Data Security Research
-
WAN Acceleration and Optimization: Frequently Asked Questions
Sponsored by: Riverbed Technology, Inc.In this podcast, Jeff Boles, Senior Analyst with the Taneja Group, outlines the significance of WAN optimization in the disaster recovery (DR) space.
-
Exchange Insider E-Zine Volume 1: The Importance of Lifecycle Planning for Email Archives
Sponsored by: TechTarget Search Windows ServerIn this premier issue of Exchange Insider, you'll learn the importance of properly archiving email messages in your Exchange environment, learn how implementing SSL concepts is required for proper Exchange infrastructure management, and what the requirements are to securely migrate to Exchange Server 2007 from previous, legacy versions.
-
Great Things Happen on the Road to Disaster Recovery
Sponsored by: AppAssure Software, Inc.In the event of a disaster, Raycom needed to be able to minimize downtime and recover their systems quickly. Read this case study and discover how Replay AppImage can restore Exchange data and provide reliable backup.
-
Presentation Transcript: Learn How to End Email Downtime, Forever!
Sponsored by: Teneros and HPEmail is the foundation of business communication, so outages can have a dramatic impact on productivity. This webcast transcript showcases a technique to prevent email downtime that's non-invasive, remotely managed 24x7, and eliminates the danger of database corruption.
-
e-Guide: Windows Server Disaster Recovery - Planning for the Worst
Sponsored by: AppAssure Software, Inc.The impact of natural, random and man-made disasters on Windows Server applications, especially email, and their subsequent disruption can cripple an organization. This white paper offers advice for protecting your existing Windows Server infrastructure from disruptive application outages.
-
Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession
Sponsored by: Information Security MagazineCheck out this eBook and get expert advice that can help your company successfully improve its threat management posture.
-
Strengthening Enterprise Security through Notebook Encryption
Sponsored by: Intel CorporationImplementing notebook computer encryption is significantly less costly than the potential expense of one data breach. Read this paper to learn why Intel recommends adopting notebook encryption and how to implement it in a cost-effective manner.
-
New Security Solutions Using Intel vPro Technology
Sponsored by: Intel CorporationIntel IT security specialists have identified significant new enterprise security use cases that we can implement using Intel vPro technology. We focused on three high-priority, high-value categories and successfully performed lab tests to validate each use case.
-
Presentation Transcript: Managing Windows with IT Search
Sponsored by: SplunkRead this presentation transcript of the “Managing Windows with IT Search” podcast with Windows Specialist and Director of Product Management at Splunk, Johnathon Cervelli, to learn how IT Search can help you dramatically simplify Windows Systems Management.
-
Symantec Internet Security Threat Report
Sponsored by: Symantec CorporationThe Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.
-
Why Use Cisco Network Storage Systems for Your Business
Sponsored by: Cisco Systems, Inc.This white paper highlights two new additions to the Cisco Small Business Network Storage System (NSS) line of products. The Cisco NSS2000 Series is a 2-bay network attached storage (NAS) system, and the Cisco NSS3000 Series is a 4-bay system.
-
Cisco Continuous Data Protection for Files
Sponsored by: Cisco Systems, Inc.Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software.
-
Laws, regulations and compliance: Top tips for keeping your data under your Control
Sponsored by: Sophos UKThe challenges of complying with government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.
-
Profiting from PCI Compliance
Sponsored by: IBMThis paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications.
-
The CIO's Guide to Mobile Security
Sponsored by: BlackBerryLearn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.
-
Security Appliances: New Strides in Preventing Intrusions
Sponsored by: IBMAccording to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.
-
IBM Security Event and Log Management Service
Sponsored by: IBMWith Security Event and Log Management Service, you can assemble the collective mindshare of your organization's network applications and operating systems along with disparate security technologies into one platform. You can archive, analyze, correlate and trend security and network events, while managing response and remediation workflow.
-
IBM Introduces New Solutions to Strengthen the Security of Midsize Companies
Sponsored by: IBMCheck out this press release to learn about new IBM software that helps midsize companies detect vulnerabilities that can lead to costly security breaches, improve organizational productivity and secure data while maintaining compliance with mandatory business regulations.
-
Support PCI Security Compliance with Enhanced Solutions from IBM
Sponsored by: IBMThis white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance.
-
Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses
Sponsored by: Cisco Systems, Inc.Spam email continues to be a big problem, even for small businesses. LUNAR, a product development consulting firm, had a major spam problem despite having just 50 employees. They found relief with Cisco's Spam and Virus Blocker. This case study details how LUNAR and other small businesses implemented and then benefited from this Cisco software.
-
Managing the Entire Database Security & Compliance Lifecycle
Sponsored by: Guardium, an IBM CompanyIncreased difficulty in protecting data has heightened the need for organizations to simplify compliance and reduce costs by replacing manual, resource-intensive audit processes with automated controls for all their enterprise applications. Read this data sheet to learn how Guardium 7 addresses the entire database security and compliance lifecycle.
-
Presentation Transcript: Data Masking Essentials for SAP Software
Sponsored by: IBMIn this paper Sandeep S. Desai and Cynthia Babb explain about the IBM and Enterprise data management, how to protect privacy, what's at stake and data privacy in a sap environment.
-
Virtualize Servers with Microsoft Hyper-V and NetApp
Sponsored by: NetApp and MicrosoftMicrosoft's Hyper-V technology provides a full-featured server virtualization environment that is well suited for Windows and non-Windows environments. This article will help you understand Hyper-V with some guidelines for getting started using the technology in NetApp environments.
-
Case Study: Transitioning to Server Virtualization with Hyper-V and NetApp
Sponsored by: NetApp and MicrosoftLearn how one IT team transitioned to server virtualization with Microsoft® Hyper-V™ coupled with NetApp storage to enable a variety of flexible disaster recovery and availability scenarios.
-
IT Briefing - Desktop and Application Virtualization: Getting Started
Sponsored by: CitrixIn this document Barb Goldworm, President, Founder and Chief Analyst of Focus, explains the benefits for desktop and application virtualization.