Site Protecting DataWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Site Protecting Data returned the following results.
RSS What is RSS?
Related Categories

 •   Disaster Recovery
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Backup Systems and Services
 •   Network Security
 •   Storage Management
 •   Disk-based Backup & Storage/ RAID
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)
 •   Endpoint Security
 •   Storage Security

Related Searches
 •   Designers Site Protecting Data
 •   Document Site Protecting
 •   Linux-Based Site
 •   Parts Of Site Protecting
 •   Performance Site Protecting Data
 •   Sheets Site Protecting
 •   Site Lists
 •   Site Process
 •   Site Protecting Oregon
 •   Site Protecting Wyoming
Advertisement

ALL RESULTS
1 - 25 of 474 | Next Page

Featured Sponsors

E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.
Cisco ASA 5500 Series by Cisco Systems, Inc..
The Cisco® ASA 5500 Series Business Edition is an enterprise-strength comprehensive security solution that combines market-leading firewall and optional content security capabilities, more...
>> Discover more offerings from Cisco Systems, Inc..

Choosing the Right Security Solution: Moving Beyond SSL to Establish Trust by VeriSign Australia

August 06, 2010 - (Free Research)
This paper explores new developments in website security that online businesses should be implementing to build confidence in their sites, protect valuable brands and safeguard customers’ sensitive information, not to mention improving their bottom line. 
(WHITE PAPER) READ ABSTRACT |

Building a Backup Strategy for SMBs by Dantz Development Corporation

May 20, 2004 - (Free Research)
The guidelines in this white paper can help SMBs establish a reliable backup strategy that protects data and guarantees quick, easy,and accurate restores. 
(WHITE PAPER)

Enhancing Disk-to-Disk Backup with Data Deduplication by FalconStor Software

February 12, 2009 - (Free Research)
FalconStor's data deduplication solutions address the problem of duplicate data from backups. It slashes media costs, streamlines management tasks, and minimizes the bandwidth required for replication. Data deduplication improves efficiency and saves money, exactly what is needed when IT budgets are tight. 
(WEBCAST) READ ABSTRACT |

Presentation Transcript: Changing the Rules of Backup: Go Beyond Virtual Tape Library for Accelerating Your Backup by FalconStor Software

May 14, 2009 - (Free Research)
FalconStor Software provides solutions that can dramatically improve backup speeds while working with your current backup technology and operations. Management can be streamlined even while performance improves. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

Virtually Effortless Backup for VMware Environments by FalconStor Software

March 09, 2009 - (Free Research)
VMware Consolidated Backup (VCB) improves virtual server backup, but there are a number of limitations. FalconStor Software has a solution that works with VCB while overcoming these limitations. Using this solution, you can quickly and efficiently back up virtual machines and retain transactional consistency, without management complexity. 
(WHITE PAPER) READ ABSTRACT |

Maintaining Trust: Protecting Your Web Site Users from Malware by IBM

November 02, 2009 - (Free Research)
This paper explores the problem of malware and how it is increasingly being delivered through legitimate Web sites. It also introduces new techniques from IBM that are designed to go beyond standard security measures to help organizations proactively defend against threats. 
(WHITE PAPER) READ ABSTRACT |

Centralized Data Management for Remote and Branch Office (Robo) Environments by Dell, Inc.

January 26, 2009 - (Free Research)
Centralizing data for management enables backup systems and devices to be retired from branch environments, along with maintenance contracts and tape rotation services, for immediate dramatic cost savings. 
(WHITE PAPER) READ ABSTRACT |

Cloud backup tutorial: How to leverage cloud backup services (Part 2) by Iron Mountain

July 01, 2009 - (Free Research)
In this section of the tutorial on cloud backup, you will learn how cloud storage is changing data protection and disaster recovery and the differences in the cost of cloud backup vs. traditional backup. 
(EGUIDE) READ ABSTRACT |

HP Storage Solutions Protect and Help Bring Order to Missouri Court Information by Hewlett-Packard Company

January 14, 2009 - (Free Research)
Read how the Missouri court system consolidated database servers from 40 circuit courts onto five HP ProLiant servers, providing numerous benefits including improved flexibility, enhanced disaster recovery, and significantly increased savings. 
(CASE STUDY) READ ABSTRACT |

Online Dating: Keeping Your Members Safe from Online Scams and Predators by iovation, Inc.

June 09, 2009 - (Free Research)
This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all. 
(WHITE PAPER) READ ABSTRACT |

Remote Site Business Continuity with Syncsort XRS by Syncsort

April 2008 - (Free Research)
As companies increasingly migrate to remote areas they face the challenge of how to effectively protect data resources at remote dispersed sites. Read this white paper to learn about a solution that protects data at remote sites with centralized control. 
(WHITE PAPER) READ ABSTRACT |

How to prevent cross-site scripting attacks: Expert tactics by Veracode, Inc.

December 2011 - (Free Research)
This expert E-Guide discusses how XSS attacks work, how you can better protect your websites and how to prevent cross-site request forgery attacks. Uncover best practices and expert tactics to ensure you’re doing your part to stop these attacks. 
(EGUIDE) READ ABSTRACT |

Strategies for Boosting Website Performance by Limelight Networks, Inc.

April 2010 - (Free Research)
Join Limelight Networks VP of Strategic Alliances, Adam Wray, Senior Product Manager, Ken Iversen, and Integration Consultant Lead, Derek Boonstra as they discuss key strategies for cost-effectively boosting site performance without compromising on user experience. 
(WEBCAST) READ ABSTRACT |

Create Fault-Tolerant SQL Server 2008 Installations -- Rely on SQL Server 2008 Features to Protect Data by Dell, Inc. and Intel®

September 2009 - (Free Research)
Read this paper to determine how best to protect your SQL environment when running SQL Server on Dell PowerEdge servers. 
(WHITE PAPER) READ ABSTRACT |

Backup Express and NetApp: Remote Site Business Continuity with Syncsort BEX Advanced Recovery and NetApp FAS Systems by Syncsort

August 2008 - (Free Research)
This paper explains the low cost and high speed of Advanced Technology Attachment (ATA) disks. It explains how they enable near-instant recovery from past points in time, and employ new technologies that maximize the speed of data transfers. 
(WHITE PAPER) READ ABSTRACT |

IBM ISS Global Data Center content analysis technology for the Web and e-mail by IBM

November 2008 - (Free Research)
The IBM content analysis process, part of the IBM ISS Global Data Center, is built on a platform that classifies millions of web pages and e-mails every day. Access this white paper for a detailed look at how this technology will effectively protect users from unwanted content. 
(WHITE PAPER) READ ABSTRACT |

The Shortcut Guide to Assuring Website Performance through External Web Monitoring by Neustar®

October 2010 - (Free Research)
Businesses have become dependent on Web sites and RIAs. As dependency increases, so does the complexity of Web site systems and expectations on service delivery. This book offers a detailed look at external monitoring, how to leverage monitoring to protect your brand and a roadmap for implementing and maintaining an external monitoring process. 
(EBOOK) READ ABSTRACT |

Implementing Best Practices for Web 2.0 Security with the Websense Web Security Gateway by Websense, Inc.

June 2009 - (Free Research)
The best way to address Web 2.0 threats is to combine the best aspects of traditional security and control techniques with new technology designed to address the dynamic, real-time nature of Web 2.0. This paper describes how one such solution enables you to quickly implement a best practices approach to making Web 2.0 secure and effective. 
(WHITE PAPER) READ ABSTRACT |

Secure Offsite Data Storage: It Keeps You Running by Iron Mountain

October 2012 - (Free Research)
Access this article to learn an approach to ensure the "recovery" part of DR: Secure, off-site data storage. Read on to learn how to get started and find a business continuity checklist along with 8 criteria for reliable off-site storage. 
(TECHNICAL ARTICLE) READ ABSTRACT |

When Legitimate Sites Threaten Your Network by Kaspersky Lab

August 2009 - (Free Research)
Did you know that legitimate sites like BusinessWeek.com and MLB.com have been victimized by drive-by malware? This security brief discusses specific measures you can take to protect your business and defend against these attacks. 
(WHITE PAPER) READ ABSTRACT |

Protecting Microsoft Exchange by Double-Take Software

October 2009 - (Free Research)
Though the technological reasons to protect Exchange systems are obvious, there are quantifiable fiscal reasons to protect it as well. Learn how to protect and recover business critical data and applications relevant to your Exchange system. 
(WHITE PAPER) READ ABSTRACT |

Case Study: SEEK Protects Sites with Web Application Security Firewall by Imperva

March 2013 - (Free Research)
This case study features one organization's experience with a Web application security solution that tackled technical, logic, denial-of-service, and fraud attacks to reduce risk and save its reputation. 
(WEBCAST) READ ABSTRACT |

Web Application Security: Protect Your Critical Web Applications by Imperva

August 2010 - (Free Research)
To combat complex and distributed attacks, organizations need to protect their Web sites from new and emerging threats without affecting application performance or uptime. Read this paper to find out so much more. 
(WHITE PAPER) READ ABSTRACT |

McAfee Total Protection for Secure Business by Insight

March 2010 - (Free Research)
McAfee solutions cover all the critical elements of security medium businesses need: desktop and server protection, data protection, email and web security, and compliance. Total Protection for Secure Business provides comprehensive protection against the most lethal threats and exploits - in one package, from one trusted and proven vendor. 
(WHITE PAPER) READ ABSTRACT |

Twynham School Relies on DocAve® to Protect Valuable SharePoint Data by AvePoint, Inc.

February 2010 - (Free Research)
Southwest England's Twynham Comprehensive School used AvePoint's DocAve Backup and Restore to provide reliable, granular, and full-fidelity backup and recovery capabilities to protect their over 50GB of data and hundreds of sites stored on its MOSS environment. 
(CASE STUDY) READ ABSTRACT |

1 - 25 of 474 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts