data protection

Results 51 - 75 of 1194Sort Results By: Published Date | Title | Company Name
Published By: B Channels     Published Date: Dec 03, 2018
Long recognized as the market share leader of enterprise backup and recovery software, Veritas NetBackup™ is built to protect the largest and most demanding multi-cloud and data center environments. NetBackup delivers breakthrough capabilities for virtualized and cloud-based deployments that go well beyond what traditional backup practices can achieve.
Tags : 
    
B Channels
Published By: BAE Systems     Published Date: Dec 29, 2015
Find an approach that stops dangerous email leaks, keeps things simple, and lets you go about your business with minimal disruption
Tags : 
bae systems, applied intelligence, email, insider threat prevention, data breach, data loss, intellectual property, byod, cloud, credit union, email protection, hosted exchange, email security, messaging, cloud computing, dlp, encryption, data loss prevention, content filtering, email services
    
BAE Systems
Published By: bChannels - Software One     Published Date: Dec 11, 2018
For many years, organizations thought about business continuity in much the same way they thought about business insurance — yes, it was important, but rarely was it top of mind. But that’s all changed. Many organizations have, unfortunately, discovered that even a scant few minutes of service downtime can have deleterious effects on their business operations, resulting in lost revenue, diminished customer confidence and heightened compliance risk. For those and other reasons, IT executives have raised the bar on business continuity preparedness for their organizations in all ways. New technologies, business processes and partnerships, combined with a raised level of importance for testing and a full appreciation of what virtualization can and can’t do for business continuity, are essential to new thinking around avoiding the impact of an unplanned service interruption. Download this informative Whitepaper to learn more about how Veritas Netbackup 8.1.2 can help.
Tags : 
    
bChannels - Software One
Published By: BlackBerry     Published Date: Oct 03, 2012
An overview of BlackBerry PlayBook OS 2.0 security capabilities and features, including: BlackBerry® Balance technology, BlackBerry® Bridge, data-at-rest protection, and secure connectivity to support native email and corporate intranet access.
Tags : 
mobile security, corporate intranet, blackberry, secure connectivity, business technology
    
BlackBerry
Published By: Blue Coat     Published Date: Feb 04, 2016
What’s the best approach to cloud migration? Relying on your cloud service provider for data protection and compliance may not be enough. But, you can’t just write off cloud services due to security concerns. Get solid advice here.
Tags : 
    
Blue Coat
Published By: Blue Coat     Published Date: Feb 09, 2016
Lots of marketing claims are being made by Cloud Data Protection Gateway providers. It’s time for critical analysis. This Blue Coat paper reviews the key questions Security, Governance & Risk and IT should be asking vendors.
Tags : 
    
Blue Coat
Published By: Blue Coat Systems     Published Date: Jul 18, 2013
IT Leaders See security as barrier to enabling employees. However with new Business assurance technology you are able to give Continuity, Agility, and Governance. With Blue Coat you can deliver business continuity by protecting against threats and data loss, extend protection and policy to users in any location on any device ,safely deploy and consume all types of applications, align IT infrastructure with business priorities to assure and accelerate user experience across the extended enterprise and make risk management tradeoffs and enforce compliance.
Tags : 
technology, bluecoat, infrastructure
    
Blue Coat Systems
Published By: BMC Control M     Published Date: Apr 01, 2009
Listen in as Sentrigo interviews Dr. Charles Popper, who discusses specific data integrity and security requirements for the pharma sector. Dr. Popper will address how to enforce the proper balance of information sharing and database protection, without compromising high-quality research.
Tags : 
data management
    
BMC Control M
Published By: Bocada     Published Date: Aug 21, 2009
Today, the common approach to collecting information about computing activity across the enterprise is to use software agents installed on individual clients and servers. However, when this approach is applied to data protection management in the enterprise environment, it has proven both ineffective and inefficient.
Tags : 
data protection, network security, software agent, agentless, bocata, bocada
    
Bocada
Published By: Bocada     Published Date: Aug 21, 2009
The paper then reveals a methodical, step by step process for implementing an SLA, from drawing up the initial requirements, to using the SLA to drive continuous improvements that are squarely focused on strategic business value.
Tags : 
service level, sla, service level agreement, service-level agreement, business management, business value, service management, itsm, bocada, bocata
    
Bocada
Published By: Bocada     Published Date: Aug 21, 2009
This strategic view is the proverbial "gold" that can be mined from your data protection systems; it is the asset that will enable IT management to prioritize activity to bring activities in line with business objectives and communicate policy compliance to corporate officers and data owners.
Tags : 
data consolidation, data protection, business management, business value, security policies, security policy, policy management, mission critical, mission critical data, bocata, bocada, data management
    
Bocada
Published By: Bocada     Published Date: Aug 21, 2009
This white paper focuses on Sarbanes-Oxley Act (SOX) regulations relevant to data protection, and describes both best practices and automated tools used by today's leading storage managers and backup/recovery teams to meet the mandates of SOX.
Tags : 
sarbanes oxley act, sarbanes oxley, sarbox, sox, sox compliance, compliance, financial, finance, auditing, security audit, audit, sox audit, data protection, storage management, bocada, bocata
    
Bocada
Published By: Bocada     Published Date: Aug 21, 2009
This white paper shares the best practices for company data security used by some of today's most progressive IT leaders to help align their group's efforts with company goals and to make their data protection activities more successful.
Tags : 
data protection, best practices, business goals, business management, it management, change management, bocata, bocada
    
Bocada
Published By: Box     Published Date: Jun 22, 2018
With GDPR looming large on the horizon in May 2018 and beyond, there are a number of myths and misunderstandings circulating around the upcoming changes to compliance and data protection. In this expert e-guide, we explore how to maintain compliance for your critical content in the cloud. Uncover vendor-agnostic compliance tips from Box compliance president Crispen Maung for your content management system, and delve into topics, like: • GDPR strategies for cloud ECM • Cultural changes for upcoming compliance regulations • Projected fines associated with GDPR • And more
Tags : 
    
Box
Published By: Brainloop     Published Date: Oct 25, 2011
External collaboration is a major source of information risk. New tools make document collaboration much easier, but may have serious security issues. Learn more about industry trends and demands for security and compliance in online collaboration.
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, file protection, it risk management, mergers acquisition due diligence, mobile collaboration, online collaboration, online document storage, password protect documents, saas collaboration, saas security, secure collaboration, secure document, secure file sending
    
Brainloop
Published By: Brainloop     Published Date: Nov 03, 2011
Online collaboration has allowed companies to leapfrog their competition. But how do they avoid risk? This paper explores options for high-productivity collaboration supporting security and compliance. Must reading for anyone interested in strategic IT and compliance!
Tags : 
cloud collaboration, cloud security, collaboration application, collaboration environment, data protection, data room, digital rights management, document protection, document security, document sharing, electronic document management, file protection, governance, grc, information risk, it risk management, mergers acquisitions due diligence, mobile collaboration, online collaboration, online document sharing
    
Brainloop
Published By: Brainloop     Published Date: Nov 09, 2011
This white paper by Cheryl Klein, CPA, CISA, CITP, analyzes 10 questions that help identify compliance risks in your company. The 10 scenarios illustrate smart, cost-effective strategies for SOX, PII, HIPPA and security policy issues.
Tags : 
brainloop, security, compliance risks, sharing information, security management, data protection
    
Brainloop
Published By: Breece Hill, LLC     Published Date: Mar 15, 2007
Once a business clears the financial hurdle and begins to plan their data protection strategy the choices can appear daunting. Do they select tape or disk? Apply differential or incremental backups? How much will a new system cost and how much time will it take to implement? What data should be included in the backup? This article attempts to address these concerns.
Tags : 
smb, storage, archiving, backup, hardware, small business networks, storage, backup and recovery, data protection, data management, breece hill
    
Breece Hill, LLC
Published By: CA Technologies     Published Date: Apr 06, 2017
CA Technologies (NASDAQ: CA) creates software that fuels transformation for companies and enables them to seize the opportunities of the application economy. Software is at the heart of every business, in every industry. From planning to development to management and security, CA is working with companies worldwide to change the way we live, transact and communicate—across mobile, private and public cloud, distributed and mainframe environments.
Tags : 
enterprise security, it security, payment card fraud, risk management, cyber attacks, risk, data protection, threat analytics, integrated mitigation
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Available as a rack-mounted, hardened hardware appliance, an Open Virtualization Format (OVF) Virtual Appliance or an Amazon Machine Instance (AMI), CA Privileged Access Manager enhances security by protecting sensitive administrative credentials, such as root and administrator passwords, controlling privileged user access and proactively enforcing policies and monitoring and recording privileged user activity across all IT resources.
Tags : 
cyber attacks, data protection, it security, security solutions, system protector, web security, analytics
    
CA Technologies
Published By: CA Technologies     Published Date: Apr 06, 2017
Privileged identity, accounts and credentials are core, critical assets for enterprises that must be highly protected through a combination of technology and processes which are enabled by privileged access management. Delivering that protection is instrumental in breaking the data breach kill chain, helping to prevent attacks and mitigating the impact of those that do occur.
Tags : 
data breach, it security, malicious spyware, security management, cloud security, system protection
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 13, 2017
"Explore survey results on the readiness of organizations to meet the compliance needs of the GDPR. Given the GDPR is set to have wide-ranging implications for the type of data that can be used in non-production environments, CA Technologies wanted in particular to understand how companies are planning for the GDPR and what processes and technology is needed to help them. Explore the results of a survey to understand the readiness of organizations to meet the compliance needs of the GDPR."
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 13, 2017
"The Implications for Test Data Management The GDPR is set to have wide-ranging implications for the type of data which can be used in non-production environments. Organizations will need to understand exactly what data they have and who’s using it, and be able to restrict its use to tasks where they have consent. Learn more about how you can protect the data that matters most and comply with the GDPR."
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 13, 2017
"As the EU General Data Protection Regulation (GDPR) looms overhead, finding specific answers to these obvious questions, How do I best want to secure my data, and which kind of data? Which milestones along the development journey are most at risk?, you might also begin to ask the right questions about how to solve them, and with that, begin ticking the GDPR box for each and every task at hand. View this Computing Research report to understand why GDPR is a state of mind, not just a technology solution."
Tags : 
    
CA Technologies
Published By: CA Technologies     Published Date: Sep 13, 2017
"Companies have complied with data protection directives and regulations for more than two decades. But the General Data Protection Regulation (GDPR), an overhaul of existing European Commission data protection legislation, aims to strengthen and unify those laws for EU citizens. Primary GDPR objectives are to give citizens back control over their personal data and simplify the regulatory environment for international business. For organizations already compliant with Directive 95/46/EC, what do they need to do from a technology perspective to comply with GDPR? Read this solution brief to see how CA can help you with GDPR compliance."
Tags : 
    
CA Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.