data protection

Results 201 - 225 of 1179Sort Results By: Published Date | Title | Company Name
Published By: CrowdStrike     Published Date: Apr 10, 2017
All ML technology isn’t created equal. Learn how the CrowdStrike® ML-based Engine Defends Against Unknown Malware. While many organizations are guarding the front door with yesterday’s signature-based antivirus (AV) solutions, today’s unknown malware walks out the back door with all their data. What’s the answer? A new white paper, “The Rise of Machine Learning in Cybersecurity,” explains machine learning (ML) technology — what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures. You’ll also learn about CrowdStrike’s exclusive ML technology and how, as part of the Falcon platform’s next-gen AV solution, it dramatically increases your ability to detect attacks that use unknown malware.
Tags : 
    
CrowdStrike
Published By: Carbonite     Published Date: Oct 05, 2017
Data protection often seems like a clash between competing interests: the need to protect data, against the need to protect access to data. The challenge lies in deploying the right protection across the different systems and types of data, since they each require different forms of protection. IT pros need confidence that the protection they deploy can: •Ensure long-term survivability of historical data •Deliver data securely to different waypoints. •Extend protection as environments change.
Tags : 
data protection, data security, carbonite, data recovery, data resiliency, data backup
    
Carbonite
Published By: Carbonite     Published Date: Oct 12, 2017
Today it is possible, even for smaller organizations, to establish both backup and full-fledged hybrid data protection under one robust onsite/offsite underpinning. ESG has four recommendations to assist such organizations as they try to pursue a disk-to-disk-to-cloud data protection strategy in the right way, with particular consideration for EVault by Carbonite.
Tags : 
evault, midsized businesses, data protection strategy, hybrid data protection, backup, recovery
    
Carbonite
Published By: Carbonite     Published Date: Oct 12, 2017
Carbonite provides data protection solutions for businesses and the IT professionals who serve them. Our product suite provides a full complement of backup, disaster recovery, and high availability solutions for any size business in any location around the world, all supported by a state-of-the-art global infrastructure.
Tags : 
draas, data recovery, recovery capability, cloud support, infrastructure
    
Carbonite
Published By: Druva     Published Date: May 22, 2017
Enterprise data is growing at an exponential rate. Download now to learn more!
Tags : 
    
Druva
Published By: Druva     Published Date: May 22, 2017
Wondering what data protection will look like in 2017? Download now to find out!
Tags : 
    
Druva
Published By: Wasabi     Published Date: Oct 20, 2017
For the past several years cloud storage has been dominated by three main players, Amazon, Google and Microsoft, offering relatively comparable services and solutions. Armed with revolutionary technology and an egalitarian philosophy, Wasabi is transforming what cloud storage can be and do. In this white paper we focus on cloud storage pricing comparing the economics of Wasabi versus the leading cloud storage options. Free trial with no credit card required offer available as well.
Tags : 
cloud storage, wasabi, cloud computing, storage, data protection
    
Wasabi
Published By: Wasabi     Published Date: Oct 26, 2017
Kim Komando, “America’s Digital Goddess,” is a leading radio host and web entrepreneur. Every month her video-taped three-hour weekly radio show adds 2.8 TB of video content to its extensive playback library. Switching from their current storage solution, a combination of NAS Arrays and Tape Drives, to Wasabi not only generated huge savings it was simpler and faster. Plus, since Cloudberry works seamlessly with Wasabi, the show also enjoys efficient and cost-effective remote data protection. In this Case Study read in detail how the ‘Kim Komando Show’ made the transition to next generation cloud storage.
Tags : 
data protection, multimedia content, cloud storage, backup, recovery, secondary storage platform
    
Wasabi
Published By: Wasabi     Published Date: Oct 26, 2017
At Wasabi, we believe that storage should be simple, inexpensive, interchangeable, reliable, fast and readily available to anyone who needs it. Just like bandwidth or electricity. Not only that it is mission critical. As data storage needs grow, both in terms of volume and leverage-ability, next generation cloud storage will become more and more of a necessity. In this White Paper Wasabi discusses that and more through their ‘5 Immutable Laws for Storing ALL Your Data in the Cloud.’ Free Trial Available: 1 TB. 30 Days. No Credit Card Required.
Tags : 
cloud storage, big data, hot storage, data protection, amazon s3
    
Wasabi
Published By: Splunk     Published Date: Aug 21, 2018
How can you utilize machine data to support compliance with the General Data Protection Regulation of the European Union? This white paper, “How Machine Data Supports GDPR Compliance”, answers this question and identifies three use cases that can help support your GDPR compliance program, regardless of the nature of your industry or deployment – on-premises, in the cloud or hybrid Download the white paper to: *Master the risks necessary to be prepared for GDPR through real-world scenarios *Understand which articles of GDPR will impact your business *Learn how machine data can help you overcome those requirements
Tags : 
    
Splunk
Published By: Splunk     Published Date: Aug 21, 2018
On May 25, 2018, per the General Data Protection Regulation (GDPR), organizations with business ties to the European Union will need to comply to GDPR standards. The cost of non-compliance are stiff fines. The GDPR contains nearly 100 separate and nuanced articles that can be difficult to understand even if you are a data privacy expert. This short primer is a cheat sheet to help both the data privacy expert and non-expert approach the GDPR with key takeaways. Download your free copy of “A Short Primer of GDPR Essentials” to learn: *Financial Implications: The potential impact of a GDPR breach condition. *Key Focus Areas: A "new considerations checklist" for data privacy experts. It can also be used as a basic "bootstrapping checklist" for those less versed in data privacy. *People, Process, Tools: Tips to help reduce anxiety and uncertainty about how to operationalize GDPR.
Tags : 
    
Splunk
Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
Cloud Access Security Brokers are one of the fastest growing security technologies today because they provide cloud service visibility, data security, threat protection, and compliance. CASBs are an effective and easy way to mitigate the top cloud security threats and security practitioners look to trusted CASB providers as strategic partners to help advise on key cloud security decisions.
Tags : 
    
Oracle Security Solutions
Published By: Oracle Security Solutions     Published Date: Oct 20, 2017
Whether you are leveraging the cloud for software as a service (SaaS), infrastructure as a service (IaaS), or platform as a service (PaaS), cloud security is a mandatory cost of doing business. In June 2016, Gartner issued a press release identifying the top information security technologies and included cloud access security brokers (CASBs) at the top of that list. Protecting your data and IP in the cloud is not an option. Knowing that an ROI for a CASB could be longer term, how do you quickly quantify the additional value a CASB provides so that it gets a high priority in your already stretched information security budget? This white paper helps you to build a business case by walking you through the cost considerations and payback of a CASB. It demonstrates that a CASB provides stronger cloud protection at a lower cost than traditional security processes and tools.
Tags : 
    
Oracle Security Solutions
Published By: Dell & Microsoft     Published Date: Jul 10, 2013
This guide will examine major business risks associated with traditional data protection approaches, particularly with regard to their applicability for a hybrid, virtual + physical data center. It will redefine the business goals and drivers for data protection, and consider alternative approaches that better meet those goals.
Tags : 
data protection, virtual data center, physical data center, hybrid
    
Dell & Microsoft
Published By: Mimecast     Published Date: Apr 25, 2017
Five Necessary Changes to Comply The EU General Data Protection Regulation (GDPR) deadline is approaching. You may think you’re immune from its impact, but if you do business with customers in the EU, think again. It’s time to rethink your organizational processes around compliance. This Forrester Research Brief helps your security, regulatory and privacy teams grasp the five changes necessary for GDPR compliance.
Tags : 
gdpr, security, regulation, forrester
    
Mimecast
Published By: Mimecast     Published Date: Aug 22, 2017
Email security is essential in preparing for the GDPR deadline. The GDPR emphasizes the principle of accountability and the need for organizations to demonstrate they have taken reasonable measures to protect personal data. This white paper explores how to improve email and cloud security to meet strict compliance regulations. Uncover: • GDPR challenges for email • How to mitigate risks and ensuring email resiliency • An effective email and cloud security platform
Tags : 
gdpr, risk mitigation, email resiliency, personal data protection
    
Mimecast
Published By: Mimecast     Published Date: Nov 28, 2017
With the pending EU General Data Protection Regulation (GDPR), your organization must consider a wide variety of changes for compliance if you hold EU resident data. Your organization should look at GDPR as an opportunity to modernize storage, compliance and security needs. But what services should be considered? Download to learn more including: • How the right providers can help you build a business case for GDPR compliance • Ways providers can directly aid in the compliance process • Why the right tools can help with not just technology but process changes as well
Tags : 
software provider, cloud service provider, gdpr
    
Mimecast
Published By: Mimecast     Published Date: Nov 28, 2017
Does your organization have a plan for complying with the European Union’s General Data Protection Regulation (GDPR)? If email isn’t a part of that plan, you could face significant challenges, including severe financial penalties. Download now to get the facts about: • Why you can’t compromise when it comes to protection of email data • The challenges presented by Subject Area Requests • How noncompliance could cost your organization more than just money
Tags : 
gdpr, email compliance, data protection, compliance
    
Mimecast
Published By: Cisco Umbrella EMEA     Published Date: Oct 22, 2018
Can your organization afford to wait until after an attack happens to protect your users and your data? Perimeter security provides visibility and control for employee activity only when employees remain on a corporate network. What about roaming users who bypass the VPN? Or employees working in cloud applications? Web gateways only protect employees from threats over web ports 80 and 443. Today’s security must provide comprehensive protection across all ports and protocols to fill the gaps in the security stack. Hear from Eric Ahlm, Research Director at Gartner and Meg Diaz, Head of Product Marketing for Cisco Umbrella. Eric and Meg will address the challenges companies face as they compare modern convenience with the known risks of relinquishing visibility and control, especially as more sensitive data moves to the cloud. Join us for the guidance you need to stay ahead of the curve in 2018. We’ll discuss the right answer for protecting data in the digital age.
Tags : 
    
Cisco Umbrella EMEA
Published By: Carbonite     Published Date: Jan 04, 2018
Backup and high availability are both essential forms of protection that fulfill different roles within a data protection strategy. So which type of protection is right for different systems? According to recent analyst reports, experts recommend a blended approach that aligns data protection with type of data.By aligning data protection with data urgency, businesses can ensure higher levels of resiliency and reduce demands on internal resources.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Jan 04, 2018
Data protection often seems like a clash between competing interests: the need to protect data, against the need to protect access to data. The challenge lies in deploying the right protection across the different systems and types of data, since they each require different forms of protection.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Jan 04, 2018
For a backup solution to be considered flexible, it needs to satisfy several key business requirements. It should integrate seamlessly with any servers you’re running and provide full support for all the applications your business uses. It should enable you to protect assets in different parts of the country or overseas. And it should let you manage and monitor backups from anywhere. A flexible backup solution gives you everything you need to protect the technology investments you make now and in the future. So instead of having to buy multiple solutions to support your changing needs, you can have a single solution that adapts to fit your environment. We call that flexible deployment.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Jan 04, 2018
Backup alone is not enough anymore. Businesses today must put a range of recoverability options in place. That’s why it is encouraging to see Carbonite, a data protection company with cloud and hybrid offerings, making fresh moves to help organizations evolve beyond legacy backup. Years ago, Carbonite pioneered cloud backup for endpoint devices. Then it expanded, buying EVault in 2015 and DoubleTake in 2017. Just as Carbonite has long been at the forefront of offering what people need from cloud-based data backup, it now appears to be just as intent on providing what IT organizations need—hybrid data protection media and mechanisms.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Jan 04, 2018
These days, a lot of organizations are looking to the cloud to help them protect their data. They wish to take advantage of the appealing economics and operational agility that are two of the biggest attributes of a cloud-based IT infrastructure. Leveraging the cloud can be a smart choice for any organization interested in gaining more control over costs (i.e., almost all organizations). According to ESG research, reducing costs was the second most commonly reported business driver affecting IT spending in 2016.
Tags : 
    
Carbonite
Published By: IBM     Published Date: May 02, 2017
The growth of virtualization has fundamentally changed the data center and raised numerous questions about data security and privacy. In fact, security concerns are the largest barrier to cloud adoption. Read this e-Book and learn how to protect sensitive data and demonstrate compliance. Virtualization is the creation of a logical rather than an actual physical version of something. such as a storage device, hardware platform, operating system, database or network resource. The usual goal of virtualization is to centralize administrative tasks while improving resilience, scalability and performance and lowering costs. Virtualization is part of an overall trend in enterprise IT towards autonomic computing, a scenario in which the IT environment will be able to manage itself based on an activity or set of activities. This means organizations use or pay for computing resources only as they need them.
Tags : 
data protection, data security, data optimization, organization optimization, cloud management, virtualization, data center, cloud environment
    
IBM
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.