Enterprise Data Protection and PrivacyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Browse Directory>   Infrastructure and Systems ManagementSecurity SolutionsEnterprise Data Protection and Privacy  What is RSS?
Advertisement

ALL RESULTS
  1 - 25 of 500 | Next Page

Copenhagen-based Transport Ministry Uses Software-defined Storage for Fehmarnbelt Tunnel Project by DataCore Software Corporation

June 30, 2013 - (Free Research)
Access this brief case study to learn how a Copenhagen based transport ministry conducted the most ambitious engineering project undertaken in modern times by connecting the Fehmarnbelt tunnel from Scandinavia to mainland Europe using a software based solution 
(CASE STUDY) READ ABSTRACT |

Exagrid Product Overview: High Performance, Scalable Disk Backup with Data Deduplication by ExaGrid Systems, Inc.

September 10, 2013 - (Free Research)
This informative data sheet outlines a disk-based backup and data deduplication appliance that's purpose-built for backup that leverages a unique architecture optimized for backup and restore performance, scalability and cost. 
(WHITE PAPER) READ ABSTRACT |

How to choose between scale-up vs. scale-out architecture for backup and recovery by ExaGrid Systems, Inc.

December 04, 2012 - (Free Research)
In this white paper, you will gain insight on how to choose between scale-up verses scale-out architectures for backup and recovery. Explore the pros and cons of each and which one is more economical for your organization. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Protection and Replication for Remote Data Sources by Iron Mountain

May 16, 2011 - (Free Research)
Employees sometimes lose track of their laptops, either through misplacing them or through theft. One of the main concerns of IT was to protect vital business data on laptops, to prevent that data from falling into the wrong hands, and also to get the employee's system working again. Read this case study to learn one company's solution. 
(CASE STUDY) READ ABSTRACT |

Mobile Device Management Technical Guide by SearchSecurity.com

March 06, 2013 - (Free Research)
In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise. 
(EZINE) READ ABSTRACT |

The Expanding Network Perimeter: How to Protect it With Unified Threat Management by Sophos, Inc.

August 15, 2012 - (Free Research)
Protecting a network becomes increasingly more complex as the perimeters continue to expand. With the growing adoption of cloud and mobile devices, IT pros have a number of different endpoints to manage. Consult this informative white paper to learn how unified threat management can help resolve network management. 
(WHITE PAPER) READ ABSTRACT |

HP Data Protector 6.2 software integration with HP 3PAR Storage System by HP

September 26, 2011 - (Free Research)
This white paper provides detailed information on how to integrate HP Data Protector software with HP 3PAR Storage Systems. The solution is based on Data Protector Zero Downtime Backup concept. The 3PAR InServ version mentioned and tested here is 2.3.1. 
(WHITE PAPER) READ ABSTRACT |

Integrating HP Data Protector Software with HP Data Deduplication Solutions by HP

December 10, 2008 - (Free Research)
This white paper will discuss HP Data Protector Software which fully supports HP data deduplication technologies allowing you to recover files more quickly while reducing your data management and storage costs. 
(WHITE PAPER) READ ABSTRACT |

Implementing Automated Replication For Cost-Effective Disaster Recovery by Dell, Inc. and Intel®

January 01, 2011 - (Free Research)
Gain workload mobility and recovery management across physical and virtual machines in heterogeneous environments with Dell AIM. Explore how Dell AIM simplifies the disaster recovery process and helps organization reach RTO and RPO targets by automating and validating storage management tasks. 
(WHITE PAPER) READ ABSTRACT |

Entitlement Reviews: A Practitioner's Guide by Varonis

July 30, 2009 - (Free Research)
This document delivers a step-by-step process that your organization can follow to ensure that you know who owns each data set and who should have access to that data. 
(WHITE PAPER) READ ABSTRACT |

Fixing the "Everyone" Problem by Varonis

July 30, 2009 - (Free Research)
Read this paper to learn what exactly the problem is with "everyone" access and what new solutions Varonis has to offer. 
(WHITE PAPER) READ ABSTRACT |

How Automated Solutions Can Help with Efforts Toward Sarbanes-Oxley Compliance by Varonis

September 2008 - (Free Research)
This document provides a brief overview of the Sarbanes-Oxley Act, (Sections 302 and 404), the impact of SOX on IT Departments, and the Varonis Data Governance solution for critical portions of the Sarbanes-Oxley Act of 2002. 
(WHITE PAPER) READ ABSTRACT |

Vendor Landscape: Security Information & Event Management by LogRhythm, Inc.

September 2013 - (Free Research)
This white paper helps break down multiple security information and event management (SIEM) vendor details for your convenience and assistance in finding the right one for your business. 
(ANALYST REPORT) READ ABSTRACT |

Ease GLBA Compliance with LogRhythm by LogRhythm, Inc.

October 2012 - (Free Research)
Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process. 
(WHITE PAPER) READ ABSTRACT |

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study by LogRhythm, Inc.

May 2013 - (Free Research)
This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

The Truth About Big Data: First in a Series by StoredIQ

June 2012 - (Free Research)
It’s time to learn the truth about big data. This resource provides an unbiased look at the reality of the big data phenomenon, and offers valuable insight into steps you can take to begin developing a big data management plan. 
(WHITE PAPER) READ ABSTRACT |

Web Security Gateway: Web 2.0 Secured and Simplified by Websense, Inc.

January 2011 - (Free Research)
The Websense Web Security Gateway is designed for customers that want to ensure their level of web security increases as the web evolves from a static resource, to a dynamic communication platform. 
(WHITE PAPER) READ ABSTRACT |

Risk and Compliance Outlook by McAfee, Inc.

November 2011 - (Free Research)
Forward-thinking companies have implemented or are in the process of developing risk management and compliance initiatives. Learn about options for auditable risk management programs that address IT security as a business risk. 
(WHITE PAPER) READ ABSTRACT |

McAfee Threats Report: Third Quarter 2010 by McAfee, Inc.

December 2010 - (Free Research)
This quarter we have seen quite a bit of activity from old nemeses such as Koobface, fake anti-virus software, password-stealing Trojans, and AutoRun (a.k.a. USB-based) malware; however, all these attack vectors take a backseat to the quarter’s most significant threat: Stuxnet. This report will look at the top malware threats around the globe. 
(ANALYST REPORT) READ ABSTRACT |

Protecting Applications and Data in a Virtual World with Dell AppAssure by Dell Software

October 2013 - (Free Research)
Check out this two-page paper to explore a backup and recovery solution built for today's virtual world that allows you to manage your virtual and hybrid environments from a single console, automate testing of every backup on a nightly basis, restore virtual data and apps in minutes and even seconds and much more. 
(WHITE PAPER) READ ABSTRACT |

Webroot Secure Anywhere Business Value Assessment by Webroot

August 2012 - (Free Research)
Consult this helpful resource to get financial justification for endpoint protection. Though you can't slap a price tag on a fully secured business enterprise, these eight simple questions can help you rest easy knowing you made the right choice! 
(WHITE PAPER) READ ABSTRACT |

Flushing Bank Invests in Internet Security with Webroot by Webroot

September 2011 - (Free Research)
New York-based financial institution, Flushing Bank, was in need of a new Internet security appliance as their current one could no longer effectively keep up with growing compliance and data loss prevention demands. View this case study to learn how Webroot Web Security was able to meet their needs as well as explore the key features it offers. 
(CASE STUDY) READ ABSTRACT |

What is Virtualization and how does it affect my Company? by Dell, Inc.

October 2011 - (Free Research)
This white paper provides a detailed analysis into simplifying your server setup – putting all of your important business applications in one place with server virtualization. Find out what virtualization can do for your business. 
(WHITE PAPER) READ ABSTRACT |

Airport operator reduces IT power use by around DKK 800,000 a year, supporting its target for cutting carbon emissions by Dell, Inc.

December 2010 - (Free Research)
A Danish airport company had to reduce its carbon footprint, so the IT team decided on a virtualized solution. Check out this brief white paper to learn how this company has reduced carbon emissions by about 200 tons a year, saved around 75% on future server investments and reduced admin time by 50%. 
(WHITE PAPER)

The Importance of Continuity in Office 365 Environments by Mimecast

April 2013 - (Free Research)
Email downtime can translate to big losses for your business, especially in Microsoft Office 365 environments. This valuable report explains how implementing a continuity strategy can enable your users to continue working even when service is unavailable. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 500 | Next Page

> Explore alternative searches for: Enterprise Data Protection and Privacy

We are always striving to improve our customer experience. Please notify us if there is a company missing that you feel should be in our directory.


Advertisement

Search FindTech

Search the
Technology Services Directory

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts