Enterprise Data Protection and PrivacyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Browse Directory>   Infrastructure and Systems ManagementSecurity SolutionsEnterprise Data Protection and Privacy  What is RSS?
Advertisement

ALL RESULTS
  1 - 25 of 495 | Next Page

A Tale of Two Architectures by ExaGrid Systems, Inc.

October 25, 2013 - (Free Research)
This informative resource examines a disk-based backup architecture that's built for today's virtual IT. Paired with data reduction and deduplication technology, this technology can help you optimize your recoveries, eliminate downtime, increase productivity and more. 
(WHITE PAPER) READ ABSTRACT |

NSM Insurance Stores Large-Volume Data Using ExaGrid and Veeam by ExaGrid Systems, Inc.

September 27, 2013 - (Free Research)
Check out this paper to explore how one company implemented a disk-based backup solution to conquer all virtualization challenges of today. Read on to learn more. 
(CASE STUDY) READ ABSTRACT |

Polk Audio Chooses ExaGrid over Data Domain for Faster Backups and Restores by ExaGrid Systems, Inc.

September 24, 2013 - (Free Research)
This informative paper explores how Polk Audio easily and affordably implemented a disk backup solution to achieve faster backups and restores. Read on to learn about the benefits they now enjoy. 
(CASE STUDY) READ ABSTRACT |

ExaGrid Appliance Product Line Configurations by ExaGrid Systems, Inc.

September 24, 2013 - (Free Research)
In this brief white paper, you will discover a disk-based deduplication system that leverages GRID computing software to provide long-term backup capacity. Find out how your backup system can be optimized with this innovative technology. 
(DATA SHEET) READ ABSTRACT |

Feature Comparison ExaGrid - EMC Data Domain by ExaGrid Systems, Inc.

September 20, 2013 - (Free Research)
This one page data sheet provides a feature comparison of the ExaGrid approach and the EMC data domain approach to offsite backups. Find out which approach delivers on product lifecycle, performance, backup application support, and much more. 
(DATA SHEET) READ ABSTRACT |

DCIG Buyer's Guide: Deduplicating Backup Appliance Under $100K by ExaGrid Systems, Inc.

September 10, 2013 - (Free Research)
This exclusive buyer's guide evaluates midrange deduplicating backup appliances under $100K. 
(WHITE PAPER) READ ABSTRACT |

Success Story: University Improves Backup and Recovery by Ditching Tape by ExaGrid Systems, Inc.

May 21, 2013 - (Free Research)
This two-page paper explores how UNI deployed an effective and affordable backup solution. Read on to discover the benefits they now enjoy. 
(CASE STUDY) READ ABSTRACT |

A New Set of Network Security Challenges by Dell Software

August 23, 2013 - (Free Research)
This new IDG survey reveals optimism about the ability of next-generation firewalls to help IT balance productivity and security. With both productivity and security becoming increasingly crucial, IT faces conflicting mandates from the business. 
(WHITE PAPER) READ ABSTRACT |

Five security considerations in the mobile age - Strengthen security in mobile environments with WebSphere DataPower appliances by IBM

December 31, 2012 - (Free Research)
While mobility presents today's organizations with new business opportunities, it also introduces alarming security risks. This guide counts down five key security issues you need to consider in order to drive mobile success. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of VMware vCenter Site Recovery Manager by Dell and VMware

May 31, 2013 - (Free Research)
Check out this informative paper to explore a DR solution that's built for today's virtualized IT. Find out the total economic impact of this market-leading DR management technology and discover how it can ensure simple and reliable disaster protection for all of your virtualized applications. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

SIEM: Utilizing Big Data Security Analytics by LogRhythm, Inc.

December 31, 2012 - (Free Research)
This report reviews an analysis tool that can help simplify logging and event management, allowing you to more easily separate problems and key events from normal background activity – even in the face of Big Data. Read on now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Automation Suite for NERC CIP Compliance by LogRhythm, Inc.

March 29, 2013 - (Free Research)
Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more. 
(WHITE PAPER) READ ABSTRACT |

Simplifying your Compliance Strategy by LogRhythm, Inc.

October 31, 2012 - (Free Research)
Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process. 
(WHITE PAPER) READ ABSTRACT |

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study by LogRhythm, Inc.

May 31, 2013 - (Free Research)
This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

SIEM Optimization: Ensuring Compliance and Security by LogRhythm, Inc.

September 03, 2013 - (Free Research)
Learn about a security information and event management (SIEM) system that combines log management, file integrity monitoring, host activity monitoring, and next-gen SIEM capabilities to help you optimize performance, ensure compliance, and boost security within your organization. 
(WEBCAST) READ ABSTRACT |

PCI and PA DSS Compliance Assurance with LogRhythm by LogRhythm, Inc.

October 31, 2012 - (Free Research)
Gain insight into the six domains of Payment Card Industry Data Security Standard (PCI DSS) and its 12 control requirements and learn how a particular solution enables you to improve your overall security and compliance posture while simultaneously reducing associated costs. 
(WHITE PAPER) READ ABSTRACT |

Vendor Report Card: Security Information & Event Management by LogRhythm, Inc.

September 04, 2013 - (Free Research)
This in-depth white paper expertly breaks down the current SIEM marketplace, and will help you differentiate between the many vendors in order to ultimately decide on a solution that aligns with your organization's needs. 
(ANALYST REPORT) READ ABSTRACT |

The Rising Threat of Corporate Cybercrime: Cybercriminal Motives and Methods by Trusteer

December 20, 2012 - (Free Research)
In this white paper, uncover the major cybercriminal attack methods and motives, and learn what modern cybercrime means for endpoint security. Read on to discover the growing need for effective antimalware today and more. 
(WHITE PAPER) READ ABSTRACT |

Don't Get Duped by Dedupe by Unitrends

May 23, 2013 - (Free Research)
This white paper presents a new, emerging strategy called adaptive deduplication, which delivers the advantages without the capital expense of hardware-based deduplication device. 
(WHITE PAPER) READ ABSTRACT |

Best Practices: Laptop and Mobile Backups Today by SearchDataBackup.com

April 19, 2013 - (Free Research)
This handbook offers insight into what's available today for laptop and mobile backup, how vendors are addressing the challenges associated with backing up these devices and how to choose a solution that's right for you and your needs. 
(EBOOK) READ ABSTRACT |

Secure, Reliable, Any-Size File Transfer with FileXpress by Attachmate Corporation

February 20, 2013 - (Free Research)
This brief video introduces a secure, reliable, and collaboration-friendly file transfer strategy capable of accommodating multiple platforms, protocols, and standards – keeping costs down and ensuring the safety of your sensitive information all while allowing you to keep up with the pace of business. 
(WEBCAST) READ ABSTRACT |

The Shortcut Guide to Eliminating Insecure and Unreliable File Transfer Methods by Attachmate Corporation

December 31, 2012 - (Free Research)
This informative resource details the limits of traditional file transfer solutions and offers advice on how to select and migrate from your legacy system to a reliable, secure enterprise-grade approach. 
(WHITE PAPER) READ ABSTRACT |

Attachmate Customer Story: National Bank of Abu Dhabi Secures Data in Transit by Attachmate Corporation

March 30, 2012 - (Free Research)
This case study explores how the National Bank of Abu Dhabi ensures their data in transit remains safe and meets all security and compliance regulations with the help of a managed file transfer (MFT) solution. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

The New Universe of Managed File Transfer: Why Your Existing Solution May Not Be Adequate by Attachmate Corporation

May 29, 2009 - (Free Research)
Uncover the driving forces for an advanced managed file transfer (MFT) solution, as well as what to look for in such an approach and the many benefits you can enjoy after implementing a solution. 
(WHITE PAPER) READ ABSTRACT |

Controlling the Cost of File Transfers by Attachmate Corporation

December 31, 2010 - (Free Research)
View this resource to learn about a family of managed solutions that can help you meet the file transfer needs of your enterprise without the costly, resource-hungry investment of a homegrown solution. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 495 | Next Page

> Explore alternative searches for: Enterprise Data Protection and Privacy

We are always striving to improve our customer experience. Please notify us if there is a company missing that you feel should be in our directory.


Advertisement

Search FindTech

Search the
Technology Services Directory

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts