Enterprise Data Protection and PrivacyWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
Browse Directory>   Infrastructure and Systems ManagementSecurity SolutionsEnterprise Data Protection and Privacy  What is RSS?
Advertisement

ALL RESULTS
  1 - 25 of 500 | Next Page

A Tale of Two Architectures by ExaGrid Systems, Inc.

October 25, 2013 - (Free Research)
This informative resource examines a disk-based backup architecture that's built for today's virtual IT. Paired with data reduction and deduplication technology, this technology can help you optimize your recoveries, eliminate downtime, increase productivity and more. 
(WHITE PAPER) READ ABSTRACT |

NSM Insurance Stores Large-Volume Data Using ExaGrid and Veeam by ExaGrid Systems, Inc.

September 27, 2013 - (Free Research)
Check out this paper to explore how one company implemented a disk-based backup solution to conquer all virtualization challenges of today. Read on to learn more. 
(CASE STUDY) READ ABSTRACT |

Polk Audio Chooses ExaGrid over Data Domain for Faster Backups and Restores by ExaGrid Systems, Inc.

September 24, 2013 - (Free Research)
This informative paper explores how Polk Audio easily and affordably implemented a disk backup solution to achieve faster backups and restores. Read on to learn about the benefits they now enjoy. 
(CASE STUDY) READ ABSTRACT |

ExaGrid Appliance Product Line Configurations by ExaGrid Systems, Inc.

September 24, 2013 - (Free Research)
In this brief white paper, you will discover a disk-based deduplication system that leverages GRID computing software to provide long-term backup capacity. Find out how your backup system can be optimized with this innovative technology. 
(DATA SHEET) READ ABSTRACT |

Feature Comparison ExaGrid - EMC Data Domain by ExaGrid Systems, Inc.

September 20, 2013 - (Free Research)
This one page data sheet provides a feature comparison of the ExaGrid approach and the EMC data domain approach to offsite backups. Find out which approach delivers on product lifecycle, performance, backup application support, and much more. 
(DATA SHEET) READ ABSTRACT |

DCIG Buyer's Guide: Deduplicating Backup Appliance Under $100K by ExaGrid Systems, Inc.

September 10, 2013 - (Free Research)
This exclusive buyer's guide evaluates midrange deduplicating backup appliances under $100K. 
(WHITE PAPER) READ ABSTRACT |

Success Story: University Improves Backup and Recovery by Ditching Tape by ExaGrid Systems, Inc.

May 21, 2013 - (Free Research)
This two-page paper explores how UNI deployed an effective and affordable backup solution. Read on to discover the benefits they now enjoy. 
(CASE STUDY) READ ABSTRACT |

A New Set of Network Security Challenges by Dell Software

August 23, 2013 - (Free Research)
This new IDG survey reveals optimism about the ability of next-generation firewalls to help IT balance productivity and security. With both productivity and security becoming increasingly crucial, IT faces conflicting mandates from the business. 
(WHITE PAPER) READ ABSTRACT |

NSA Series data sheet by Dell Software

June 30, 2013 - (Free Research)
Now your organization can be both secure and productive without compromising network performance. The Dell™ SonicWALL™ Network Security Appliance (NSA) Series is the one of the most secure, highest performing next-generation firewall lines. 
(WHITE PAPER) READ ABSTRACT |

The One Essential Guide to Disaster Recovery: How to Ensure IT and Business Continuity by Vision Solutions

December 08, 2011 - (Free Research)
This white paper will help you ensure business continuity and survival by leading you through 3 essential steps—from understanding the concepts of disaster recovery and information availability to calculating the business impact of downtime. 
(WHITE PAPER) READ ABSTRACT |

Enabling a Storage Chargeback: Tips and Strategies for Getting Started by APTARE

October 01, 2013 - (Free Research)
This webcast explores why you should implement a chargeback solution, different models, chargeback vs. showback, key business requirements – what is your storage TCO? Find out how to get started now. 
(WEBCAST) READ ABSTRACT |

Demo: Step by Step Instructions for Setting up Storage Chargeback Reports by APTARE

October 01, 2013 - (Free Research)
This brief webcast details step-by-step instructions for setting up storage chargeback reports. 
(WEBCAST) READ ABSTRACT |

Measuring Storage Utilization and Efficiency: Challenges and Questions to Consider by APTARE

September 30, 2013 - (Free Research)
In this white paper, you will discover how a Fortune 50 Company implemented a capacity manager solution to provide a 360 degree view of their storage capacity – providing them the visibility they needed to accurately track how, where and when storage was used throughout the global company. 
(CASE STUDY) READ ABSTRACT |

Cost Benefits and Key Attributes of a Successful Storage Chargeback Model by APTARE

September 30, 2013 - (Free Research)
This white paper details an approach that automatically collects storage data across all devices regardless of platform or physical location – providing visibility into storage processes, capacity and usage necessary to enable an effective chargeback strategy while aligning storage use and costs to individual business units. 
(WHITE PAPER) READ ABSTRACT |

Case Study: Fortune 20 Global Financial Company Achieves End-to-End Data Protection by APTARE

June 28, 2013 - (Free Research)
This white paper explores how one organization easily and affordably deployed a backup solution that helps them prevent backup failures through better management and reporting of their data protection processes. 
(CASE STUDY) READ ABSTRACT |

Today's Top Tips for Effective Prevention, Reporting and Resolution of Backup Failures by APTARE

June 28, 2013 - (Free Research)
This short white paper provides insight into tips for effective prevention, reporting and resolution of backup failures. 
(WHITE PAPER) READ ABSTRACT |

Building a Business Case for Centralized Backup Reporting by APTARE

June 28, 2013 - (Free Research)
Check out this short case study to examine how one company implemented a backup software to help streamline backup processes and improve their backup success rate. 
(CASE STUDY) READ ABSTRACT |

Streamline Compliance Reporting to Effectively Meet Requirements by APTARE

June 28, 2013 - (Free Research)
Uncover key compliance requirements you should address in your backup strategy and learn how a central reporting tool can help you streamline compliance reporting, ensure data is protected throughout its entire lifecycle, and produce reports to quickly and accurately demonstrate compliance. 
(WHITE PAPER) READ ABSTRACT |

Taking Your Enterprise Mobile: The Executive Checklist by Citrix

June 24, 2013 - (Free Research)
Read on to find an executive checklist that will help you ensure that you are ready to handle both enterprise mobility and bring-your-own-device programs. 
(WHITE PAPER) READ ABSTRACT |

SIEM: Utilizing Big Data Security Analytics by LogRhythm, Inc.

December 31, 2012 - (Free Research)
This report reviews an analysis tool that can help simplify logging and event management, allowing you to more easily separate problems and key events from normal background activity – even in the face of Big Data. Read on now to learn more. 
(WHITE PAPER) READ ABSTRACT |

Performance Analysis: Unified Backup: Virtual & Physical by Dell Software

July 02, 2012 - (Free Research)
This informative paper explores two backup and recovery solutions built for physical and virtual environments. Discover what each of them has to offer, how they stack up against each other and find out which one triumphs over the other. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

The New Era of Big Data Security Analytics by SearchSecurity.com

October 10, 2013 - (Free Research)
This expert guide examines the reasons why Big Data security is so important, providing helpful tips for adapting and utilizing it to your business' advantage. 
(EGUIDE) READ ABSTRACT |

Automation Suite for NERC CIP Compliance by LogRhythm, Inc.

March 29, 2013 - (Free Research)
Uncover how a particular NERC CIP compliance suite provides the tools and out-of-the-box assistance you need to address numerous NERC CIP requirements, including Electronic Security Perimeter, Incident Reporting and Planning, Vulnerability Detection, and many more. 
(WHITE PAPER) READ ABSTRACT |

Simplifying your Compliance Strategy by LogRhythm, Inc.

October 31, 2012 - (Free Research)
Explore the ins and outs of the Gramm-Leach-Bliley Act (GLBA) and how it protects customer records and information. In addition, explore the consequences of non-compliance and learn how a particular log management solution can help you ease the compliance and reporting process. 
(WHITE PAPER) READ ABSTRACT |

CARA Meets PCI Requirements and Gains Network Visibility: A Case Study by LogRhythm, Inc.

May 31, 2013 - (Free Research)
This case study reveals which solution CARA, a network of 700+ restaurants across Canada, put in place to simplify their PCI compliance and audit processes and improve their security posture. View now to learn more! 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 500 | Next Page

> Explore alternative searches for: Enterprise Data Protection and Privacy

We are always striving to improve our customer experience. Please notify us if there is a company missing that you feel should be in our directory.


Advertisement

Search FindTech

Search the
Technology Services Directory

  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts