esg

Results 301 - 325 of 328Sort Results By: Published Date | Title | Company Name

The Case For a New Data-Centric DLP

Published By: McAfee     Published Date: Jan 23, 2013
John Oltsik from ESG discusses the next generation of data-centric DLP that addresses today's risks and keep your business data safe.
Tags : 
dlp, data-centric dlp, data leakage, dlp deployment, business continuity, security management, best practices, business activity monitoring, vulnerability management, data loss prevention
    
McAfee

The Coming Storage Armageddon: What your Database Administrator Isn't Telling You

Published By: IBM Corp     Published Date: Sep 23, 2011
The ever-increasing pace of data growth calls for a comprehensive storage strategy that protects data infrastructure from performance problems and is also flexible enough to handle changing business requirements. Read the advisory brief from Frost & Sullivan's Stratecast group and learn how IBM's suite of storage solutions addresses big data challenges. You'll also learn how you can introduce scalability and efficiency to your storage environment - avoiding the storage Armageddon.
Tags : 
technology, storage, esg, capacity, ibm, storage area networks, storage management, application integration, analytical applications, data quality, infrastructure
    
IBM Corp

The Economic Value of Data Domain and Integrated Data Protection Appliances (IDPA)

Published By: Dell     Published Date: Nov 02, 2018
To out-innovate and out-pace their competition, organizations must be on a consistent path to keep their infrastructure modern. IT is under constant pressure to deliver optimized infrastructure for new business initiatives and supporting applications all while trying to contain or even reduce costs. In fact, respondents to ESG’s ongoing research consistently cite cost reduction as one of the top business drivers affecting their IT spending. When asked in a research survey how their organizations intended to contain costs in 2017, 27% of respondents said that they would be purchasing new technologies with better ROI. 1
Tags : 
    
Dell

The Growing Email Archiving Dilemma: 11 Considerations to Control Your Email Environment

Published By: Mimecast     Published Date: Feb 05, 2010
According to industry analysts, email volume in organizations is growing by more than 30% annually, and the average user receives 7MB of data per day via email. As a result of this growth, the handling of email has become a critical business, IT and regulatory issue - driving the need for email archiving solutions. Most organizations looking for an email archiving solution are motivated by four reasons: mailbox/server management, compliance/records retention, eDiscovery/litigation support, and knowledge management/IP protection.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage, email security, web service security, enterprise software, email archiving
    
Mimecast

The Growing Need for Real-time and Actionable Security Intelligence

Published By: Norse     Published Date: Mar 10, 2014
Learn how to properly select the right real-time security options for your organization and see how the right actionable security intelligence will allow for safer and more secure data and security operations.
Tags : 
norse, esg, security intelligence, commercial threat intelligence, security data, open source security intelligence, product based security intelligence, real-time security, security, it management
    
Norse

The Mobility Quandary: Balancing Mobile Workforce Productivity with Security

Published By: VMware AirWatch     Published Date: Mar 02, 2017
The pace of business is faster than ever before. Due to the rapid adoption of cloud and mobile computing, driven by consumerization, operational needs, and security requirements, ESG believes that Identity and Access Management (IAM) is undergoing a profound transition. Download this ESG whitepaper to learn why organizations should combine Identity and Access Management (IAM) and Enterprise Mobility Management (EMM) solutions to adapt to the influx of workforce mobility without interfering with user experience or compromising security.
Tags : 
    
VMware AirWatch

The Mobility Quandary: Balancing Mobile Workforce Productivity with Security

Published By: VMware     Published Date: Feb 24, 2017
The pace of business is faster than ever before. Due to the rapid adoption of cloud and mobile computing, driven by consumerization, operational needs, and security requirements, ESG believes that Identity and Access Management (IAM) is undergoing a profound transition. Download this ESG whitepaper to learn why organizations should combine Identity and Access Management (IAM) and Enterprise Mobility Management (EMM) solutions to adapt to the influx of workforce mobility without interfering with user experience or compromising security.
Tags : 
    
VMware

The Rise of Direct Internet Access (DIA): Securing Remote Users and Branch Offices

Published By: Cisco Umbrella EMEA     Published Date: Aug 08, 2019
In 2018, the Enterprise Strategy Group (ESG) completed a research survey of 450 cybersecurity, IT, and networking security professionals with knowledge of or responsibility for the policies, processes, and controls used for remote office/branch office (ROBO) security. This report is the summary of ESG's conclusions from the study.
Tags : 
    
Cisco Umbrella EMEA

The Secret to Accelerating Your ERP Upgrade

Published By: Delphix     Published Date: Feb 28, 2013
This paper by analyst firm ESG describes the key challenges in ERP upgrade projects, and maps specific database virtualization functions to each challenge.
Tags : 
erp, enterprise resource planning, database virtualization, data management, virtualization
    
Delphix

The Total Cost of Email: Putting a Price Tag On Your Email Environment

Published By: Mimecast     Published Date: Dec 18, 2008
You can't afford to ignore email archiving, security, internal policy or regulatory requirements, but can you afford to keep paying for it as multiple systems on top of your email system? When you add up the full price tag for your email environment, from server to soft ware to risk management and staff costs, it becomes clear why running everything in-house can mean you spend far more of your budget on maintenance than innovation.
Tags : 
mimecast, saas, software as a service, uem, unified email management, email archive, medium-size business, esg, storage, storage management, enterprise software, sales & marketing software, database development, email archiving
    
Mimecast

Threat Intelligence: Cybersecurity’s Best Kept Secret

Published By: CrowdStrike     Published Date: Feb 05, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries,investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence, Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security pos
Tags : 
    
CrowdStrike

Threat Intelligence: Cybersecurity’s Best Kept Secret

Published By: CrowdStrike     Published Date: Nov 28, 2018
Learn how cyber threat intelligence (CTI) helps you bolster defenses, hunt down adversaries, investigate incidents and make better security decisions. While once considered a “nice to have”, Cyber Threat Intelligence (CTI) is now widely considered an essential weapon against breaches. A recent study by Enterprise Strategy Group (ESG) found that 72 percent of organizations plan to increase CTI spending — further validation of its important role in your security strategy. Yet, because threat intelligence comes in many shapes and forms, it is often misunderstood. This white paper, “Threat Intelligence: Cybersecurity’s Best Kept Secret,” offers in-depth coverage of CTI, including the different categories of threat intelligence and use cases that demonstrate CTI’s effectiveness in thwarting today’s most dangerous and sophisticated attackers. You’ll also learn how the right CTI can empower better security and executive decisions, while dramatically improving your organization's security post
Tags : 
    
CrowdStrike

Understanding Oracle Engineered Storage: Oracle Zero Data Loss Recovery Appliance

Published By: Oracle     Published Date: Aug 01, 2018
ESG is an IT analyst, research, validation, and strategy firm that provides market intelligence and actionable insight to the global IT community. In this video, Mark Peters (Practice Director) talks through Oracle's Zero Data Loss Recovery Appliance. Watch this video to learn more
Tags : 
    
Oracle

Unified Email Management for Domino

Published By: Mimecast     Published Date: Feb 05, 2010
Email is possibly today's most important business tool but its use also carries many risks. Scalable, secure archiving, email continuity, data leak prevention - not to mention the constant onslaught of spam and malware - are just some of the issues that IT professionals have to deal with on a daily basis.
Tags : 
mimecast, saas, software as a service, email archive, medium-size business, esg, storage, storage area networks, storage management, email security, enterprise software, email archiving
    
Mimecast

Unleashing IT MSFT edition

Published By: Cisco     Published Date: Sep 15, 2015
In a recent Enterprise Strategy Group (ESG) paper1, senior analyst Mark Bowker listed several requirements and best practices for building a private cloud. High levels of availability and scalability, policy-based automation and application control, workload portability, and unified visibility and management across infrastructures and applications were all cited as desirable attributes.
Tags : 
enterprise, policy-based, infrastructure, cloud, visibility, scalability, it management, enterprise applications
    
Cisco

Veeam: Availability for today’s multi-cloud enterprise

Published By: Veeam '18     Published Date: Dec 04, 2018
"In today’s era, organizations are increasingly adopting multiple cloud services, including public, private, and hybrid clouds, to meet increased agility, innovation and cost management goals. Veeam ensures availability in these environments by providing data protection to, from, and within multi-cloud environments. ESG led a research among IT decision makers to better understand the extent to which multiple cloud service providers are being used today and how that influences the use of on-premises and hybrid cloud environments in the future. Read this ESG brief to learn more about: • The current trend in multi-cloud adoption for large companies • The future of on-premises IT environment • How the Veeam Availability Platform delivers the next generation of availability for the always-on enterprise • And more! "
Tags : 
    
Veeam '18

Virtualization and the Case for Universal Grid Architectures

Published By: Gridstore     Published Date: Jan 02, 2013
The storage industry is undergoing a transformation. It’s become clear that traditional stor-age architectures no longer suffice.
Tags : 
gridstore, grid architectures, monolithic clustered architectures, esg report, virtualization 2.0, business technology
    
Gridstore

Virtualization in Action: Stories of Real Businesses That Have Deployed Virtualization

Published By: HP     Published Date: Aug 22, 2008
In this session, HP and ESG Storage Virtualization experts will share real HP customer case studies who have deployed virtualization in their environments and realized significant business benefits as a result.
Tags : 
hp eva 4400, eva4400, eva 4400, storage virtualization, virtualization, virtual, hp virtualization, virtual storage, networking, storage, network management, servers, storage management
    
HP

VM-Datensicherung Und Veritas: 10 Uberraschende Fakten

Published By: AstuteIT_ABM_EMEA     Published Date: Feb 28, 2018
Wie viele andere Unternehmen auch haben Sie vermutlich 80 bis 90 % Ihrer internen Workloads bereits virtualisiert oder sind auf dem besten Wege dorthin. Dies trifft auf die große Mehrheit von Unternehmen zu, ganz gleich, ob Hunderte oder Hunderttausende von virtuellen Maschinen bereitgestellt werden. Bei der Ausführung unternehmenskritischer Anwendungen in einer virtualisierten Umgebung sind Backup und Wiederherstellung von zentraler Bedeutung. Die meisten Unternehmen investieren in Einzelprodukte für VM-Backup und -Wiederherstellung. Eine neue Umfrage von ESG ergab jedoch, dass fast 70 % der Unternehmen, die separate bzw. VM-spezifische Lösungen nutzen, über einen Wechsel zu einer einheitlichen Datensicherungslösung nachdenken.
Tags : 
datensicherung, uberraschende, gewahren, vermeiden, profitieren
    
AstuteIT_ABM_EMEA

VM-Datensicherung Und Veritas: 10 Uberraschende Fakten

Published By: Astute IT DACH     Published Date: Feb 28, 2018
Wie viele andere Unternehmen auch haben Sie vermutlich 80 bis 90 % Ihrer internen Workloads bereits virtualisiert oder sind auf dem besten Wege dorthin. Dies trifft auf die große Mehrheit von Unternehmen zu, ganz gleich, ob Hunderte oder Hunderttausende von virtuellen Maschinen bereitgestellt werden. Bei der Ausführung unternehmenskritischer Anwendungen in einer virtualisierten Umgebung sind Backup und Wiederherstellung von zentraler Bedeutung. Die meisten Unternehmen investieren in Einzelprodukte für VM-Backup und -Wiederherstellung. Eine neue Umfrage von ESG ergab jedoch, dass fast 70 % der Unternehmen, die separate bzw. VM-spezifische Lösungen nutzen, über einen Wechsel zu einer einheitlichen Datensicherungslösung nachdenken.
Tags : 
datensicherung, uberraschende, gewahren, vermeiden, profitieren
    
Astute IT DACH

Website Security for Dummies (ES)

Published By: Symantec     Published Date: Nov 30, 2015
Protección de sitios web para dummies pretende aclarar qué riesgos supone un sitio web desprotegido, por qué es tan importante usar certificados SSL y en qué se diferencian unos certi-ficados SSL de otros. En definitiva: queremos que aprendas a prote-ger mejor tu empresa y tus sitios web.
Tags : 
    
Symantec

What EMC is Doing to Backup

Published By: EMC Corporation     Published Date: May 27, 2011
This ESG paper describes how through consistent individual product innovation and integration EMC backup and recovery solutions tackle the issues that prevent customers from transforming data protection.
Tags : 
esg analyst report, emc, data protection, backup, brian babineau, david a. chapa, data growth, infrastructure, deduplication, bandwidth management, backup and recovery, data deduplication
    
EMC Corporation

What to Consider When Looking for Cloud-powered Data Protection

Published By: Carbonite     Published Date: Jan 04, 2018
These days, a lot of organizations are looking to the cloud to help them protect their data. They wish to take advantage of the appealing economics and operational agility that are two of the biggest attributes of a cloud-based IT infrastructure. Leveraging the cloud can be a smart choice for any organization interested in gaining more control over costs (i.e., almost all organizations). According to ESG research, reducing costs was the second most commonly reported business driver affecting IT spending in 2016.
Tags : 
    
Carbonite

Whitepaper: Demonstrating SD-WAN Business Value with ESG

Published By: VMware SD-WAN by VeloCloud     Published Date: May 21, 2019
For many organizations, the wide area network (WAN) infrastructure that connects an enterprise’s remote and branch offices has not changed for decades. Over the years, organizations consolidated many regional data centers into a few highly available data center locations which meant that remote locations had to connect to centralized applications over WANs and all internet traffic went through these data centers as well. This introduced bandwidth constraints and latency issues. The development in WAN optimization provided incremental and measurable improvement in WAN performance and provided some bandwidth cost containment. However, that technology typically was only deployed at the most problematic sites that struggled to achieve acceptable levels of performance and user experience. It did not solve all the issues with WAN connectivity. WAN infrastructure planning was limited to increases in capacity that were met by provisioning additional carrier MPLS (multiprotocol label switching)
Tags : 
    
VMware SD-WAN by VeloCloud

Why Midsized Organizations Should Consider EVault by Carbonite

Published By: Carbonite     Published Date: Oct 12, 2017
Today it is possible, even for smaller organizations, to establish both backup and full-fledged hybrid data protection under one robust onsite/offsite underpinning. ESG has four recommendations to assist such organizations as they try to pursue a disk-to-disk-to-cloud data protection strategy in the right way, with particular consideration for EVault by Carbonite.
Tags : 
evault, midsized businesses, data protection strategy, hybrid data protection, backup, recovery
    
Carbonite
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.