data protection

Results 101 - 125 of 1188Sort Results By: Published Date | Title | Company Name
Published By: Dell     Published Date: May 04, 2015
Whitepaper that breaks the benefits of switching to private cloud into five clear points. - Cost efficiencies - Greater flexibility and scalability - Enhanced agility - Disaster recovery/business continuity - Data protection and compliance
Tags : 
    
Dell
Published By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : 
cloud security, scale, data center, ddos
    
Akamai Technologies
Published By: Dell     Published Date: Feb 02, 2015
Security breaches are expensive, costing U.S. businesses an average of $3.5 million per incident, which doesn’t include brand damage or other intangibles. Unfortunately, breaches are highly likely to happen, with 87% of organizations experiencing a breach in the past 12 months. Data, whether it’s intellectual property or personal data, needs to be protected. Dell Data Protection solutions provide encryption, malware protection, and authentication for Dell and non-Dell products, to equip businesses with a complete, easy-to-manage, end-user security solution.
Tags : 
dell, windows 8 pro, security, breaches, encryption, cost, compliance, malware, anti-virus, software, protection, solutions
    
Dell
Published By: Entrust Datacard     Published Date: Mar 24, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions.
Tags : 
    
Entrust Datacard
Published By: Dell EMC     Published Date: Jul 05, 2016
Unity’s all flash design comes with built-in data protection, cloud-based management, and all inclusive software to deliver the best flash economics – price, density, and TCO.
Tags : 
storage management, performance management, best practices, application integration, technology, business intelligence, flash, storage
    
Dell EMC
Published By: Dell EMC     Published Date: Jul 05, 2016
Unity’s hybrid flash design comes with built-in data protection, cloud-based management, and all inclusive software to deliver the best hybrid economics – price, density, and TCO.
Tags : 
storage management, performance management, best practices, application integration, technology, business intelligence, hybrid, storage
    
Dell EMC
Published By: Dell EMC     Published Date: Jul 05, 2016
This report documents hands-on testing of an EMC data protection solution for virtual environments using Avamar Virtual Edition with a Data Domain system
Tags : 
data management, business practices, data center. data application, enterprise applications, security, performance management
    
Dell EMC
Published By: Dell EMC     Published Date: Jul 05, 2016
EMC Global Data Protection Index 2016 Key Findings and Results Report
Tags : 
data management, business practices, data center. data application, enterprise applications, business intelligence, security, database development, database security
    
Dell EMC
Published By: Sage EMEA     Published Date: Dec 19, 2018
The General Data Protection Regulation (GDPR) is the new legal framework that will come into effect on the 25th of May 2018 in the European Union. EU regulations have direct effect in all EU member states, meaning the GDPR replaces the current Data Protection Directive and applies to all EU member states. The GDPR’s focus is the protection of personal data. In fact, GDPR is one of the biggest shakeups ever seen affecting how data relating to an individual should be handled—and it affects not just companies but any individual, corporation, public authority, agency or other body that processes the personal data of individuals based in the EU. As gatekeepers and processors of personal data, HR and People teams have a crucial role to play in preparing for this step change. The rules on how data is kept and used will become much more stringent, and it’s vital that HR and People teams become more transparent, communicating to employees exactly how their data is processed. In a world where 2,
Tags : 
    
Sage EMEA
Published By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
security, protect keys, security controls, cyber-attacks, cybercriminals, threat detection, data protection, firewalls, authentication, protect digital certificates, reduce risks
    
Venafi
Published By: Venafi     Published Date: Aug 10, 2015
This whitepaper reveals how Security Operations teams can eliminate these outages.
Tags : 
security, security operations, outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks, data protection, ssl, tls
    
Venafi
Published By: Entrust Datacard     Published Date: Jun 09, 2017
How are you balancing strong security and the customer experience? The European Union’s General Data Protection Regulation (GDPR) requirement is an opportunity to properly balance privacy and the user experience. Those who embrace it will distinguish themselves as a trustworthy and respectful custodian of their users’ data. Personal data plays an increasingly important part in providing the kind of appealing experience that brings users back time and time again. But, there’s a balance to be struck. Strong security is the best tool available for navigating the dichotomy between an appealing user experience and the risk posed by data breach; it allows the collection and management of personal data in line with the user’s expectations, and without jeopardizing the trust that is so important between them and you.
Tags : 
    
Entrust Datacard
Published By: Verdasys     Published Date: Mar 28, 2012
In this white paper you will learn how data classification can be one of the most cost-effective methods for ensuring the value of data is maximized while still being used securely and how it can be a critical component to successfully govern information at an enterprise.
Tags : 
information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection, analytical applications, database security
    
Verdasys
Published By: Verdasys     Published Date: Mar 28, 2012
In this whitepaper get the answers to the open gaps left in the WikiLeaks story and learn how you can prevent insider threats that are just as detrimental in your organization.
Tags : 
information protection, enterprise information protection, data loss prevention software, intellectual property protection, insider threat protection, insider threat protection software, data leakage software, mobile data protection
    
Verdasys
Published By: VMware     Published Date: Oct 05, 2015
Learn how this city government deployed VMware vCloud Air Disaster Recovery® to meet its recovery point objectives and VMware NSX® to add security layers inside the organization for increased protection. Get your free download of this case study now.
Tags : 
vmware, vmware vcloud air disaster recovery, vmware nsx, avondale, arizona, data security, data protection, security, database security
    
VMware
Published By: Vision Solutions     Published Date: Aug 21, 2014
A report on research findings into the state of resilience and methods used companies to ensure their strength.
Tags : 
data management strategies, data protection, system migrations, data safeguarding, virtualization, cloud computing
    
Vision Solutions
Published By: Vision Solutions     Published Date: Aug 26, 2014
This paper debunks 7 virtualization DR myths
Tags : 
virtualization myths, disaster recovery, back up, high availability, virtual servers, data protection, virtualization
    
Vision Solutions
Published By: Vision Solutions     Published Date: Aug 26, 2014
This paper explores the market leading solutions available for data protection and recoverability.
Tags : 
data protection, data recovery, geocluster, data cluster. failover clustering, storage
    
Vision Solutions
Published By: Entrust Datacard     Published Date: May 10, 2017
Entrust Datacard provides customers with a commercial security public key infrastructure (PKI) solution that addresses authentication and data protection needs for enterprise and government customers
Tags : 
    
Entrust Datacard
Published By: Dell EMC     Published Date: May 16, 2018
IT transformation is a strategic focus for IT executives as they seek to free up time, money and resources to invest in digital innovation. The most successful organizations are paying more attention to data protection as a critical element to transform and modernize the entire IT stack and deliver greater business value.
Tags : 
    
Dell EMC
Published By: Infinity     Published Date: Sep 09, 2015
This eBook illustrates how Infinity believes that Europe’s increasingly digital economies are thriving, and that London is the key to this resurgence.
Tags : 
europe business, london companies, market leader in data centers, london key advantages for us companies, data center, data protection, infinity, infinity data center experts, infinity, america's favorite city, key advantages for us companies
    
Infinity
Published By: Cisco     Published Date: Sep 21, 2017
For nearly a decade, Cisco has published comprehensive cybersecurity reports that are designed to keep security teams and the businesses they support apprised of cyber threats and vulnerabilities—and informed about steps they can take to improve security and cyber-resiliency. In these reports, we strive to alert defenders to the increasing sophistication of threats and the techniques that adversaries use to compromise users, steal information, and create disruption. Download this whitepaper to find out more.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
Cisco
Published By: Entrust Datacard     Published Date: Apr 26, 2017
Research in the SSL/TLS security market points to a growing need for securing web applications with high assurance certificates issued by a reputable Certification Authority (CA). The integrity of the CA and the extended services offered through a certificate management platform (CtaaS) can produce a truly secure IT environment for website transactions according to industry analysts, Frost & Sullivan, in their in-depth analysis, SSL/TLS Certificates Market, Finding the Business Model in an All Encrypt World. Organizations want to avoid the negative publicity associated with security breaches and customers want to be assured of data protection when making online transactions. In this condensed report, catch the highlights of current industry trends and the ever important need to secure your server with a reputable CA.
Tags : 
    
Entrust Datacard
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance. With Blue Coat you can deliver business continuity by protecting against threats and data loss, extend protection and policy to users in any location on any device ,safely deploy and consume all types of applications, align IT infrastructure with business priorities to assure and accelerate user experience across the extended enterprise and make risk management tradeoffs and enforce compliance.
Tags : 
technology, bluecoat, infrastructure, business intelligence, infrastructure management
    
Blue Coat Systems
Published By: Venafi     Published Date: Mar 26, 2015
The rampant rise in cyberattacks and the growing concerns and regulations over data privacy are compelling the increased use of SSL/TLS. But managing even more SSL/TLS to protect data is challenging. See how you can safely expand and rely on SSL/TLS to achieve your data security and privacy goals.
Tags : 
data protection, cyberattacks, data privacy, ssl/tls, security, privacy
    
Venafi
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept