protection

Results 1 - 25 of 2257Sort Results By: Published Date | Title | Company Name
Published By: F5 Networks Singapore Pte Ltd     Published Date: Dec 02, 2019
Safeguarding the identity of users and managing the level of access they have to critical business applications could be the biggest security challenge organizations face in today’s assumed-breach world. Credential theft is the leading attack type for causing a data breach, and bots are the driving force behind the majority of them. To defend against credential stuffing, prioritizing secure access and bot protection needs to be part of every organization’s security strategy.
Tags : 
    
F5 Networks Singapore Pte Ltd
Published By: Infinidat EMEA     Published Date: May 14, 2019
Continuous data availability is a key business continuity requirement for storage systems. It ensures protection against downtime in case of serious incidents or disasters and enables recovery to an operational state within a reasonably short period. To ensure continuous availability, storage solutions need to meet resiliency, recovery, and contingency requirements outlined by the organization.
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
Infinidat has developed a storage platform that provides unique simplicity, efficiency, reliability, and extensibility that enhances the business value of large-scale OpenStack environments. The InfiniBox® platform is a pre-integrated solution that scales to multiple petabytes of effective capacity in a single 42U rack. The platform’s innovative combination of DRAM, flash, and capacity-optimized disk, delivers tuning-free, high performance for consolidated mixed workloads, including object/Swift, file/Manila, and block/Cinder. These factors combine to cut direct and indirect costs associated with large-scale OpenStack infrastructures, even versus “build-it-yourself” solutions. InfiniBox delivers seven nines (99.99999%) of availability without resorting to expensive replicas or slow erasure codes for data protection. Operations teams appreciate our delivery model designed to easily drop into workflows at all levels of the stack, including native Cinder integration, Ansible automation pl
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
2017 and 2018 were not easy years to be a CIO or CISO, and 2019 isn’t showing any signs of being easier. With so many career-ending-level data breaches in 2017 (e.g., Equifax, Uber, Yahoo, to name a few) and with the stronger regulatory requirements worldwide, CIOs/CISOs have a corporate responsibility to rethink their approach to data security. Regulatory compliance aside, companies have a responsibility to their customers and shareholders to protect data, and minimize its exposure not only to external attackers but also to employees. The most common method of data breach in 2017 was a phishing email sent to a company’s internal employees (See 2017 Data Breach Investigation Report), This makes employees unwillingly complicit in the data breach. Over 80% of successful cyberattacks have a critical human element that enabled them. The average employee who opens the innocent-looking attachment or link, is unintentionally jeopardizing a company’s data. While there is no 100% protection, th
Tags : 
    
Infinidat EMEA
Published By: Infinidat EMEA     Published Date: May 14, 2019
The Increased Business Risk from a Data Breach
Tags : 
    
Infinidat EMEA
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
Your users, especially when working outside of the office, no longer need to always connect to the corporate network to get work done. They often connect directly to SaaS apps. And, let’s face it, employees also don’t turn on the VPN if they’re using their work laptop for personal use — which means they’re left with very little security protection. To solve these new challenges, security controls must also shift to the cloud. This in-depth white paper describes how security must evolve to protect users anywhere they access the internet, why traditional secure web gateway (SWG) solutions cannot address these gaps, and why a new kind of internet gateway represents an entirely new way of thinking about securing your users
Tags : 
    
Cisco Umbrella EMEA
Published By: Cisco Umbrella EMEA     Published Date: Nov 15, 2019
The average company uses more than 50 security vendors: firewalls, web proxies, SIEM, appliances, intelligence - and the list goes on. Do you have more security tools than you can handle? There’s an easier way to make the most of your existing investments. We'll share ways you can reduce security alerts and extend your security off network, anywhere users go, with Cisco Umbrella. Built with a bidirectional API, Cisco Umbrella easily integrates with the other systems in your stack, so you can extend protection from on-premises security appliances to devices and sites beyond your perimeter — and amplify investments you’ve already made. Read the eBook to learn more about getting more bang for your security buck.
Tags : 
    
Cisco Umbrella EMEA
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma's Vega Enterprise SBC provides full-featured protection and easy interconnection at the edge of enterprise networks.
Tags : 
sbc, enterprise appliance, vega sbc, sangoma, datasheet, cost effective solution, networking, knowledge management
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost effective, easiest to provision, and easiest to manage line of Session Border Controllers on the market. Sangoma’s Vega Enterprise SBC VM/Hybrid provides full-featured protection and easy interconnection.
Tags : 
vega sbc, enterprise, vm hybrid, data sheet, easy to use, cost effective, sbc solution, networking
    
Sangoma
Published By: Sangoma     Published Date: Jan 30, 2013
The most cost-effective, easiest to provision, and easiest to manage line of SBCs on the market. Sangoma’s Vega Enterprise SBC VM/Software provides full-featured protection and easy interconnection at the edge of enterprise networks.
Tags : 
sbc, vega sbc enterprise, vm/software, sangoma, session boarder control, ip communication, networking, knowledge management
    
Sangoma
Published By: CheckMarx     Published Date: Sep 12, 2019
Financial services organizations operate under a host of regulatory standards. This makes sense, as the assets and information managed by these firms are valuable, sensitive, and targeted by sophisticated cyber attackers daily. Compounding these challenges is the large volume of personally identifiable information (PII) that financial organizations handle regularly. PII is subject to many compliance regulations, notably the General Data Protection Regulation (GDPR), which regulates not only the processing of personal data, including PII, relating to individuals in the EU, for also any organization that processes personal data of EU residents. For US banking consumers, Section 5 (Unfair or Deceptive Acts or Practices) of the Federal Trade Commission Act and numerous state regulations enforce basic consumer protections, which financial organizations must also uphold.
Tags : 
    
CheckMarx
Published By: Veeam '18     Published Date: Dec 04, 2019
It’s no secret that well-crafted and reliable data-protection infrastructures are essential to the competitiveness of businesses. When using Hewlett Packard Enterprise (HPE) and Veeam® together, organizations can realize benefits such as better data Availability, streamlined IT operations, reduced data loss risk and significant financial rewards. In this new IDC research paper, The Business Value of High-Availability Storage Environments from Hewlett Packard Enterprise and Veeam Software, study participants share business values they gained such as: A 262% five-year ROI A 78% lower cost from unplanned downtime A 48% lower operations cost And more!
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: Dec 04, 2019
As more organizations turn to Hybrid IT infrastructures to drive their digital transformation efforts, data Availability becomes a business issue, not just an IT issue. With today’s 24.7.365 data and application needs, finding the right solution for the data-driven enterprise can be difficult. Most organizations are unable to manage and maintain data recovery and backup needs that are driving up operational costs. By deploying modern solutions from HPE and Veeam, organizations can leverage both primary and secondary storage to close these Availability and data protection gaps, while also lowering costs, reducing complexity, mitigating risk and fostering innovation and business agility. Read this white paper to find the right Hybrid IT solution for your data-driven organization.
Tags : 
    
Veeam '18
Published By: Veeam '18     Published Date: Dec 04, 2019
A transformation is underway in data centers around the globe as organizations transition from legacy storage solutions to all-flash storage arrays. All-flash provides significant benefits for businesses, such as greater capacity, scalability and predictable high performance. But the move to all-flash data centers does not come without some challenges and an element of increased risk of data loss. Read this new IDG white paper and learn more about: All-flash data center requirements and challenges How to provide effective data protection in an all-flash data center Best-of-breed partnership between Veeam® and Hewlett Packard Enterprise (HPE), and how this joint solution will help And more!
Tags : 
    
Veeam '18
Published By: Google - SAP     Published Date: Dec 02, 2019
"Report: 2019 Predictions for Customer Data Management Where will the next evolutions in customer experience, consumer privacy and the digital enterprise lead your business in 2019? In this report, we break down the hottest trends, biggest roadblocks and most tantalising opportunities facing the customer data management market. Download it now to explore megatrends that we see as being vital considerations if you want to thrive – not just survive – in today’s and tomorrow’s digital marketplace. You’ll discover: --Forecasts for the future of data protection and consumer privacy regulations --Predictions about cutting-edge technologies such as artificial intelligence, machine learning and customer data platforms --New frontiers ushered in by evolving cloud technology integrations and the convergence of the front and back offices"
Tags : 
    
Google - SAP
Published By: AWS     Published Date: Dec 03, 2019
Companies from different sizes and in different sectors are increasingly relying on Information and Communication Technologies (ICTs), and this has been key to innovation, productivity and growth. Despite the countless benefits and opportunities, there are challenges that arise when adopting ICTs, and small and medium enterprises (SMEs), generally face higher challenges if compared to larger companies. Having a poor ICT infrastructure, not knowing how to properly address complex cybersecurity threats, or underestimating the importance of protecting personal data are examples of these challenges faced by SMEs. Thiswhite paper therefore briefly describes some of the difficulties faced by SMEs given the increased adoption of ICTs. It also addresses crucial considerations pertaining to personal data protection and privacy, and the importance of making some institutional changes that allow for a “security-aware” culture to be created. It also explains how governments play different roles as
Tags : 
    
AWS
Published By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009
The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.
Tags : 
ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security
    
Ounce Labs, an IBM Company
Published By: Google - SAP     Published Date: Nov 01, 2019
"Report: 2019 Predictions for Customer Data Management Where will the next evolutions in customer experience, consumer privacy and the digital enterprise lead your business in 2019? In this report, we break down the hottest trends, biggest roadblocks and most tantalising opportunities facing the customer data management market. Download it now to explore megatrends that we see as being vital considerations if you want to thrive – not just survive – in today’s and tomorrow’s digital marketplace. You’ll discover: Forecasts for the future of data protection and consumer privacy regulations Predictions about cutting-edge technologies such as artificial intelligence, machine learning and customer data platforms New frontiers ushered in by evolving cloud technology integrations and the convergence of the front and back offices"
Tags : 
    
Google - SAP
Published By: Vision Solutions     Published Date: Apr 24, 2008
This white paper will provide a road map to the most effective strategies and technologies to protect data and provide fast recovery should data be lost or corrupted due to accident or malicious action.
Tags : 
vision, high availability, ibm, cdp, aix
    
Vision Solutions
Published By: Vision Solutions     Published Date: Sep 11, 2008
Journaling is a powerful feature, one that IBM has continued to develop and improve over the years. Yet, depending upon your business requirements, you probably still need more protection against downtime than journaling alone can provide. This white paper will cover what you need to know about journaling, what it can do and how it supports and cooperates with high availability software.
Tags : 
vision, high availability, ibm, idata protection, journaling
    
Vision Solutions
Published By: Vision Solutions     Published Date: Feb 26, 2010
Achieving effective and efficient high availability protection for larger IBM i environments requires careful thought and clear understanding of the technology options. This white paper describes what you need to know in order to make an informed decision about IBM i high availability strategies so that your business requirements for Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are not compromised
Tags : 
vision, high availability, ibm, cdp, aix, xsm
    
Vision Solutions
Published By: Vision Solutions     Published Date: Jul 06, 2008
This white paper provides a road map to the most effective strategies and technologies to protect data in AIX environments and provide fast recovery should data be lost or corrupted due to accident or malicious action. The paper also outlines the benefits of continuous data protection (CDP) technologies for AIX.
Tags : 
vision, high availability, ibm, aix, cdp
    
Vision Solutions
Published By: Vision Solutions     Published Date: Feb 18, 2008
Continuous member service is an important deliverable for credit unions, and. the continued growth in assets and members means that the impact of downtime is affecting a larger base and is therefore potentially much more costly. Learn how new data protection and recovery technologies are making a huge impact on downtime for credit unions that depend on AIX-hosted applications.
Tags : 
vision, high availability, ibm, aix, cdp, core union
    
Vision Solutions
Published By: Cibecs     Published Date: May 30, 2012
The Cibecs and IDG Connect annual Data Loss Survey uncovers the latest trends and statistics around business data protection
Tags : 
    
Cibecs
Published By: Astaro     Published Date: Jan 19, 2011
This white paper explains a new approach for providing complete, affordable and easy to manage security to even smallest branch offices.
Tags : 
astaro, branch office security, configuration, ip networks, data protection, remote workers, security policies, unified threat management
    
Astaro
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.