comprehensive data protection

Results 1 - 25 of 29Sort Results By: Published Date | Title | Company Name

Transformation Roadmap for Backup & Recovery: HP Backup & Recovery Modernization Service

Published By: HPE     Published Date: Feb 11, 2015
HP Backup & Recovery Modernization Service leverages proven methodologies and best practices to develop comprehensive data protection solutions for HP StoreOnce Backup.
Tags : 
    
HPE

Realize Modern Data Protection

Published By: Dell EMC Storage     Published Date: Nov 28, 2018
Powerful data protection in a converged appliance that is easy to deploy and manage — at the lowest cost-to-protect. The integrated appliance brings together protection storage and software, search, and analytics — plus simplified system management and cloud readiness. And, the IDPA System Manager, with its clean, intuitive interface, provides a comprehensive view of data protection infrastructure from a single dashboard.
Tags : 
    
Dell EMC Storage

Data Security: Protecting the Endpoint

Published By: Dell     Published Date: May 04, 2015
This infographic includes results from a 2015 survey conducted exclusively for CBS Interactive and illustrates: • The top-ranked security threats of 2014 • The percentage of companies adopting mobile security technology • The most popular data protection methods • What to look for in a comprehensive data protection solution
Tags : 
security breach, data security, privacy, phishing
    
Dell

How EMM Helps with GDPR Compliance

Published By: MobileIron     Published Date: Aug 02, 2017
Reasonable, common-sense security standards are becoming law in many regions of the world. In Europe, the General Data Protection Regulation (GDPR), enacted in April 2016, will become fully applicable on May 25, 2018. GDPR will bring the European Union (EU) under one comprehensive and harmonised legal system for data protection and privacy. The monetary penalties and reputational damage of noncompliance with GDPR are substantial – the maximum fines are the greater of 20 million euros or 4% of the company’s worldwide revenue.
Tags : 
data security, regulation, legal system, data protection
    
MobileIron

Comprehensive Data Protection for Physical, Virtual and Cloud Infrastructures

Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM

What GDPR Means for your Security Strategy: Understanding the implications for your organization

Published By: Secureworks     Published Date: Oct 04, 2017
The General Data Protection Regulation1 is a European Union regulation with the full title of ‘Regulation on the protection of natural persons with regard to the processing of personal data and on the free movement of such data, which repeals Directive 95/46/EC (General Data Protection Regulation)’. It’s the first comprehensive overhaul and replacement of European data protection legislation in over twenty years and could be the most significant regulatory framework to hit organizations since Sarbanes-Oxley in 2002. Its purpose is to replace the varying implementations across Europe of the earlier EU Data Protection Directive with a single harmonized EU regulation. The intended outcome is a standardized set of expectations about how an organization must manage and protect personally identifiable information on employees, clients and other applicable data subjects. Any organization that holds data on EU citizens, regardless of where it is domiciled, within the EU or otherwise, is in sco
Tags : 
    
Secureworks

Putting the "Secure" in Secure Remote Access

Published By: Citrix Systems     Published Date: Jul 28, 2015
Learn how Citrix Netscaler with Unified Gateway delivers a single, consolidated remote access infrastructure featuring comprehensive access, threat, and data protection.
Tags : 
    
Citrix Systems

Comprehensive Data Protection & Disaster Recovery with Dell EqualLogic and VMware

Published By: Dell Storage     Published Date: Oct 17, 2011
This white paper take a look at multilayer data protection and disaster recovery approach for the virtualized data center and explains how and why Dell EqualLogic may be the best solution for your business.
Tags : 
technology, dell, data protection, data recovery, equallogic, disaster recovery, best practices, data quality
    
Dell Storage

Comprehensive Data Protection & Disaster Recovery with Dell EqualLogic and VMware

Published By: Dell Storage     Published Date: Nov 02, 2011
This white paper take a look at multilayer data protection and disaster recovery approach for the virtualized data center and explains how and why Dell EqualLogic may be the best solution for your business.
Tags : 
technology, dell, data protection, data recovery, equallogic, disaster recovery, infrastructure, best practices
    
Dell Storage

Putting the Secure in Secure Remote Access

Published By: Citrix Systems     Published Date: Feb 10, 2016
Learn how Citrix NetScaler with Unified Gateway delivers a single, consolidated remote access infrastructure featuring comprehensive access, threat and data protection.
Tags : 
    
Citrix Systems

Protecting your Office 365 Data

Published By: Druva -AWS     Published Date: Apr 28, 2018
The core capabilities of Office 365, while powerful, are not necessarily built to be a comprehensive solution for companies’ data availability and governance needs. Find out how your business can establish a strong data protection solution at a better price-point in the cloud.
Tags : 
    
Druva -AWS

Exchange 2007 Data Protection and Disaster Recovery

Published By: Dell Software     Published Date: Apr 25, 2008
In Quest’s new white paper, learn how to implement a solid data protection, recovery, compliance and e-discovery strategy for your critical e-mail data.
Tags : 
disaster recovery, data protection, exchange recovery, exchange e-discovery, comprehensive data protection, continuous data protection, brick level recovery, email archiving
    
Dell Software

Find cost-effective solutions to help your business stay up and running

Published By: IBM     Published Date: Oct 23, 2009
In the Illuminata CDP Paper, you'll see how the IBM Comprehensive Data Protection Express solution can help keep your business running. Discover diverse components and services, like Tivoli Storage Manager FastBack and System x servers, that fit your needs.
Tags : 
business continuity, ibm, tivoli, data protection, sme, backup and recovery
    
IBM

Midmarket companies can face data loss disasters. Make sure you're ready.

Published By: IBM     Published Date: Oct 23, 2009
Listen to the recording, "CDPS Analyst Interview with John Webster of Illuminata," to see how the IBM Comprehensive Data Protection Express solution addresses the needs of midmarket companies that don't have adequate backup and recovery capabilities for their critical data.
Tags : 
data loss, ibm, data protection, backup and recovery, disaster recovery
    
IBM

Disaster Recovery Made Easy with HP BladeSystem and VMware Virtualization

Published By: HP VMware     Published Date: Mar 03, 2008
In this presentation, learn how you can leverage the power of a bladed environment, and how HP and VMware can provide comprehensive data protection and recovery with fail-over on an infrastructure that is easy on the budget and ready to grow.
Tags : 
hp vmware, blade servers, storage virtualization
    
HP VMware

Taking A Comprehensive Approach to Data Protection

Published By: CDW     Published Date: Jul 08, 2015
Your data is at risk. The threat of data breaches has grown larger than ever before, as attackers become more numerous and sophisticated. And as data becomes more precious, the damage that can be done by a data breach has increased greatly.
Tags : 
security, data protection, dlp, data breach, vulnerability management, security management, security policies, data loss prevention
    
CDW

Cloud Requires Dynamic Security

Published By: IBM     Published Date: Apr 09, 2015
Adopt cloud confidently with the IBM Dynamic Cloud Security Portfolio. A comprehensive set of capabilities that provide access management, data and application protection, and deep visibility.
Tags : 
cloud, cloud security, ibm, ibm dynamic cloud security portfolio, access management, data protection, application protection, visibility
    
IBM

Comprehensive data protection for physical, virtual and cloud infrastructures

Published By: IBM     Published Date: Jul 15, 2016
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance.
Tags : 
ibm, data, security, virtualization, data management
    
IBM

The Forrester Wave™: Data Security Portfolio Vendors, Q2 2019

Published By: Group M_IBM Q3'19     Published Date: Aug 20, 2019
Data Security Portfolio Vendors, Q2 2019, is a key industry report for helping security and risk professionals understand and assess the data security solution landscape, and how these solutions can address their business and technology challenges.Download the report to learn why Forrester believes IBM Security Guardium is a good fit “for buyers seeking to centrally reduce and manage data risks across disparate database environments”.The IBM Security Guardium portfolio empowers organizations to meet critical data security needs by delivering comprehensive visibility, actionable insights and real-time controls throughout the data protection journey.
Tags : 
    
Group M_IBM Q3'19

Comprehensive Data Protection For Physical, Virtual And Cloud Infrastructures

Published By: IBM     Published Date: Apr 20, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM

On Demand Webcast: Reduce the Cost & Complexity of Backup & Recovery

Published By: IBM     Published Date: Jul 22, 2014
Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core application and remote sites.
Tags : 
ibm, storage, back up, recovery, cost reduction, data, it environments, data protection
    
IBM

Reduce the Cost & Complexity of Backup

Published By: IBM     Published Date: Nov 04, 2014
Dominate trends in IT today such as Cloud, Mobile and Smarter Physical Infrastructures are generating massive amount of corporate data. The inherent value of this data coupled with the increasing complexity of IT environments is forcing those tasked with data protection to re-evaluate their approaches. Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core application and remote sites.
Tags : 
it trends, virtual environments, core application, data protection, networking, security, virtualization
    
IBM

Reduce the Cost & Complexity of Backup

Published By: IBM     Published Date: Jan 23, 2015
Dominant trends in IT today such as Cloud, Mobile and Smarter Physical Infrastructures are generating massive amounts of corporate data. The inherent value of this data coupled with the increasing complexity of IT environments is forcing those tasked with data protection to re-evaluate their approaches. Join this session to understand how you can reduce the cost and complexity of backup and recovery while ensuring comprehensive data protection across virtual environments, core applications and remote sites.
Tags : 
it trends, it environments, smarter physical infrastructures, data protection, it management, knowledge management, enterprise applications, data management
    
IBM

Access Business data your way, securely

Published By: HP     Published Date: Aug 26, 2014
Eliminate the guesswork from selecting products and services for your evolving network access and business protection needs. HP Just Right IT portfolio solutions help avoid business interruptions by ensuring reliable access to your data. HP servers and storage solutions help consolidate islands of business information while delivering cost savings, reliability, and agility. HP offers the industry’s most comprehensive data protection and retention portfolio for midsize businesses like yours. And through its cloud-based support portal, HP Technology Services can proactively identify and fix them remotely to keep your business running smoothly. Discover how
Tags : 
data, business, technology, portfolio, cloud-based, support, portal, solution
    
HP

Putting the Secure in Secure Remote Access

Published By: Citrix Systems, Inc.     Published Date: Jan 19, 2016
Learn how Citrix NetScaler with Unified Gateway delivers a single, consolidated remote access infrastructure featuring comprehensive access, threat and data protection.
Tags : 
citrix, security, remote access, network performance, network security, remote network management, access control, security management
    
Citrix Systems, Inc.
Previous   1 2    Next    
Search      

Add Research

Get your company's research in the hands of targeted business professionals.