protection

Results 301 - 325 of 2247Sort Results By: Published Date | Title | Company Name
By: Akamai     Published Date: Mar 10, 2012
This white paper assesses the current cyber-threat environment and discusses the use of distributed cloud services as an effective means to protect against evolving, modern-day IT threats.
Tags : security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos
     Akamai
By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos
     Akamai
By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
Take a look at this flier for additional information regarding archiving and retention solutions from IBM.
Tags : ibm uk, data protection, information systems, information management, business continuity, business resiliency, business availability, dp&r
     Ogilvy - IBM UK
By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This ESG whitepaper reviews challenges introduced by data growth and focuses on IBM data protection and retention products/technologies that address storage efficiency.
Tags : ibm uk, esg, data growth, data protection, information systems, information management, business continuity, business resiliency
     Ogilvy - IBM UK
By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
This whitepaper explores the latest challenges and innovations in data protection and retention.
Tags : ibm uk, data protection, information systems, information management, business continuity, business resiliency, business availability, dp&r
     Ogilvy - IBM UK
By: Ogilvy - IBM UK     Published Date: Aug 08, 2011
Browse the data-sheet for additional information regarding archiving and retention solutions from IBM.
Tags : ibm uk, data protection, information systems, information management, business continuity, business resiliency, business availability, dp&r
     Ogilvy - IBM UK
By: Dell PC Lifecycle     Published Date: Mar 09, 2018
Prevent unexpected downtime with reliable failover protection. We interrupted access both local storage arrays - the Dell EMC database host seamlessly redirected all I/O to remote VMAX 250F with Intel® Xeon® Processor via SRDF/Metro with no interruption of service or downtime. The 3PAR solution crashed until the standby paths became active and we restarted the VM.
Tags : 
     Dell PC Lifecycle
By: Dell PC Lifecycle     Published Date: May 18, 2018
Companies Prioritize Detection Amidst A Wave Of Security Incidents Advanced endpoint threats and steady attacks change the way that decision-makers at organizations of all sizes and across industries prioritize, purchase, and execute on security initiatives. Now more than ever, IT security professionals recognize the importance of frontline detection and are shifting priorities to close gaps that place their organizations at risk.
Tags : 
     Dell PC Lifecycle
By: Schneider Electric     Published Date: Jun 03, 2019
The demands of modern IIoT applications increases the complexity of systems infrastructure and puts additional pressure on IT and OT security. As the frequency and sophistication of cyber-attacks increase, operations must leverage industry standards to achieve consistent protection. This paper will address how IEC62443 can be applied to industrial control systems and help readers understand the various priorities and steps required to help mitigate cyber threats.
Tags : smart control, empowered operators, optimized assets, future of automation, reliability, safety, cybersecurity, ecostruxture plant
     Schneider Electric
By: NetIQ     Published Date: Jun 11, 2012
Take the effort out of log management and gain the actionable information you need to improve your organization's security posture. Receive your complimentary whitepaper NOW!
Tags : netiq, netiq corporation, e-business infrastructure management, log and event management, event management, best practices, siem, logs
     NetIQ
By: CA Technologies     Published Date: Sep 29, 2011
Organizations must confront the reality that insider attacks are a significant threat and increasing in complexity. Given that so much of an organization's assets and information are online and accessible, organizations must take a proactive approach to defending against the insider attack. This proactive attack should involve a range of solutions that address identity and access management and information protection. Nothing can completely prevent all insider attacks, but those who adopt an aggressive proactive approach can help reduce risk, improve compliance, and enable the IT organization to better support business initiatives.
Tags : risk, attack, security, business, access control, anti virus, application security, identity management
     CA Technologies
By: CA Technologies     Published Date: Sep 29, 2011
The identity and access management challenges that exist in the physical world - identity management, application security, access control, managing sensitive data, user activity logging, and compliance reporting - are even more critical in the virtual environments that are growing in use as IT seeks to streamline its operations and reduce operating costs. However, security risks are increased due to the nature of the virtualization environment and IT should seek to extend their security solutions from the physical server environment to the virtualization environment as seamlessly as possible. Continue reading this white paper to learn how CA Content-Aware IAM solutions help protect customers in the physical world and similarly protect virtual environments by controlling identities, access, and information usage.
Tags : technology, virtual, identity management, access control, security, protection, application security, authentication
     CA Technologies
By: Dell Storage     Published Date: Apr 23, 2012
This white paper reveals the five storage imperatives or virtualizing mission critical applications and explains how to improve performance and responsiveness, achieve reliability and availability, reduce costs and implement powerful data protection.
Tags : technology, dell, storage center, storage, san, vmware, desktop management, infrastructure
     Dell Storage
By: Voltage Security     Published Date: Sep 13, 2012
Sending and receiving encrypted email with sensitive data should be a lot easier to do. But it ends up being something painful, and as a result we tend to avoid this protection.
Tags : data security, voltage, smartphones, tablets, smart security, email security, mobile email security, encryption
     Voltage Security
By: LifeLock     Published Date: May 31, 2012
With LifeLock® identity theft protection as part of your employee benefits package, you can differentiate your company from your competition and better retain top employees.
Tags : 
     LifeLock
By: LifeLock     Published Date: Jul 31, 2012
With LifeLock® identity theft protection as part of your employee benefits package, you can differentiate your company from your competition and better retain top employees.
Tags : lifelock, human resources, identity protection, benefits, solutions
     LifeLock
By: Datto Inc.     Published Date: Feb 05, 2013
In this white paper Datto explores the different types of risk in IT infrastructure and the ways intelligent business continuity can best mitigate that risk.
Tags : backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business
     Datto Inc.
By: Datto Inc.     Published Date: Apr 15, 2013
Small businesses are positioned for the perfect data storm: more data, at more value, with more risk. Their challenge has been not having an enterprise-class BDR solution built with their specific pain points in mind. Datto ALTO, and you, can change that. Datto wants you to succeed. As the only 100% channel-focused backup, disaster recovery (BDR) and intelligent business continuity (IBC) vendor, Datto is focused on the success of our Partners. Our Partners succeed by delivering award-winning solutions to their clients that are easy to sell, easy to manage, and will eliminate downtime in the event of a natural or technical disaster.
Tags : datto redefines bdr for small business, bdr solution, datto alto, robust bdr solution
     Datto Inc.
By: Datto Inc.     Published Date: May 08, 2013
TAG Computer Services shares why a golf course and real estate office need business continuity. This success story outlines what happens after two of their clients experienced server failure, yet TAG was able to minimize downtime and ensure business continuity.
Tags : datto, virus protection, msp, managed service provider, backup and recovery, disaster recovery, business continuity
     Datto Inc.
By: Datto Inc.     Published Date: May 08, 2013
Successful backup is the foundation for disaster recovery and business continuity. Without it, recovery and continuity cannot exist. Without it, an MSP cannot fulfill their SLA. This Executive Brief addresses four essential elements to ensure successful data protection.
Tags : backup, recovery, backup and recovery, business continuity, msp, managed service provider
     Datto Inc.
By: Arbor     Published Date: Mar 13, 2014
For hosting and cloud service providers, learn how to secure your data and seize those opportunities of generating more revenue.
Tags : arbor, frost and sullivan, arbor networks, ddos protection, hosting providers, cloud providers, cloud service, attack trends
     Arbor
By: Arbor     Published Date: Mar 13, 2014
IANS reviews the use of on-premise DDoS detection and mitigation tools.
Tags : arbor, ians, arbor networks, ddos protection, custom report, infrastructure, ddos solutions, ddos attacks
     Arbor
By: Arbor     Published Date: Mar 13, 2014
All enterprises need to have mitigation solutions in place. Information security is vital in the workplace and DDoS has become more complex over time. Determine whether services are the best option for primary protection through this whitepaper.
Tags : arbor, idc, distributed denial-of-service, ddos attack ddos solutions, dns reflection, exfiltration of data, security products, the cloud
     Arbor
By: Juniper Networks     Published Date: Oct 28, 2014
To understand why an open, scalable network architecture is essential for enhanced IT security in the cloud era, get our eBook. Read how to safeguard virtual and physical workloads & get always-on protection to reduce vulnerabilities.
Tags : cloud, data protection, security, security breaches, safe virtual environment, risk, network security
     Juniper Networks
By: QTS Data Centers     Published Date: Jun 09, 2015
Read this white paper to learn what you need to know about cloud security and the benefits cloud migration can bring to your organization.
Tags : cloud security, data protection, cloud migration, enterprise security, security, it management, wireless, data management
     QTS Data Centers
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Add White Papers

Get your company's white papers in the hands of targeted business professionals.