data protection

Results 1 - 25 of 1140Sort Results By: Published Date | Title | Company Name
Published By: Red Gate     Published Date: May 09, 2018
This whitepaper looks at what the changing data privacy and protection landscape means for organizations.
Tags : 
    
Red Gate
Published By: AnalytixDS     Published Date: May 04, 2018
The General Data Protection Regulation (GDPR) is a regulation by which the European Parliament, the Council of the European Union and the European Commission intend to strengthen and unify data protection for all individuals within the European Union (EU). It also addresses the export of personal data outside the EU. The General Data Protection Regulation (GDPR) will go into effect from May 25 2018, making organizations accountable for personal data protection including how and where data is stored and how it is processed within the organization. Get ready for the most comprehensive governance and automation platform in the industry.
Tags : 
    
AnalytixDS
Published By: Reltio     Published Date: May 21, 2018
Effective May 25, 2018, General Data Protection Regulation (GDPR) will represent the most rigorous data protection regulation ever. Complying is not optional, and the penalties are very high. As companies scurry for total compliance, it makes sense to pause, assess, and use this opportunity not only for compliance but for managing customer data efficiently and gainfully. Reltio proposes ten simple steps to ensure your data management strategy is ready for GDPR, not just for assured compliance but going beyond and enabling better customer experiences and building business competence.
Tags : 
    
Reltio
Published By: Innovative Systems     Published Date: Feb 20, 2018
Organizations around the world are scrambling to understand and comply with the new European Union (EU) General Data Protection Regulation (GDPR) which impacts not only EU companies, but anyone who handles the data of EU citizens. Download this white paper to learn how to quickly and cost-effectively have the correct information to meet GDPR requirements without needing an army of data management professionals.
Tags : 
    
Innovative Systems
Published By: Infogix     Published Date: Apr 21, 2017
Data Governance and GDPR go Together Like Peanut Butter and Jelly May 2018 might sound far away, but any organization that does business in the EU must be prepared on day one to comply with the new General Data Protection Regulation (GDPR). This regulation carries stiff penalties for non-compliance – first time violators should expect to pay up to the greater of 4% of global annual revenue or 20 million EUR in fines – so it behooves organizations to cross their i's and dot their t's in regards to their GDPR plan. One integral component that is vital is instituting data governance to understand the organization’s data from a business perspective. Learn more about "What is considered Personally Identifiable Information?”, “What are the GDPR compliance obligations?”, and “Why data governance is vital?” in an easy to read white paper titled: General Data Protection Regulation (GDPR) and the Vital Role of Data Governance.
Tags : 
    
Infogix
Published By: IO-Tahoe     Published Date: May 14, 2018
The “silver lining” in GDPR compliance efforts is a creation of transparency and trust with customers, many of whom have layers of concern and trepidation over how all companies they do business with are handling their data. GDPR compliance efforts offer a chance to clear this air, between organizations and their customers, in a way that’s beneficial to both sides. In Io-Tahoe’s eBook, we explore the obligatory components of GDPR compliance, and the mindset most appropriate to achieving it. We also investigate opportunistic facets of establishing comprehensive protection policy around personal or sensitive data. We look at the prospect of GDPR compliance through the exploration of several “mandates”. Download the e-book to find out more on the eight mandates and the dividends beyond.
Tags : 
    
IO-Tahoe
Published By: Dell     Published Date: Sep 24, 2018
As the shift into a digital economy continues to accelerate, companies must out-innovate, outthink, and outpace their competition. Businesses must embrace change and transform to become the disruptors in their industries rather than wait to be disrupted by their competitors. In the face of this pressure to evolve, organizations need to transform IT to reduce both the capital and operational costs of legacy IT. They must offload repeatable and time-intensive manual tasks like backup, disaster recovery, and service deployment to software and policy-driven automation.
Tags : 
economic, value, cloud, data, protection, dell emc
    
Dell
Published By: Dell     Published Date: Sep 24, 2018
The top data protection mandates from IT leaders are focused on improving the fundamental reliability and agility of the solution(s) in use. The mandate that follows closely behind is cost reduction, which is also seen as a top priority among data protection implementers. These challenges should not be seen as contradictory or mutually exclusive; in fact, they can all be addressed by improved data protection solutions that are engineered as much for efficiency as they are for reliability and capability.
Tags : 
economic, value, data, domain, idpa
    
Dell
Published By: Dell     Published Date: Sep 24, 2018
The IDPA DP4400 provides modern and powerful data protection for midsize organizations allowing companies to leverage the benefits of the cloud within their existing environments. The DP4400 can help transform your environment for the future, laying the technical foundation for the data center while modernizing your data protection for the cloud.
Tags : 
data, protection, cloud, integration, idpa
    
Dell
Published By: Carbonite     Published Date: Oct 10, 2018
Overview Key Challenges Organizations still struggle with communication between data owners and those responsible for administering DLP systems, leading to technology-driven — rather than business-driven — implementations. Many clients who deploy enterprise DLP systems struggle to get out of the initial phases of discovering and monitoring data flows, never realizing the potential benefits of deeper data analytics or applying appropriate data protections. DLP as a technology has a reputation of being a high-maintenance control — incomplete deployments are common, tuning is a never-ending process, lack of organization buy-in is low, and calculations of ROI are complex.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
For all organizations, server and component-level crises are unfortunate inevitabilities. Likewise, the need of end-users to revert to previous file versions is a common occurrence due to predicaments large and small. Recognizing these realities, ESG consistently recommends that organizations consider an approach to data protection that is broader than what backup alone can provide
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
These days, a lot of organizations are looking to the cloud to help them protect their data. They wish to take advantage of the appealing economics and operational agility that are two of the biggest attributes of a cloud-based IT infrastructure. Leveraging the cloud can be a smart choice for any organization interested in gaining more control over costs (i.e., almost all organizations). According to ESG research, reducing costs was the second most commonly reported business driver affecting IT spending in 2016
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
Data protection is a balancing act between the need to protect data and the need to protect access to data. The trick lies with deploying the right protection across the different systems and types of data, since they each require different forms of protection.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
Backup and high availability are both essential forms of protection that fulfill different roles within a data protection strategy. So which type of protection is right for different systems? According to recent analyst reports, experts recommend a blended approach that aligns data protection with type of data.1 By aligning data protection with data urgency, businesses can ensure higher levels of resiliency and reduce demands on internal resources.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
For a backup solution to be considered flexible, it needs to satisfy several key business requirements. It should integrate seamlessly with any servers you’re running and provide full support for all the applications your business uses. It should enable you to protect assets in different parts of the country or overseas. And it should let you manage and monitor backups from anywhere. A flexible backup solution gives you everything you need to protect the technology investments you make now and in the future. So instead of having to buy multiple solutions to support your changing needs, you can have a single solution that adapts to fit your environment. We call that flexible deployment.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
Businesses virtualize to consolidate resources, reduce costs and increase workforce mobility. But failing to protect VMs with purpose-built protection could erase some of those gains. Here are five essential requirements IT managers should look for when deploying data protection for virtual environments.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite
Published By: HP Inc.     Published Date: Sep 11, 2018
A point of sale system is unlike any other piece of technology employed by businesses. It is a sophisticated computer system that manages sensitive customer data in a public space, often accessible by a large number of employees, in addition to customers or anyone else in the area. Because of this, it’s a unique target for compromised data. Plus, it’s mission-critical nature means compromised systems can bring a business to a halt, resulting in lost business. It is estimated that organizations have a one-in-four chance of experiencing a data breach1. Within the business space, it’s estimated that 89 percent of retail data breaches were targeted at point of sale systems, according to the 2018 Verizon Data Breach Report2. At HP, data integrity is of utmost importance, and we have prioritized advanced security in our technology at every step of the design process.
Tags : 
    
HP Inc.
Published By: Tripp Lite     Published Date: Jun 28, 2018
One of the fundamental decisions in the design of data centers, server rooms and network closets is which uninterruptible power supply (UPS) systems to use. You cannot be certain that the power you receive from your local utility will be suitable for your equipment, or that it will always be available. And even when you are receiving good-quality power from the utility, equipment inside your facility (such as electric motors) can introduce power problems. A network/server UPS system conditions input power 24x7 to ensure that your equipment always receives reliable power and protection from damaging and disruptive power problems. A network/server UPS system also supports your equipment during power failures, providing enough battery backup runtime to outlast shorter outages. During longer outages, the UPS system will provide enough runtime to save files and gracefully shut down systems or to ensure that equipment is powered until standby generators are ready to support the load. Choosi
Tags : 
    
Tripp Lite
Published By: Tripp Lite     Published Date: Jun 28, 2018
When you’re designing a data center, server room or network closet, deciding which racks to deploy and how to configure them should be at the top of your list. Just like building a house, the surface details may steal the spotlight, but it’s the quality of the underlying foundation that makes the difference between success and frustration. Racks organize IT equipment, such as servers and network switches, into standardized assemblies that make efficient use of space and other resources. Depending on the options you choose, they can also improve power protection, cooling, cable management, device management, physical security, mobility, ease of installation and protection from harsh environmental conditions. Choosing the right racks and configuring them to match your needs will ensure that your IT equipment operates reliably and efficiently, saving your organization from costly downtime and other needless expenses.
Tags : 
    
Tripp Lite
Published By: Pure Storage     Published Date: Sep 04, 2018
Veritas' NetBackup software has long been a favorite for data protection in the enterprise, and is now fully integrated with the market-leading all-flash data storage platform: Pure Storage. NetBackup leverages the FlashArray API for fast and simple snapshot management, and protection copies can be stored on FlashBlade for rapid restores and consolidation of file and object storage tiers. This webinar features architecture overviews as well as 2 live demo's on the aforementioned integration points.
Tags : 
    
Pure Storage
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, business intelligence, data integration
    
Ounce Labs, an IBM Company
Published By: NetApp     Published Date: Oct 12, 2018
Big data needs both high availability and protection. The amount of data created and replicated globally is predicted to increase ten-fold by 2025, according to IDC research. You may be wondering where to store that big data, as well as how to ensure your data is highly available and protected. In this eBook, explore why cloud-based disaster recovery (DR) improves data availability, eases the processes associated with DR management, and creates a more economically efficient solution for today’s data-driven companies.
Tags : 
    
NetApp
Published By: Gigaom     Published Date: Oct 23, 2018
In this 1-hour GigaOm webinar, you will discover why Phishing Control is the most efficient method to protect systems and free up resources in your security programs arsenal.
Tags : 
area 1, cyber attacks, data protection, network protection, phishing, security, network security
    
Gigaom
Published By: Cylance     Published Date: Jul 02, 2018
With cybercriminals threatening nations globally, cybersecurity is taking a front seat in many regions. Most notably, the European Union (EU) has adopted regulations to combat the threats. Against the backdrop of increasingly sophisticated cyberattacks, the EU has set forth rules and procedures for enhanced cybersecurity, along with penalties for noncompliance, in the form of the General Data Protection Regulation (GDPR). This new body of mandated policies and procedures aims to protect EU member personal information collected and/or stored by organizations. Read more in the GDPR business brief.
Tags : 
data, gdpr, global, nationally, cybercriminals
    
Cylance
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.