• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

server protection

Results 1 - 25 of 111Sort Results By: Published Date | Title | Company Name
By: GreenSQL     Published Date: Nov 11, 2014
This report provides the 10 essential SQL server security tasks
Tags : 
sql server, insider breach, insider threat, firewalls, compliance, pci compliance, sql server best practices, data protection, database security
    
GreenSQL
By: Lumension     Published Date: Nov 18, 2010
No longer is it simply OK to focus on Microsoft products - organizations must extend their protection to all of their third-party extensions.
Tags : 
lumension, endpoint, risk management, server operating system, third-party application, protection, anti virus, malware, configuration management, anti spam, anti spyware, application security, windows server, data protection
    
Lumension
By: Commvault     Published Date: Jul 06, 2016
It’s no secret that today’s unprecedented data growth, data center consolidation and server virtualization are wreaking havoc with conventional approaches to backup and recovery. Here are five strategies for modern data protection that will not only help solve your current data management challenges but also ensure that you’re poised to meet future demands.
Tags : 
commvault, data growth, datacenter consolidation, server virtualization, backup, recovery, data management, scalability, it management, backup and recovery, best practices
    
Commvault
By: Akamai Technologies     Published Date: Aug 17, 2017
The cloud is a network of servers housing data, software, and services. Cloud services are commonly accessed via the Internet, instead of locally in a data center. Businesses are increasingly relying on the cloud for cybersecurity for two key reasons: 1. Due to a changing threat landscape, there’s a need for more scale, accuracy, experience, and collective intelligence. These resources are out of reach internally for most organizations. 2. There are fundamental limits with on-premises hardware mitigation appliances and enterprise data centers for Distributed Denial of Service (DDoS) and web attack protection.
Tags : 
cloud security, scale, data center, ddos
    
Akamai Technologies
By: Druva     Published Date: Sep 27, 2017
Virtualization tools are providing storage pros with the ability to overcome the limitations of physical servers and gain more flexibility. While hypervisors are allowing them to leap over these boundaries, they’re simultaneously crumbling traditional data protection walls. It’s time to rethink how we handle backup. Inside, discover 8 essential real-world practices to put in place for hypervisor backup, archiving, and disaster recovery.
Tags : 
vmware, virtualization, hypervisors, data protection, archiving, disaster recovery
    
Druva
By: Infoblox     Published Date: Sep 09, 2014
Stories about devastating cyberattacks are plaguing the news. Why? The DNS protocol is easy to exploit. See your network the way hackers do—as an easy target. Learn how you can effectively secure your DNS infrastructure today.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
By: Varonis     Published Date: Nov 12, 2013
Odds are fairly high that there is sensitive data on your corporate network that is overexposed and itching to escape. But will it ?Forrester thinks so – in a recent survey, 22% of security decision makers reported a data breach in the past twelve months, and at an average cost of $7.2 million per breach, it’s no shock that organizations are constantly working to strengthen their defenses.
Tags : 
varonis, data protection, context awareness, inevitable breach, sensitive data, corporate network, security decision-makers, data breach, it professionals, security professionals, leaked critical data, endpoint protections, network protections, server protections, dlp solutions, metadata, it management
    
Varonis
By: Symantec     Published Date: May 02, 2014
Learn more about Symantec’s unique solution to IT environments looking to take full advantage of virtualization.
Tags : 
symantec, virtual machine backup, backup safety, backup and recovery, server management, data protection, loss data, virtual environment, virtualization, business intelligence, business management
    
Symantec
By: HP     Published Date: Aug 26, 2014
Eliminate the guesswork from selecting products and services for your evolving network access and business protection needs. HP Just Right IT portfolio solutions help avoid business interruptions by ensuring reliable access to your data. HP servers and storage solutions help consolidate islands of business information while delivering cost savings, reliability, and agility. HP offers the industry’s most comprehensive data protection and retention portfolio for midsize businesses like yours. And through its cloud-based support portal, HP Technology Services can proactively identify and fix them remotely to keep your business running smoothly. Discover how
Tags : 
data, business, technology, portfolio, cloud-based, support, portal, solution, consolidate, islands, access, reliable, retention, protection, guesswork, agility, cost-saving, quality of service, servers, productivity
    
HP
By: Acronis     Published Date: Feb 09, 2012
Built specifically for VMware vSphereT, Acronis® vmProtectT 6 provides all the features you need in an extremely easy-to-use solution that can be deployed in minutes so you can start to perform your backup and recovery tasks.
Tags : 
virtualization, virtualization software, disaster recovery, backup virtual machines, vmware backup, p2v, vmware data recovery, backup virtual server, virtualization backup, virtual backup, server migration, migrate from physical to virtual, v2v, migrate from virtual to virtual, acronis, veeam, vmprotect, acronis vmprotect, vm protection
    
Acronis
By: Tripwire     Published Date: Mar 31, 2009
Learn the basics about security benchmarks, and specifically how the security benchmarks developed by the Center for Internet Security (CIS) can help you with your compliance initiatives.
Tags : 
center for internet security, cis, tripwire, compliance, internet security, cis-certified, framework, regulation, security investment, risk, risk management, it security, cis benchmark, e-commerce security, gramm-leach-bliley act (glba), sarbanes-oxley act (sox), health insurance portability, accountability act (hipaa), windows server, sysadmin
    
Tripwire
By: Symantec     Published Date: Jul 29, 2013
Backup and recovery has never been a higher priority for IT organizations than it is right now. But when it comes to Virtual Machine (VM) backup and recovery, the landscape has never been more confusing. Download this white paper and learn about the advantages of backup agents, agentless backup and agent-assisted backup so that you can decide for yourself and truly determine the best approach for your organization. We help you weigh in the pros and cons of each method.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, security, it management, knowledge management
    
Symantec
By: ElcomSoft     Published Date: Dec 06, 2007
In order to protect important data, we use a large variety of methods and technologies, especially when the data in question is confidential and essential for day-to-day operations of a business and for making important management decisions. "If you have the information, you own the world" has become the basic tenet of our times, where control over data is of the utmost significance. The loss of access to important data can have a very negative impact on the company’s business.
Tags : 
password, password management, access control, server access, network management, windows, windows management, user access, data protection, elcomsoft
    
ElcomSoft
By: Arcserve     Published Date: Feb 26, 2015
In typical organizations, most data resides outside the data center, so it is important that the protection of desktop and laptop computers is given the same priority as file servers and application servers. Have you deployed the right data protection strategy for endpoints? We’re here to help! Arcserve UDP offers a FREE Workstation edition product that specifically focuses on backing up data on endpoints. Not only can desktops and laptops be protected for FREE with award-winning technology that minimizes bandwidth and storage requirements, but they can participate in the global deduplication schema offered by UDP (for 30 days), and have their data protected in public and private clouds, and more! This is too good to pass up! Get your FREE Arcserve UDP Workstation edition now.
Tags : 
arcserve, unified data protection, software download, bandwidth, deduplication, it management, knowledge management, enterprise applications
    
Arcserve
By: Infoblox     Published Date: Nov 07, 2013
According to the Ponemon Institute, the annual cost of malware breaches averaged $8.4 million. Read this white paper to gain insights into critical information to safeguard against DNS security threats and disrupt malware communications to your DNS servers.
Tags : 
infoblox_dns_firewall, infoblox_dns, infoblox_dns_server, infoblox_security, infoblox_dns_security, infoblox_security_device_controller, infoblox_dhcp_fingerprinting, infoblox_sdc, infoblox_dnssec, infoblox_dns_security_extension, infoblox_ddos, infoblox_denial_of_service, infoblox_distributed_denial_of_service, dns_security, dns_server, dns_firewall, apt, advanced_persistent_threat, malware, malicious_software
    
Infoblox
By: Symantec     Published Date: Jul 30, 2013
In this whitepaper we will discuss what to look for in a virtualization protection solution as well as consider the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. Download for more information.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, networking, security, storage
    
Symantec
By: Astaro     Published Date: Aug 10, 2009
The complete absence of a spam filter at Kauffman Tire, a wholesale and retail distributer of tires, was inhibiting employee productivity.
Tags : 
astaro, spam, spam filters, security gateways, vpm, remote workers, proxy server, vpn, 320, gateway, protection, content filtering, kauffman, protection, security, anti spam, internet security, security management
    
Astaro
By: Webroot UK     Published Date: Aug 07, 2013
Whether you are using virtual desktops or virtual servers it's essential that you consider protecting them from malware. Unfortunately, until now, that protection has often meant making some serious compromises.
Tags : 
virtualization, security, virtual desktop, virtual servers, protection
    
Webroot UK
By: Acronis     Published Date: Dec 28, 2011
According to a 2010 ESG survey, 73% of midmarket companies face "significant revenue loss or other adverse business impact" within three hours of experience downtime. Read this article to find out why you need the automated disaster recovery plan that's built in to Acronis Backup & Recovery® 11!
Tags : 
automated disaster recovery, server backup, server disaster recovery, server data protection, windows server backup, vmware disaster recovery, hyper-v disaster recovery, server backup, backup vmware, backup hyper-v, acronis, acronis backup & recovery, image-based backup, backup virtual machine, backup and recovery, storage area networks, storage management
    
Acronis
By: VMware     Published Date: Oct 08, 2010
This white paper covers the benefits of virtualization, including reduced costs, simplified management, and improved application availability and disaster protection.
Tags : 
wmware, server virtualization, workload consolidation, simplified management, disaster protection, spending, data backup, recovery, data growth, backup and recovery, storage virtualization, disaster recovery, it spending, database development, data integration
    
VMware
By: Cisco     Published Date: Sep 21, 2017
At the network edge, where your apps meet the road and where new IoT devices will drive fundamental business change, consistent connectivity and strong networks keep users for good, improve device performance and drive the insights needed to stay competitive. Today’s security leaders are tasked with protecting an attack surface that has never been more diverse or more complex Download this eBook to find the elements of complexity we have to deal with today.
Tags : 
security solutions, ransomware, security technologies, protection technologies, risk assessment, it security, server protection
    
Cisco
By: IBM     Published Date: Apr 20, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
By: IBM     Published Date: Apr 24, 2017
The perimeter continues to dissolve, and the definition of endpoint is evolving, according to results of the SANS 2016 Endpoint Security Survey, now in its third year. As we might expect, 90% or more consider desktops, servers, routers, firewalls and printers to be endpoints that need to be protected. After that, respondents include other less-typical devices in their definition of endpoints that warrant protection: 71% include building security (access/ surveillance), 59% include employee-owned mobile devices and 40% consider industrial control systems as endpoints that need to be protected. Some respondents also consider POS devices, smart cars, emulated endpoints in the cloud and wearables as endpoints needing protection, highlighting the diversity of thinking among respondents.
Tags : 
device management, data solutions, system solutions, data breach, mobile management
    
IBM
By: Cohesity     Published Date: May 04, 2018
Cohesity provides the only hyper-converged platform that eliminates the complexity of traditional data protection solutions by unifying your end-to-end data protection infrastructure – including target storage, backup, replication, disaster recovery, and cloud tiering. Cohesity DataPlatform provides scale-out, globally deduped, highly available storage to consolidate all your secondary data, including backups, files, and test / dev copies. Cohesity also provides Cohesity DataProtect, a complete backup and recovery solution fully converged with Cohesity DataPlatform. It simplifies backup infrastructure and eliminates the need to run separate backup software, proxies, media servers, and replication. This paper specifically focuses on the business and technical benefits of Cohesity DataPlatform for the data protection use case. It is intended for IT professionals interested in learning more about Cohesity’s technology differentiation and advantages it offers for data protection - (i) Elim
Tags : 
    
Cohesity
Start   Previous   1 2 3 4 5    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter