data protection

Results 126 - 150 of 1197Sort Results By: Published Date | Title | Company Name
Published By: CDW     Published Date: Feb 27, 2015
The real test of any SAM system goes beyond creating a one-time Effective Licensing Position (ELP) for a given software publisher. To be truly valuable, the SAM solution has to have the ability to manage change. Being able to work from a dependable list of software that has been approved by, and which also serves the business, means that finite IT & SAM resources are not wasted through the support of legacy software that might be deemed redundant, and should keep a company on track technically by not becoming dependent on aging software. This 10 –Minute Guide from SAM experts at Snow Software will show how to establish and maintain a Software Catalog for the purpose of ensuring that your software estate remains relevant and fit for its business purpose.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets, it management
    
CDW
Published By: CDW     Published Date: Feb 27, 2015
In a perfect world, managing the discovery of software assets, the capture of license entitlements and optimization of an organization’s software usage and compliance situation would be a single-click operation. Unfortunately, the world is not perfect and those charged with managing an organization’s software compliance, availability and expenditure face a number of challenges that can easily derail a Software Asset Management (SAM) program. This paper from the SAM experts at Snow Software investigates some of the major challenges facing SAM managers and IT executives and highlights how to build a successful strategy to overcome them, ensuring the SAM program delivers true value to the business.
Tags : 
software management, sam, software security, cloud computing, enterprise content management, business intelligence, office productivity apps, network security, internet security, network security appliance, security management, best practices, business management, data protection, mobile device management, snow, bank of ireland, assets, it management, business technology
    
CDW
Published By: CDW     Published Date: Jul 08, 2015
Your data is at risk. The threat of data breaches has grown larger than ever before, as attackers become more numerous and sophisticated. And as data becomes more precious, the damage that can be done by a data breach has increased greatly.
Tags : 
security, data protection, dlp, data breach, vulnerability management
    
CDW
Published By: CDW     Published Date: Apr 04, 2016
A critical step in moving from a shared virtualized environment toward a private cloud is the transition from infrastructure optimization to service optimization. NetApp’s design approach, technologies, and ecosystem integration build upon our storage efficiencies to deliver service-level efficiencies using centralized, policy-based management and automation. With NetApp® OnCommand® Workflow Automation, an efficient service-oriented approach can be implemented that enables storage provisioning, data protection, and operational processes to be integrated and automated. As a result, enterprises can meet workload service-level requirements while greatly reducing management costs and improving business agility.
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology, data management
    
CDW
Published By: CDW     Published Date: Apr 04, 2016
Data Fabric is NetApp’s vision for the future of data management. A data fabric seamlessly connects different data management environments across disparate clouds into a cohesive, integrated whole. A Data Fabric enabled by NetApp® helps organizations maintain control and choice in how they manage, secure, protect, and access their data across the hybrid cloud, no matter where it is. Although the data fabric is constantly evolving, organizations can start taking advantage of it today using NetApp technologies that enable data management and seamless data movement across the hybrid cloud.
Tags : 
data, application performance, data protection, performance optimization, cloud management
    
CDW
Published By: CDW     Published Date: Apr 04, 2016
Open Compute has had a significant impact on the thinking about data center design. Until now, the focus has been on systems at the rack level, leaving unanswered questions about the power infrastructure upstream of the rack. In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : 
data, application performance, data protection, performance optimization, data center, infrastructure management, data management
    
CDW
Published By: CDW - APC     Published Date: Apr 07, 2016
Open Compute has had a significant impact on the thinking about data center design. Until now, the focus has been on systems at the rack level, leaving unanswered questions about the power infrastructure upstream of the rack. In this paper, we address critical questions about the implications of Open Compute on the upstream power infrastructure, including redundancy, availability, and flexibility. We introduce simplified reference designs that support OCP and provide a capital cost analysis to compare traditional and OCP-based designs. We also present an online TradeOff Tool that allows data center decision makers to better understand the cost differences and cost drivers to various architectures.
Tags : 
data, application performance, data protection, performance optimization, data center, infrastructure management, data management, business technology
    
CDW - APC
Published By: CDW - NetApp     Published Date: Apr 07, 2016
A critical step in moving from a shared virtualized environment toward a private cloud is the transition from infrastructure optimization to service optimization. NetApp’s design approach, technologies, and ecosystem integration build upon our storage efficiencies to deliver service-level efficiencies using centralized, policy-based management and automation. With NetApp® OnCommand® Workflow Automation, an efficient service-oriented approach can be implemented that enables storage provisioning, data protection, and operational processes to be integrated and automated. As a result, enterprises can meet workload service-level requirements while greatly reducing management costs and improving business agility.
Tags : 
cloud management, cloud services, cloud management, it infrastructure, cloud application, cloud computing, infrastructure, technology, it management, data management, business technology
    
CDW - NetApp
Published By: CDW - NetApp     Published Date: Apr 07, 2016
Data Fabric is NetApp’s vision for the future of data management. A data fabric seamlessly connects different data management environments across disparate clouds into a cohesive, integrated whole. A Data Fabric enabled by NetApp® helps organizations maintain control and choice in how they manage, secure, protect, and access their data across the hybrid cloud, no matter where it is. Although the data fabric is constantly evolving, organizations can start taking advantage of it today using NetApp technologies that enable data management and seamless data movement across the hybrid cloud.
Tags : 
data, application performance, data protection, performance optimization, cloud management, it management, data management, business technology
    
CDW - NetApp
Published By: CDW Quantum     Published Date: Sep 07, 2012
What are you doing to keep your data safe? Check out these backup basics, learn about the options available and get advice on how to choose the right protection system for your needs.
Tags : 
disk backup, backup and recovery, deduplication, data protection, disaster recovery, business technology
    
CDW Quantum
Published By: CDW Quantum     Published Date: Sep 07, 2012
This case study profiles how infrastructureWORKS used Quantum's Scalar i40 entry-level LTO tape library to cut its backup management time by 90%.
Tags : 
infrastructure, data management, backup management, backup and recovery, disaster recovery, data protection, business technology
    
CDW Quantum
Published By: CDW Quantum     Published Date: Sep 07, 2012
Things have changed and your data backup needs to change with it. To get the basics for VM Data Protection click here.
Tags : 
virtual machines, vm data, data protection, virtualization, disaster recovery, backup and recovery, business technology
    
CDW Quantum
Published By: CDW Symantec     Published Date: Aug 02, 2012
With daily reports of network breaches on the way up, now is the time to double down on solid network protection. This whitepaper documents the evolution of data and identity theft and the strategic security approaches companies are taking to stay ahead of the curve.
Tags : 
data, identity, security, network, protection, mobile, security, documents, evolution, malware, sql, web, browser, hostile, e-mail, attack, password, lockdown, trusted, dlp
    
CDW Symantec
Published By: CDW Symantec     Published Date: Aug 02, 2012
Read the results of Symantec's research on the psychology behind intellectual property theft by corporate insiders. This report addresses the organizational anxiety surrounding potential theft of critical data by employees and describes what is known about the people and conditions that contribute.
Tags : 
indicators, intellectual, property, theft, symantec, psychology, research, corporate, insiders, anxiety, theft, stealing, steal, data, employees, protection, secure, conditions, it management
    
CDW Symantec
Published By: CDW Symantec     Published Date: Sep 06, 2012
See what happens if you neglect to protect your mission-critical applications and data, and learn what you can do to mitigate disaster.
Tags : 
data protection, data recovery, backup and recovery, disaster recovery, cloud-based backup services, virtualization
    
CDW Symantec
Published By: CDW Symantec     Published Date: Sep 06, 2012
What are you doing to keep your data safe? Check out these backup basics, learn about the options available and get advice on how to choose the right protection system for your needs.
Tags : 
disk backup, backup and recovery, deduplication, data protection, disaster recovery
    
CDW Symantec
Published By: CDW Symantec     Published Date: Sep 06, 2012
This case study profiles how infrastructureWORKS used Quantum's Scalar i40 entry-level LTO tape library to cut its backup management time by 90%.
Tags : 
infrastructure, data management, backup management, backup and recovery, disaster recovery, data protection
    
CDW Symantec
Published By: CDW Symantec     Published Date: Sep 06, 2012
Things have changed and your data backup needs to change with it. To get the basics for VM Data Protection click here.
Tags : 
virtual machines, vm data, data protection, virtualization, disaster recovery, backup and recovery
    
CDW Symantec
Published By: CDW Vmware     Published Date: Aug 02, 2012
There's a reason why the buzz around cloud computing never seems to die down. Concrete results are replacing the initial hype. Many organizations are taking advantage of private clouds which come with the accessibility of a public cloud and the security of a local server.
Tags : 
data, center, private, cloud, benefits, computing, security, local, server, protection, comliance, cisco, application, virtualize, standardize, hardware, internal, network, infrastructure
    
CDW Vmware
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
In today’s ‘always on, always connected’ world where sensitive data is almost certain to be stored electronically, organizations can no longer afford to operate without some form of Endpoint Protection. The costs related to network downtime or stolen data resulting from malicious attacks significantly outweighs that of maintaining an up to date solution. Although the unified nature of Endpoint Protection has made extensive security functionality easier to manage, selecting the right products can be a difficult task. This whitepaper aims to explain how the core functionality of Enterprise Protection suites have developed, what to look for in a solution, and which technologies will need to be considered in the future. In today’s business environment, it is no longer a question of whether to invest in Endpoint Protection, but a question of which solution is right for your organization.
Tags : 
endpoint security, data security, endpoint protection, enterprise protection, technology, networking, it management
    
CDW-Trend Micro
Published By: Centrify Corporation     Published Date: Dec 08, 2010
This white paper also describes Centrify DirectSecure's innovative, software-based approach to deploying a peer-to-peer IPsec solution that can dynamically isolate cross-platform systems and enable end-to-end encryption of data in motion.
Tags : 
centrify corporation, sensitive information, data protection, privacy and security, ipsec-based serve, domain isolation, microsoft active directory, data encryption
    
Centrify Corporation
Published By: CenturyLink     Published Date: Nov 18, 2011
See how Payment Card Industry compliance can keep customer data safe and strengthen your business.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles, voip, customers, kosks, mobile, applications, security, breaches, data, cards
    
CenturyLink
Published By: CenturyLink     Published Date: Mar 09, 2012
IT Security challenges are more complex than ever, as mobile devices, social technologies and cloud computing take hold. Find out how these top 2012 security trends will affect your organization-and make sure your data protection measures are ready.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles, networking, security, wide area networks, wide area networking, enterprise, protocals, mpl
    
CenturyLink
Published By: Cibecs     Published Date: May 30, 2012
The Cibecs and IDG Connect annual Data Loss Survey uncovers the latest trends and statistics around business data protection
Tags : 
    
Cibecs
Published By: Cisco     Published Date: Jan 29, 2009
For small and medium-sized businesses (SMBs), the impacts of a disaster can result in loss of or lack of access to data, applications, and work facilities. Those with disaster recovery plans in place fared much better than those without such contingency plans.
Tags : 
cisco, disaster preparedness, medium-sized businesses, smb, contingency plans, business continuity, recovery management, data protection, failover, points of failure, workforce continuity plan, disaster recovery plan, disaster response, voip
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.