Enterprise Data Protection and PrivacyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Browse Directory>   Infrastructure and Systems ManagementSecurity SolutionsEnterprise Data Protection and Privacy  What is RSS?
Advertisement

ALL RESULTS
  1 - 25 of 500 | Next Page

Expand Disaster Protection for All Your Applications with VMware vCenter Site Recovery Manager by VMware, Inc.

July 22, 2013 - (Free Research)
This short resource explores a virtual disaster recovery solution and discusses the benefits it can provide. 
(WHITE PAPER) READ ABSTRACT |

The Total Economic Impact of VMware vCenter Site Recovery Manager by VMware, Inc.

May 31, 2013 - (Free Research)
This informative paper provides an analysis of a market-leading virtualized DR solution that provides automated orchestration and non-disruptive testing to simplify DR management of your virtualized applications. Discover the framework to evaluate the financial impact of this next-generation technology and find out the benefits it can provide. 
(WHITE PAPER) READ ABSTRACT |

Analyst Report: The ROI of vCenter Site Recovery Manager by VMware, Inc.

July 23, 2013 - (Free Research)
VMware vCenter™ Site Recovery Manager™ is the market-leading disaster recovery product that complements VMware vSphere® to simplify and reduce the cost of disaster protection for all virtualized applications. Now, with the help of a new Forrester Consulting study, you can calculate the Total Economic Impact™and potential ROI of this technology. 
(WEBCAST) READ ABSTRACT |

5 Ways to Improve Business Continuity by VMware, Inc.

October 23, 2013 - (Free Research)
This informative paper explores the ways VMware provides a holistic approach to protecting your IT environment from a variety of factors that can cause application downtime, including unplanned events like a server failure and even planned events, such as server maintenance. Read on now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Manage Risk & Achieve Better Disaster Recovery, Business Continuity with Virtualization by VMware, Inc.

July 22, 2013 - (Free Research)
This white paper discusses how integrating virtualization and the cloud into disaster recovery and business continuity initiatives can improve those ventures. 
(WHITE PAPER) READ ABSTRACT |

Modern IT Disaster Recovery 101 by VMware, Inc.

February 08, 2012 - (Free Research)
This online eBook provides insight and advice on how to build an effective disaster recovery strategy in the evolving world of virtual infrastructures, while mitigating the impact of so-called 'Black Swan' events in the datacenter. Practical, how-to best practices, real customer success testimonials and links to additional resources. 
(EBOOK) READ ABSTRACT |

Exagrid Product Overview: High Performance, Scalable Disk Backup with Data Deduplication by ExaGrid Systems, Inc.

September 10, 2013 - (Free Research)
This informative data sheet outlines a disk-based backup and data deduplication appliance that's purpose-built for backup that leverages a unique architecture optimized for backup and restore performance, scalability and cost. 
(WHITE PAPER) READ ABSTRACT |

How to choose between scale-up vs. scale-out architecture for backup and recovery by ExaGrid Systems, Inc.

December 04, 2012 - (Free Research)
In this white paper, you will gain insight on how to choose between scale-up verses scale-out architectures for backup and recovery. Explore the pros and cons of each and which one is more economical for your organization. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Protection and Replication for Remote Data Sources by Iron Mountain

May 16, 2011 - (Free Research)
Employees sometimes lose track of their laptops, either through misplacing them or through theft. One of the main concerns of IT was to protect vital business data on laptops, to prevent that data from falling into the wrong hands, and also to get the employee's system working again. Read this case study to learn one company's solution. 
(CASE STUDY) READ ABSTRACT |

Mobile Device Management Technical Guide by SearchSecurity.com

March 06, 2013 - (Free Research)
In this TechGuide from SearchSecurity.com, industry expert Lisa Phifer shares her vast knowledge on BYOD, MDM, data security, and more to help you get a handle on top mobile trends rocking the enterprise. 
(EZINE) READ ABSTRACT |

The Expanding Network Perimeter: How to Protect it With Unified Threat Management by Sophos, Inc.

August 15, 2012 - (Free Research)
Protecting a network becomes increasingly more complex as the perimeters continue to expand. With the growing adoption of cloud and mobile devices, IT pros have a number of different endpoints to manage. Consult this informative white paper to learn how unified threat management can help resolve network management. 
(WHITE PAPER) READ ABSTRACT |

Corporate Device Ownership and Top Security Concerns by BlackBerry

November 07, 2013 - (Free Research)
This e-guide from the experts at SearchConsumerization.com compares the bring your own device (BYOD) and the corporate-owned, personally enabled (COPE) models of enterprise mobility. Also inside, uncover the perceptions and realities of BYOD security. 
(EGUIDE) READ ABSTRACT |

IT Consolidation with VMware and Dell Equallogic ISCSI SANS by Dell, Inc.

April 03, 2009 - (Free Research)
Read this paper to learn how Dell EqualLogic™ PS Series iSCSI SANs can help to reduce the cost and complexity of IT Consolidation and uniquely integrate with VMware® Infrastructure to enable the fully virtualized IT environment. 
(ARTICLE) READ ABSTRACT |

Web Security Gateway: Web 2.0 Secured and Simplified by Websense, Inc.

January 13, 2011 - (Free Research)
The Websense Web Security Gateway is designed for customers that want to ensure their level of web security increases as the web evolves from a static resource, to a dynamic communication platform. 
(WHITE PAPER) READ ABSTRACT |

Risk and Compliance Outlook by McAfee, Inc.

November 10, 2011 - (Free Research)
Forward-thinking companies have implemented or are in the process of developing risk management and compliance initiatives. Learn about options for auditable risk management programs that address IT security as a business risk. 
(WHITE PAPER) READ ABSTRACT |

McAfee Threats Report: Third Quarter 2010 by McAfee, Inc.

December 02, 2010 - (Free Research)
This quarter we have seen quite a bit of activity from old nemeses such as Koobface, fake anti-virus software, password-stealing Trojans, and AutoRun (a.k.a. USB-based) malware; however, all these attack vectors take a backseat to the quarter’s most significant threat: Stuxnet. This report will look at the top malware threats around the globe. 
(ANALYST REPORT) READ ABSTRACT |

Protecting Applications and Data in a Virtual World with Dell AppAssure by Dell Software

October 11, 2013 - (Free Research)
Check out this two-page paper to explore a backup and recovery solution built for today's virtual world that allows you to manage your virtual and hybrid environments from a single console, automate testing of every backup on a nightly basis, restore virtual data and apps in minutes and even seconds and much more. 
(WHITE PAPER) READ ABSTRACT |

Webroot Secure Anywhere Business Value Assessment by Webroot

August 13, 2012 - (Free Research)
Consult this helpful resource to get financial justification for endpoint protection. Though you can't slap a price tag on a fully secured business enterprise, these eight simple questions can help you rest easy knowing you made the right choice! 
(WHITE PAPER) READ ABSTRACT |

Flushing Bank Invests in Internet Security with Webroot by Webroot

September 27, 2011 - (Free Research)
New York-based financial institution, Flushing Bank, was in need of a new Internet security appliance as their current one could no longer effectively keep up with growing compliance and data loss prevention demands. View this case study to learn how Webroot Web Security was able to meet their needs as well as explore the key features it offers. 
(CASE STUDY) READ ABSTRACT |

What is Virtualization and how does it affect my Company? by Dell, Inc.

October 31, 2011 - (Free Research)
This white paper provides a detailed analysis into simplifying your server setup – putting all of your important business applications in one place with server virtualization. Find out what virtualization can do for your business. 
(WHITE PAPER) READ ABSTRACT |

Airport operator reduces IT power use by around DKK 800,000 a year, supporting its target for cutting carbon emissions by Dell, Inc.

December 01, 2010 - (Free Research)
A Danish airport company had to reduce its carbon footprint, so the IT team decided on a virtualized solution. Check out this brief white paper to learn how this company has reduced carbon emissions by about 200 tons a year, saved around 75% on future server investments and reduced admin time by 50%. 
(WHITE PAPER)

Dell EqualLogic PS Series with VMware vCenter Site Recovery Manager by Dell, Inc.

February 02, 2010 - (Free Research)
VMware vCenter Site Recovery Manager (SRM) is a VMware vSphere 4.0 based solution that is tightly integrated with Dell EqualLogic PS Series storage to offer centralized disaster recovery management, automation, and testing for a virtualized datacenter. Read this solution brief to learn more about the features and benefits of this solution. 
(ARTICLE) READ ABSTRACT |

Cisco Continuous Data Protection for Files by Cisco Systems, Inc.

March 25, 2009 - (Free Research)
Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software. 
(WHITE PAPER) READ ABSTRACT |

Datalink's White Paper Library by Datalink and NetApp

May 06, 2010 - (Free Research)
Welcome to Datalink’s White Paper library. Inside you will find valuable data expertise - from an objective perspective. Here, you can find the information about the latest storage trends, relevant data topics, and new strategies to store, manage, and protect your data. 
(INFORMATION CENTER) READ ABSTRACT |

What to Look for When Evaluating Next-Generation Firewalls by Dell Software

December 10, 2012 - (Free Research)
This paper summarizes the results of three independent tests conducted by Network World, ICSA Labs and NSS Labs comparing next-generation firewall performance, cost and functionality. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 500 | Next Page

> Explore alternative searches for: Enterprise Data Protection and Privacy

We are always striving to improve our customer experience. Please notify us if there is a company missing that you feel should be in our directory.


Advertisement

Search FindTech

Search the
Technology Services Directory

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts