system protection

Results 101 - 125 of 140Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Nov 09, 2012
Many organizations today are introducing additional controls and accountability into management practices to improve governance and mitigate against risk. Read this white paper to learn more about Information governance and auditing with System Z.
Tags : 
ibm, system z, information governance audit, protection, data protection, business technology
    
IBM
Published By: Sponsored by HP and Intel®     Published Date: Nov 05, 2012
Today, there are many backup and recovery solutions aimed at protecting Hyper-V virtualized environments. Read this white paper to learn how HP StoreOnce backup systems provide a data protection platform that uses deduplication for data retention.
Tags : 
storeonce, deduplication, data retention, data management, business technology, data center
    
Sponsored by HP and Intel®
Published By: Webroot     Published Date: Sep 14, 2012
A free tool that provides the fastest, most comprehensive diagnostic report to help IT Managers identify where system issues exist.
Tags : 
system analyzer, security, improving performance, system scan, security threats, it management, av protection, webroot, threat protection, threat scan, threat, business technology
    
Webroot
Published By: Symantec.cloud     Published Date: Sep 12, 2012
Download this whitepaper to learn three useful steps to protect your virtual systems. There's no better time than the present to give your virtual systems top-of-the-line backup and restore protection.
Tags : 
virtual systems. virtualization, backup and recovery, backup automation, symantec, data management, business technology, data center
    
Symantec.cloud
Published By: Oracle     Published Date: Apr 03, 2012
Although more than two-thirds of confidential information is regulated through database management systems, no computer security program offers adequate protection for the databases against the main threats affecting them today. Oracle, the leader in databases technologies, offers security solutions for the protection of all layers of the database.
Tags : 
grid computing, oracle, database applications
    
Oracle
Published By: GFI Software     Published Date: Feb 24, 2012
During this webcast, GFI Senior Threat Researcher Chris Boyd discussed:How to identify botnets in your systems, how to remediate botnet malware, how to maximize protection against botnets and how to educate users to prevent infections.
Tags : 
gfi software, technology, security, application security, anti virus, intrusion detection
    
GFI Software
Published By: The TriZetto Group     Published Date: Oct 20, 2011
The evolving healthcare landscape has created a wealth of fresh opportunities for payers. There is a sense of urgency for payers in leadership roles to leverage technology and successfully transition to a value-driven healthcare system that rewards top performers and high quality standards. Passage of the Patient Protection and Affordable Care Act (PPACA) quickly changed many aspects of payers' business with higher costs, new oversight, more competition and a longer-term promise of millions of new members. Since healthcare insurance reform became law, opponents have vowed changes, if not its outright repeal. While it may be tempting to take as little action as possible and hope that the 2010 mid-term election or 2012 general election will make this all go away, the reality is that repeal is not a likely possibility.
Tags : 
trizetto, healthcare, healthcare reform, ppaca, investments
    
The TriZetto Group
Published By: Quest Software     Published Date: Jul 28, 2011
In this white paper Quest's data protection experts offer five tips for effective backup and recovery to help you avoid the challenges that might keep you from fully protecting your virtual assets and infrastructure.
Tags : 
quest, storage virtualization, it management, systems management solutions, virtualization managemen, windows, database, application, oem, innovation accelerator, smb, recovery, data protection, identity management, development, optimization, access management, migration, consolidation, performance
    
Quest Software
Published By: StorageCraft® Technology Corporation     Published Date: Jun 21, 2011
Save time, money, and storage space with ShadowProtect® disk-based backup and disaster recovery software - backup everything and recover anywhere
Tags : 
shadowprotect, storagecraft, storage, backup, disk-based, tape, operating system, windows, running in minutes, save time, recovery, protection, information, it administrators
    
StorageCraft® Technology Corporation
Published By: ESET     Published Date: Jun 20, 2011
Trusted experts in endpoint security solutions. Learn more today!
Tags : 
cloud computing, endpoint security, evolution, google, hype, information technology, microsoft, windows, attacks, apple, linux, mobile, operating systems, solutions, endpoint, protection
    
ESET
Published By: Symantec     Published Date: Jun 02, 2011
Download this white paper and learn how system-level protection can help your business keep data secure, available, and organized.
Tags : 
symantec, esg, data backup and recovery, system-level protection, data protection, rto, recovery time objective, rpo, cost reduction
    
Symantec
Published By: GFI Software     Published Date: Feb 24, 2011
This white paper, sponsored by GFI Software, addresses the variety of issues facing organizations today in the context of their system management challenges, and discusses the capabilities of VIPRE Antivirus Business, an integrated platform that provides high performance, integrated endpoint protection capabilities.
Tags : 
gfi software, sunbelt, malware protection, system management, threats, endpoint infrastructure, viruses, worms, spyware
    
GFI Software
Published By: Shavlik Technologies     Published Date: Dec 14, 2010
Whalen Furniture needed an improved patch management solution that was more efficient, less time consuming, reduced risk, and ensured uptime on a 24/7 basis to support the needs of a rapidly growing global company.
Tags : 
shavlik security, system protection, automated patch management, risk, antivirus, patch deployment, manufacturing
    
Shavlik Technologies
Published By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : 
lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware, configuration management
    
Lumension
Published By: Tripwire, Inc     Published Date: Mar 10, 2010
NERC enforces comprehensive reliability standards for planning and operating the collective bulk power system, including the Critical Infrastructure Protection (CIP) Cyber Security Standards.
Tags : 
tripwire, nerc compliance, it security, automation, cip, cyber security, reliability standard, log, event management
    
Tripwire, Inc
Published By: NetApp     Published Date: Feb 22, 2010
This paper addresses the many Exchange, SQL Server, and SharePoint implementations running on inefficient storage infrastructures, limiting scalability and complicating what should be fairly simple storage management tasks.
Tags : 
netapp, storage efficiency, microsoft application environment, exchange, sql server, sharepoint, storage management, tco, server virtualization, server operating system, data protection
    
NetApp
Published By: Vision Solutions     Published Date: Dec 04, 2009
The newest edition of this unique report is filled with survey findings from over 4,000 individuals responsible for the resilience and protection of AIX and IBM i (i5/OS) environments. Discover if and how your peers are meeting recovery-time and recovery-point objectives, disaster recovery plans and more.
Tags : 
vision solutions, ibm power systems, aix users, data protection, recovery and optimization, it availability, data management
    
Vision Solutions
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
This webcast will provide an overview of a very effective technology called Continuous Data Protection (CDP) also called continuous backup or real-time backup. CDP offers a valuable disk-based technology that enables a business to recover data to any point-in-time quickly and easily.
Tags : 
continuous data protection, cdp, mainline information systems, real-time backup, recover data, data protection, replication, cdp & ha
    
Mainline Information Systems
Published By: Mainline Information Systems     Published Date: Oct 20, 2009
This white paper will discuss the steps necessary to building a resilient business.
Tags : 
business continuity, mainline information systems, downtime, data loss, risk assessment, bcd, data protection, backup, platform protection, archiving
    
Mainline Information Systems
Published By: TopLayer     Published Date: Aug 21, 2009
This white paper is intended for Information Security and Information Technology professionals interested in understanding Zero-day Attacks, the various protection schemes available today and how Top Layer Network's Intrusion Prevention System (IPS) solutions provide the best mechanisms for protection from these types of attacks.
Tags : 
network security, intrusion prevention, ips, cso, server protection, toplayer, top layer
    
TopLayer
Published By: XOsoft     Published Date: Aug 21, 2009
Traditional backup systems provide a critical layer of insurance, but they represent all-or-nothing strategies that do not cover the minute by minute daily data writes to the disk. Continuous data protection fills in this gap by capturing changes to data while users are working. In the event of a data interruption, administrators can automatically reconstitute the data in reverse order to a point before it was corrupted or lost.
Tags : 
disaster plan, disaster recovery, data protection, storage, backup and recovery, backup, recovery, prevent data loss, xosoft
    
XOsoft
Published By: HP     Published Date: Jul 08, 2009
Today's economic climate has heightened the goal of every IT department to provide high-quality IT service to the business, at the lowest possible cost, while improving business outcomes. Looking outside of the infrastructure itself, there are two key challenges related to data storage: provisioning capacity for applications and reducing risk through a sound data protection strategy. This white paper discusses the challenges of creating the right storage infrastructure, provides an overview of data storage options, and examines a storage solution that combines blade servers and network-attached storage.
Tags : 
storage, storageworks, hp bladesystem, server, infrastructure, nas, network-attached storage, blade servers, data protection, san, fibre channel, iscsi, serial attached scsi, sas, proliant, msa, disk arrays, ethernet, rack, servers
    
HP
Published By: Stratus Technologies     Published Date: Apr 17, 2009
The long migration to electronic health records (EHRs) in the U.S. is set to speed up with the funding authorized by the American Reinvestment and Recovery Act of 2009.  But what are the specific risks when clinicians can’t access electronic health records? How far-reaching are the consequences when EHR data is lost, or its integrity is compromised?  This paper looks at the mission-critical role of EHR systems, and introduces availability solutions that build in uptime protection to ensure the continuity of operation that both caregivers and patients can depend on.
Tags : 
stratus, electronic health records, ehrs, american reinvestment and recovery act, health, records, availability solutions, mission-critical, medical grade servers, electronic medical records, emr, patient health records, phrs, computerized health record system, community health record (chr), diagnostic records, lab results, prescribed medication, downtime risk, stratus ftserver
    
Stratus Technologies
Published By: Tripwire     Published Date: Mar 31, 2009
HIPAA requires businesses that handle personal health information (PHI) to set up strong controls to ensure the security and integrity of that information. Learn how Tripwire Enterprise helps meet the detailed technical requirements of HIPAA and delivers continuous compliance.
Tags : 
tripwire, hipaa, security standards, section 164, american recovery and reinvestment act, new electronic health record systems, protected health information, phi, health and human services, hhs, health care, insurance, ehrs, electronic ph, ephi, access controls, password management, account management, access control, unique user identification
    
Tripwire
Published By: Tripwire     Published Date: Mar 31, 2009
How do organizations pass their PCI DSS audits yet still suffer security breaches? Paying attention to PCI DSS checklists only partially secures the cardholder environment. Learn the next steps for fully securing your data.
Tags : 
tripwire, pci checklist, security, cardholder security, enhanced file integrity monitoring, pci dss audits, security breaches, compliance, regulation, configuration assessment, it security, global payment system, risk, risk management, firewall, data protection, cis, disa, sans, routers
    
Tripwire
Start   Previous    1 2 3 4 5 6    Next    End
Search      

Add A White Paper

Email sales@inetinteractive.com to find out about white paper options for your company.