data domain

Results 1 - 25 of 68Sort Results By: Published Date | Title | Company Name
Published By: APC by Schneider Electric     Published Date: Feb 15, 2011
This paper divides the realm of data center "Operations Technology" into four distinct domains and compares the primary and secondary functions of key subsystems within these domains.
Tags : 
apc by schneider electric, classification, data center operations technology, ot management tools, software management tool, physical infrastructure
    
APC by Schneider Electric
Published By: CDW     Published Date: Sep 10, 2014
Learn how to improve your data domain systems by getting the right protection storage for both your backup and archive systems.
Tags : 
protection, storage, architecture, massive growth, integrated, data
    
CDW
Published By: Centrify Corporation     Published Date: Dec 08, 2010
This white paper also describes Centrify DirectSecure's innovative, software-based approach to deploying a peer-to-peer IPsec solution that can dynamically isolate cross-platform systems and enable end-to-end encryption of data in motion.
Tags : 
centrify corporation, sensitive information, data protection, privacy and security, ipsec-based serve, domain isolation, microsoft active directory, data encryption, database security, information management
    
Centrify Corporation
Published By: Centrify Corporation     Published Date: Dec 02, 2014
Security breaches are all over the news, many of them a result of either insider threats or advanced persistent threats. Companies and government agencies are looking for solutions to mitigate the risks these threats present. This white paper details three common Windows Server threat scenarios and explains the way that they can be neutralized. By following the guidelines in this white paper, organizations can guard against inside and outside threats, protect their Windows Server infrastructure and sensitive data, and meet relevant regulatory requirements. Centrify Server Suite provides organizations with the control they need to thwart these threats. It protects their Windows Server environments by: • Granting users just enough privilege to accomplish their business objectives, enabling secure management of Windows services. • Making shared accounts in Active Directory accountable by associating the use of a shared account with the actual user. • Protecting PCI data from domain admin
Tags : 
security solutions, protecting data, secure management, cost-effective, security, it management
    
Centrify Corporation
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection, data management
    
Cisco
Published By: Cisco     Published Date: Apr 08, 2015
Zero-day attacks and advanced persistent threats have outstripped the capabilities of traditional security methods that rely exclusively on detection and blocking for protection. In fact, 100 percent of companies surveyed by Cisco, as part of our Annual Security Report, have connections to domains that are known to host malicious files or services. At the same time, the Internet of Everything (IoE) is accelerating, creating significant opportunities for businesses and attackers alike as more things come online - along with the people, processes, and data that interact with them.
Tags : 
security, attacks, data, domain, zero-day, capabilities, malicious files, blocking, protection, data management
    
Cisco
Published By: Cisco     Published Date: Mar 22, 2019
The Secure Data Center is a place in the network (PIN) where a company centralizes data and performs services for business. Data centers contain hundreds to thousands of physical and virtual servers that are segmented by applications, zones, and other methods. This guide addresses data center business flows and the security used to defend them. The Secure Data Center is one of the six places in the network within SAFE. SAFE is a holistic approach in which Secure PINs model the physical infrastructure and Secure Domains represent the operational aspects of a network.
Tags : 
    
Cisco
Published By: ClickSquared     Published Date: Jul 07, 2009
Learn how by achieving a 360-degree view of customer interests, markets can achieve unprecedented levels of: *Personalization, *Timing, *Relevance, *Cost-efficiency, *Accountability
Tags : 
clicksquared, interactive relationship marketing, lifecycle, irm, web 2.0, granular personalization, analytical marketing models, database marketing, personalization, timing, relevance, click squared, choreograph online, real-time, offline, episodic, cost dynamics, rapid deployment, domain expertise, personalization
    
ClickSquared
Published By: Damballa     Published Date: Nov 13, 2012
Frost & Sullivan is proud to present the 2011 North American New Product Innovation Award in Cyber Threat Protection to Damballa Inc.
Tags : 
advanced threats, apt, advanced persistent threats, targeted attacks, advanced malware, command-and-control, c&c, dropper, call-back, virtual analysis, zero-day threats, tdl4, stuxnet, spyeye, zeus, malware detection, cyber attacks, cybersecurity, cyber threats, cyber espionage
    
Damballa
Published By: Dell     Published Date: Sep 24, 2018
Read this paper from Dell EMC and Intel® to learn the business value of Data Domain and how it can... • Speed up your backups • Improve disaster recovery • Save valuable floor space ...and so much more!
Tags : 
solutions, data, domain, dell, emc
    
Dell
Published By: Dell     Published Date: Sep 24, 2018
The top data protection mandates from IT leaders are focused on improving the fundamental reliability and agility of the solution(s) in use. The mandate that follows closely behind is cost reduction, which is also seen as a top priority among data protection implementers. These challenges should not be seen as contradictory or mutually exclusive; in fact, they can all be addressed by improved data protection solutions that are engineered as much for efficiency as they are for reliability and capability.
Tags : 
economic, value, data, domain, idpa
    
Dell
Published By: Dell     Published Date: Nov 02, 2018
When it comes to effectively and efficiently protecting growing volumes of data, midsized organizations face unique challenges. That is because they live in a world of constraints that are both operational and budgetary in nature. Cloud disaster recovery offers new options for these organizations—they can optimize their data protection economics by integrating on-premises protection solutions with cloud-based backup and recovery methods. Dell EMC’s cloud-ready solutions, particularly its Integrated Data Protection Appliances with native cloud extension capabilities, along with its Data Protection Software working in conjunction with its Data Domain backup storage appliances, provide cloud disaster recovery with flexible features. These solutions enhance operational efficiency and provide midsized organizations with clear economic and operational benefits.
Tags : 
    
Dell
Published By: Dell     Published Date: Nov 02, 2018
To out-innovate and out-pace their competition, organizations must be on a consistent path to keep their infrastructure modern. IT is under constant pressure to deliver optimized infrastructure for new business initiatives and supporting applications all while trying to contain or even reduce costs. In fact, respondents to ESG’s ongoing research consistently cite cost reduction as one of the top business drivers affecting their IT spending. When asked in a research survey how their organizations intended to contain costs in 2017, 27% of respondents said that they would be purchasing new technologies with better ROI. 1
Tags : 
    
Dell
Published By: Dell EMC     Published Date: Mar 18, 2016
This report documents hands-on testing and validation of an EMC data protection solution for virtual environments using Avamar Virtual Edition with a Data Domain system, with a focus on the ease of integration, efficiency, scalability, and backup/restore performance.
Tags : 
emc, lab validation, data protection, avamar virtual edition, data domain, business technology
    
Dell EMC
Published By: Dell EMC     Published Date: May 13, 2016
This report documents hands-on testing and validation of an EMC data protection solution for virtual environments using Avamar Virtual Edition with a Data Domain system, with a focus on the ease of integration, efficiency, scalability, and backup/restore performance.
Tags : 
emc, vmware, data protection, data domain, backup, data management
    
Dell EMC
Published By: Dell EMC     Published Date: Jul 05, 2016
This report documents hands-on testing of an EMC data protection solution for virtual environments using Avamar Virtual Edition with a Data Domain system
Tags : 
data management, business practices, data center. data application, enterprise applications, security, performance management
    
Dell EMC
Published By: Dell EMC     Published Date: Nov 03, 2016
Dell EMC Unity™ is modernizing the datacenter, delivering advances that simplify the task of keeping up with growing storage demands. Compared with previous generations of midrange storage, Unity's greater scale, density and simplicity can drive better economics and performance across your entire application portfolio.
Tags : 
storage, vmware, data protection, domain, encryption, data integration
    
Dell EMC
Published By: Dell PC Lifecycle     Published Date: Aug 09, 2018
For total peace of mind, trust your Data Protection to a vendor with a complete solution. Get the most out of Dell EMC Data Domain by leveraging the power of the Data Protection Suite Family .
Tags : 
    
Dell PC Lifecycle
Published By: Dell PC Lifecycle     Published Date: Aug 14, 2018
Wenn Sie kein Risiko eingehen möchten, sollten Sie die Data Protection einem Anbieter mit einer umfassenden Lösung anvertrauen. Holen Sie das Optimum aus Dell EMC Data Domain heraus – mit der leistungsfähigen Data Protection Suite.
Tags : 
    
Dell PC Lifecycle
Published By: EMC     Published Date: Sep 11, 2014
This paper outlines the top reasons for entry level storage and data protection from EMC, focusing on VNXe3200 and Data Domain DD2200 products.
Tags : 
data storage, entry level data storage, data protection, emc
    
EMC
Published By: EMC     Published Date: Sep 11, 2014
This paper focuses on Data Domain Boost and the many benefits it provides compared to doing traditional backups. Its purpose is to explain the technical and business reasons why DD Boost will change the way you do backups.
Tags : 
data domain boost, ddb, backups, data protection, data backup, benefits of ddb, emc, database security
    
EMC
Published By: EMC     Published Date: Sep 11, 2014
This paper focuses on Data Domain technology leadership and differentiation and why it matters to you. The purpose of this paper is to explore the technical and financial reasons why Data Domain systems are ideal for backup and archiving in your environment.
Tags : 
data domain technology, benefits of data domain, backup and archiving emc, database security
    
EMC
Published By: EMC Backup & Recovery Solutions     Published Date: Feb 05, 2010
Read this IDC white paper to understand the various approaches to solving today's backup and recovery challenges leveraging deduplication. The paper discusses how to dramatically improve IT economics by optimizing network bandwidth, backup windows, and storage footprint requirements in distributed and datacenter locations alike.
Tags : 
emc, data domain, efficiency, backup, recovery, idc, roi, it costs, infrastructure, dedupe, deduplication, database development, database security
    
EMC Backup & Recovery Solutions
Start   Previous   1 2 3    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.

We use technologies such as cookies to understand how you use our site and to provide a better user experience. This includes personalizing content, using analytics and improving site operations. We may share your information about your use of our site with third parties in accordance with our Privacy Policy. You can change your cookie settings as described here at any time, but parts of our site may not function correctly without them. By continuing to use our site, you agree that we can save cookies on your device, unless you have disabled cookies.
I Accept