QuickBooks—from any device, any time. Read this fact sheet to see how Citrix can help you: • Exchange confidential client files and emails with superior encryption and security. • Offer a more professional solution compared to password-protected PDFs. • Improve your customer service with cutting-edge technology at an affordable price.
Tags : 
data management, data system, business development, software integration, resource planning, enterprise management, data collection, accounting protection
    
Citrix ShareFile
Start   Previous    1 2 3 4 5 6    Next    End
Search      
Already a subscriber? Log in here
Please note you must now log in with your email address and password.