data protection

Results 1 - 25 of 1156Sort Results By: Published Date | Title | Company Name
By: NetApp     Published Date: Dec 18, 2013
IT managers have indicated their two most significant challenges associated with managing unstructured data at multiple locations were keeping pace with data growth and improving data protection . Learn how the NetApp Distributed Content Repository provides advanced data protection and system recovery capabilities that can enable multiple data centers and remote offices to maintain access to data through hardware and software faults. Key benefits are: - continuous access to file data while maintaining data redundancy with no administrator intervention needed. - easily integrated and deployed into a distributed environment, providing transparent, centrally managed content storage - provision of secure multi-tenancy using security partitions. - provision effectively infinite, on-demand capacity while providing fast access to files and objects in the cloud. - secure, robust data protection techniques that enable data to persist beyond the life of the storage it resides on
Tags : 
     NetApp
By: Dell and Intel®     Published Date: Aug 24, 2015
Many enterprises are embracing Hadoop because of the unique business benefits it provides. But, until now, this rapidly evolving big data technology hadn’t always met enterprise security needs. In order to protect big data today, organizations must have solutions that address four key areas: authentication, authorization, audit and lineage, and compliant data protection.
Tags : 
     Dell and Intel®
By: Dell     Published Date: Nov 02, 2018
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
     Dell
By: Dell     Published Date: Nov 02, 2018
For many organizations, digital transformation (DX) is the most strategically important initiative for the organization and may determine its ability to compete in the coming decade. IDC estimates that 60% of organizations will have created and begun implementation of a digital transformation strategy by 2020. These DX initiatives are designed to take the organization forward as a proactive, data-driven company that uses and monetizes data to gain competitive advantage in the marketplace.
Tags : 
     Dell
By: Dell     Published Date: Nov 02, 2018
To out-innovate and out-pace their competition, organizations must be on a consistent path to keep their infrastructure modern. IT is under constant pressure to deliver optimized infrastructure for new business initiatives and supporting applications all while trying to contain or even reduce costs. In fact, respondents to ESG’s ongoing research consistently cite cost reduction as one of the top business drivers affecting their IT spending. When asked in a research survey how their organizations intended to contain costs in 2017, 27% of respondents said that they would be purchasing new technologies with better ROI. 1
Tags : 
     Dell
By: bChannels - Software One     Published Date: Dec 11, 2018
For many years, organizations thought about business continuity in much the same way they thought about business insurance — yes, it was important, but rarely was it top of mind. But that’s all changed. Many organizations have, unfortunately, discovered that even a scant few minutes of service downtime can have deleterious effects on their business operations, resulting in lost revenue, diminished customer confidence and heightened compliance risk. For those and other reasons, IT executives have raised the bar on business continuity preparedness for their organizations in all ways. New technologies, business processes and partnerships, combined with a raised level of importance for testing and a full appreciation of what virtualization can and can’t do for business continuity, are essential to new thinking around avoiding the impact of an unplanned service interruption. Download this informative Whitepaper to learn more about how Veritas Netbackup 8.1.2 can help.
Tags : 
     bChannels - Software One
By: Group M_IBM Q418     Published Date: Oct 23, 2018
The General Data Protection Regulation (GDPR) framework seeks to create a harmonized data protection framework across the European Union, and aims to give back EU citizens control of their personal data by imposing stricter requirements for those hosting and processing this data, anywhere in the world. IBM is committed to putting data responsibility first and providing solutions that are secure to the core for all customers. As such, IBM Cloud has fully adopted the EU Data Protection Code of Conduct for Cloud Service providers – meaning we agree to meet the entirety of its stringent requirements.
Tags : 
     Group M_IBM Q418
By: Group M_IBM Q418     Published Date: Oct 23, 2018
The EU General Data Protection Regulation (GDPR) has arrived. Every company doing business with European customers — regardless of location — must make considerable governance, people, process, and technology changes to comply with the new rules. While companies have made progress, more work remains. To succeed, they must tackle key challenges, including data identification, mapping, and access management. Despite the work ahead, forward-looking businesses understand GDPR is an opportunity. This is a transformation for a data-savvy world, with the potential to yield enhanced customer and business benefits. Investment in solutions with data privacy, security, and compliance offerings that can protect data no matter where it’s stored — on-premises and in the cloud — can ease companies along their readiness journeys and help them achieve and sustain compliance from May 25, 2018, and onward
Tags : 
     Group M_IBM Q418
By: Group M_IBM Q418     Published Date: Oct 23, 2018
Trust can be viewed as a key factor amongst clients and service providers working together towards preparing for readiness with the EU General Data Protection Regulation (GDPR). These stringent regulations come into force in May 2018 to ensure that personal data is processed adhering to strict privacy and security requirements.
Tags : 
     Group M_IBM Q418
By: Veeam '18     Published Date: Dec 04, 2018
"The new EU General Data Protection Regulation (GDPR) is the most important change in data privacy regulation in 22 years and it will have a profound impact on every organization that relies on the storage and processing of personal data of EU citizens. Starting May 25, 2018, the penalties begin for noncompliance, with GDPR fines of up to 4% of annual global revenue or 20 million euros - whichever is greater. As this new regulation also impacts Veeam®, we wanted to share our insights on our road to compliancy. In a new executive brief, GDPR: 5 Lessons Learned, Veeam Compliance Experience Shared, we walk through these lessons and share how our software played a critical role within data management and protection strategies to ensure we remain compliant while delivering Availability for the Always On Enterprise™."
Tags : 
     Veeam '18
By: Veeam '18     Published Date: Dec 04, 2018
"In today’s era, organizations are increasingly adopting multiple cloud services, including public, private, and hybrid clouds, to meet increased agility, innovation and cost management goals. Veeam ensures availability in these environments by providing data protection to, from, and within multi-cloud environments. ESG led a research among IT decision makers to better understand the extent to which multiple cloud service providers are being used today and how that influences the use of on-premises and hybrid cloud environments in the future. Read this ESG brief to learn more about: • The current trend in multi-cloud adoption for large companies • The future of on-premises IT environment • How the Veeam Availability Platform delivers the next generation of availability for the always-on enterprise • And more! "
Tags : 
     Veeam '18
By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography
     Ounce Labs, an IBM Company
By: Amazon Web Services     Published Date: Nov 08, 2018
In this webinar, you’ll learn how a major Healthcare organization is using integrated, reliable, and secure cloud-based solutions from Commvault and Amazon Web Services (AWS) to help address significant data growth while reducing infrastructure costs.
Tags : 
     Amazon Web Services
By: Cylance     Published Date: Jul 02, 2018
With cybercriminals threatening nations globally, cybersecurity is taking a front seat in many regions. Most notably, the European Union (EU) has adopted regulations to combat the threats. Against the backdrop of increasingly sophisticated cyberattacks, the EU has set forth rules and procedures for enhanced cybersecurity, along with penalties for noncompliance, in the form of the General Data Protection Regulation (GDPR). This new body of mandated policies and procedures aims to protect EU member personal information collected and/or stored by organizations. Read more in the GDPR business brief.
Tags : data, gdpr, global, nationally, cybercriminals
     Cylance
By: Vision Solutions     Published Date: Apr 24, 2008
This white paper will provide a road map to the most effective strategies and technologies to protect data and provide fast recovery should data be lost or corrupted due to accident or malicious action.
Tags : vision, high availability, ibm, cdp, aix
     Vision Solutions
By: Vision Solutions     Published Date: Sep 11, 2008
Journaling is a powerful feature, one that IBM has continued to develop and improve over the years. Yet, depending upon your business requirements, you probably still need more protection against downtime than journaling alone can provide. This white paper will cover what you need to know about journaling, what it can do and how it supports and cooperates with high availability software.
Tags : vision, high availability, ibm, idata protection, journaling
     Vision Solutions
By: Vision Solutions     Published Date: Jul 06, 2008
This white paper provides a road map to the most effective strategies and technologies to protect data in AIX environments and provide fast recovery should data be lost or corrupted due to accident or malicious action. The paper also outlines the benefits of continuous data protection (CDP) technologies for AIX.
Tags : vision, high availability, ibm, aix, cdp
     Vision Solutions
By: Vision Solutions     Published Date: Feb 18, 2008
Continuous member service is an important deliverable for credit unions, and. the continued growth in assets and members means that the impact of downtime is affecting a larger base and is therefore potentially much more costly. Learn how new data protection and recovery technologies are making a huge impact on downtime for credit unions that depend on AIX-hosted applications.
Tags : vision, high availability, ibm, aix, cdp, core union
     Vision Solutions
By: Cibecs     Published Date: May 30, 2012
The Cibecs and IDG Connect annual Data Loss Survey uncovers the latest trends and statistics around business data protection
Tags : 
     Cibecs
By: Group M_IBM Q418     Published Date: Sep 25, 2018
As of May 25, 2018, organizations around the world—not just those based in the EU—need to be prepared to meet the requirements outlined within the EU General Data Protection Regulation (GDPR). Those requirements apply to any organization doing business with any of the more than 700 million EU residents, whether or not it has a physical presence in the EU. IBM® Security can help your organization secure and protect personal data with a holistic GDPR-focused Framework that includes software, services and GDPR-specific tools. With deep industry expertise, established delivery models and key insights gained from helping organizations like yours navigate complex regulatory environments, IBM is well positioned to help you assess your needs, identify your challenges and get your GDPR program up and running.
Tags : 
     Group M_IBM Q418
By: Group M_IBM Q418     Published Date: Sep 25, 2018
There’s no getting around it. Passed in May 2016, the European Union (EU) General Data Protection Regulation (GDPR) replaces the minimum standards of the Data Protection Directive, a 21-year-old system that allowed the 28 EU member states to set their own data privacy and security rules relating to the information of EU subjects. Under the earlier directive, the force and power of the laws varied across the continent. Not so after GDPR went into effect May 25, 2018. Under GDPR, organizations are subject to new, uniform data protection requirements—or could potentially face hefty fines. So what factors played into GDPR’s passage? • Changes in users and data. The number, types and actions of users are constantly increasing. The same is true with data. The types and amount of information organizations collect and store is skyrocketing. Critical information should be protected, but often it’s unknown where the data resides, who can access it, when they can access it or what happens once
Tags : 
     Group M_IBM Q418
By: Astaro     Published Date: Jan 19, 2011
This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.
Tags : astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management, utm, tco
     Astaro
By: APC by Schneider Electric     Published Date: Feb 09, 2011
In the broadening data center cost-saving and energy efficiency discussion, data center physical infrastructure preventive maintenance (PM) is sometimes neglected as an important tool for controlling TCO and downtime. PM is performed specifically to prevent faults from occurring. IT and facilities managers can improve systems uptime through a better understanding of PM best practices.
Tags : absolute, data protection, maitenance, ups, physical infrastructure, infrastructure, data loss protection, dlp, ponemon, it security, sensitive data
     APC by Schneider Electric
By: Verisign     Published Date: May 31, 2017
Verisign has a unique view into distributed denial of service (DDos) attack trends, including attack statistics, behavioral trends and future outlook. The below data contains observations and insights about attack frequency and size derived from mitigations enacted on behalf of customers of Verisign DDoS Protection Services from January through March 2017.
Tags : 
     Verisign
By: Entrust Datacard     Published Date: Mar 20, 2017
As digital business evolves, however, we’re finding that the best form of security and enablement will likely remove any real responsibility from users. They will not be required to carry tokens, recall passwords or execute on any security routines. Leveraging machine learning, artificial intelligence, device identity and other technologies will make security stronger, yet far more transparent. From a security standpoint, this will lead to better outcomes for enterprises in terms of breach prevention and data protection. Just as important, however, it will enable authorized users in new ways. They will be able to access the networks, data and collaboration tools they need without friction, saving time and frustration. More time drives increased employee productivity and frictionless access to critical data leads to business agility. Leveraging cloud, mobile and Internet of Things (IoT) infrastructures, enterprises will be able to transform key metrics such as productivity, profitabilit
Tags : 
     Entrust Datacard
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search White Papers      

Add White Papers

Get your white papers featured in the insideBIGDATA White Paper Library contact: Kevin@insideHPC.com