High Availability

High Availability is a system design protocol and associated implementation that ensures a certain absolute degree of operational continuity during a given measurement period.
Results 26 - 50 of 204Sort Results By: Published Date | Title | Company Name
By: Vision Solutions     Published Date: Aug 21, 2014
A report on research findings into the state of resilience and methods used companies to ensure their strength.
Tags : data management strategies, data protection, system migrations, data safeguarding, backup and recovery, clustering, business continuity, disaster recovery, high availability, server virtualization, cloud computing, data center design and management
     Vision Solutions
By: McAfee     Published Date: Jun 03, 2014
Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.
Tags : advanced evasion techniques, hacking methods, protection, firewalls, network security, anti spam, anti spyware, anti virus, hacker detection, high availability, internet security, network security appliance, security management
     McAfee
By: McAfee     Published Date: Jun 03, 2014
Learn about the weak points in current network security devices and disover the solution in protecting against against advanced hacking methods
Tags : advanced evasion techniques, hacking methods, protection, firewalls, network security, anti spam, anti spyware, anti virus, hacker detection, high availability, internet security, network security appliance
     McAfee
By: McAfee     Published Date: Jun 03, 2014
A white paper on the demands you should make from your next-generation firewall.
Tags : ngfw, mcafee, next-generation firewall, advanced evasion techniques, security, anti spam, anti spyware, anti virus, firewalls, high availability
     McAfee
By: McAfee     Published Date: Jun 03, 2014
A white paper on the demands you should make from your next-generation firewall.
Tags : ngfw, mcafee, next-generation firewall, advanced evasion techniques, security, access control, anti spam, anti spyware, anti virus, firewalls, high availability, internet security
     McAfee
By: McAfee     Published Date: Jun 03, 2014
A white paper on the demands you should make from your next-generation firewall.
Tags : ngfw, mcafee, next-generation firewall, advanced evasion techniques, security, access control, anti spam, anti spyware, anti virus, application security, firewalls, high availability, internet security
     McAfee
By: F5 Networks Inc     Published Date: Oct 31, 2013
This whitepaper utilizes end-user interviews to better understand their DDoS defense plans, where they discovered a clear knowledge gap around the Denial of Service attacks in use and the defenses needed to maintain availability. The paper provides detail on the attacks in use, suggests realistic defensive architectures and tactics and explains the basic process required to have a chance of defending against a DDoS attack.
Tags : denial of service, distributed denial of service, ddos, ddos attacks, denial of service attacks, security, availability, defensive, architecture, network, application, cia triad, confidentiality, integrity, network management, network security, application security, high availability
     F5 Networks Inc
By: EMC     Published Date: Apr 18, 2013
The RSA business continuity white paper, BCM Regulatory Soup, will help you address: Which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.
Tags : rsa, business continuity, disaster recovery, bcm, regulatory, compliance, anti spam, anti spyware, anti virus, application security, authentication, encryption, high availability, internet security, intrusion detection, intrusion prevention, security management, pci compliance, vulnerability management
     EMC
By: EMC     Published Date: Apr 18, 2013
See for yourself how easy it is to implement RSA Archer Business Continuity Management & Operations right out of the box. Try it free for 30 days, then take advantage of the special purchase offer through 7/31/13.
Tags : business continuity, disaster recovery, encryption, hacker detection, high availability, identity management, internet security, intrusion detection, intrusion prevention, patch management, security management, vulnerability management
     EMC
By: SilverSky     Published Date: Apr 16, 2013
Threats to the security of your network will never completely go away, but the ability to prepare for, recognize and quickly remediate these threats should be a part of day-to-day company operations. This white paper gives you eight essentials for managing vulnerabilities in a network including internal and external assessments, how frequently you should run scans for threats and the importance of broadening testing beyond basic network services and operating systems.
Tags : vulnerability management, security, threat management, security, assessment, anti spam, anti spyware, anti virus, auditing, compliance, email security, encryption, hacker detection, high availability, identity management, intrusion detection, intrusion prevention, security management
     SilverSky
By: Kaseya     Published Date: Apr 04, 2013
A complete and holistic solution can help organizations create system snapshots that can be restored quickly and efficiently, getting users back up and productive immediately.
Tags : disaster recovery, backup, business continuity, virtualization, security, rto, rpo, sla, backup and recovery, storage management, storage virtualization, high availability, vulnerability management
     Kaseya
By: Kaseya     Published Date: Apr 04, 2013
A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.
Tags : it security, anti-virus, vulnerability management, intrusion prevention, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, business continuity, compliance, disaster recovery, email security, encryption, firewalls, hacker detection, high availability, identity management
     Kaseya
By: Symantec     Published Date: Apr 04, 2013
This white paper discusses the malware threat, the potential impact on your business, and how to protect your company and your customers by using code signing.
Tags : malware, anti-virus, spyware, scareware, anti-malware, cyber criminals, code signing, security, anti spam, anti spyware, anti virus, auditing, compliance, email security, encryption, firewalls, high availability, identity management, internet security, intrusion detection
     Symantec
By: Symantec     Published Date: Apr 04, 2013
Stuxnet, a high-profile cyber-attack, used malware signed with legitimate code signing certificates. What went wrong and how can you protect your own assets?
Tags : code signing, cyber attack, anti-virus, intrusion prevention, private keys, asset protection, security, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, business continuity, encryption, firewalls, hacker detection, high availability, internet security
     Symantec
By: Symantec     Published Date: Apr 04, 2013
In this business guide, we discuss how the latest code signing technology works to secure software code and content for applications that are directly downloaded to mobile devices from the Internet.
Tags : code signing, mobile, apps, applications, mobile applications, hacking, cyber criminals, mobile security, app security, access control, anti spyware, anti virus, application security, auditing, business continuity, encryption, hacker detection, high availability, identity management, internet security
     Symantec
By: Oracle Corporation     Published Date: Apr 01, 2013
Discover how to accelerate database performance, handle change and growth in scalable, incremental steps, and deliver mission-critical data availability and protection with this unique commercial solution.
Tags : database, oracle, storage, data, data warehousing, high availability, database development, data protection, data quality, data replication, database security
     Oracle Corporation
By: Oracle Corporation     Published Date: Apr 01, 2013
This paper focuses on configuring Oracle GoldenGate to run on Oracle Exadata. The Oracle Exadata Database Machine can act as the source database, as the target database, or in some cases as both source and target databases for GoldenGate processing.
Tags : database, goldengate, oracle, maximum availability architecture, arcitecture, high availability, configuration management, database development, data protection, database security, data warehousing
     Oracle Corporation
By: TIBCO     Published Date: Mar 27, 2013
What are some of the pitfalls you can avoid when augmenting an existing infrastructure to maximize performance, results, and success? Read on.
Tags : integration, infrastrucutre, performance, enterprise, high availability, application integration, application performance management, best practices, business activity monitoring, business integration, business management, business process management
     TIBCO
By: McAfee     Published Date: Mar 08, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : database security, database vulnerability manager, database compliance, mysql security, database password security, sql injection, buffer overflow, insecure sql code, anti spam, anti spyware, anti virus, application security, auditing, business continuity, compliance, disaster recovery, encryption, hacker detection, high availability, internet security
     McAfee
By: Bit9     Published Date: Mar 07, 2013
Download this white paper and learn how to use a progressive, three-step approach to build trust, monitor activity and tailor protection to your enterprise and build an adaptive application control framework.
Tags : security, risk management, roi, cost reduction, enterprise, cyber threat, anti spam, anti spyware, anti virus, application security, auditing, ddos, disaster recovery, email security, encryption, hacker detection, high availability, internet security, intrusion detection, vulnerability management
     Bit9
By: Bit9     Published Date: Mar 07, 2013
In this whitepaper, Industry Analyst Frost and Sullivan examines today’s advanced threat landscape and recommends that organizations adopt a new approach to server security that is based on trust.
Tags : data breaches, data center, security, cyber threats, server, business continuity, access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, ddos, disaster recovery, encryption, hacker detection, high availability, internet security, intrusion detection
     Bit9
By: Arbor     Published Date: Mar 06, 2013
Read this Whitepaper to see the results of Infonetics Research on how the DDoS market is shifting and where it is going.
Tags : ddos, market trends, infonetics, ddos prevention, arbor networks, security, network, intrusion prevention, anti spyware, application security, disaster recovery, encryption, hacker detection, high availability, internet security, intrusion detection, security management, vulnerability management
     Arbor
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search White Papers