ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Security Research

  • WAN Acceleration and Optimization: Frequently Asked Questions

    Sponsored by: Riverbed Technology, Inc.

    In this podcast, Jeff Boles, Senior Analyst with the Taneja Group, outlines the significance of WAN optimization in the disaster recovery (DR) space.

  • Exchange Insider E-Zine Volume 1: The Importance of Lifecycle Planning for Email Archives

    Sponsored by: TechTarget Search Windows Server

    In this premier issue of Exchange Insider, you'll learn the importance of properly archiving email messages in your Exchange environment, learn how implementing SSL concepts is required for proper Exchange infrastructure management, and what the requirements are to securely migrate to Exchange Server 2007 from previous, legacy versions.

  • Great Things Happen on the Road to Disaster Recovery

    Sponsored by: AppAssure Software, Inc.

    In the event of a disaster, Raycom needed to be able to minimize downtime and recover their systems quickly. Read this case study and discover how Replay AppImage can restore Exchange data and provide reliable backup.

  • Presentation Transcript: Learn How to End Email Downtime, Forever!

    Sponsored by: Teneros and HP

    Email is the foundation of business communication, so outages can have a dramatic impact on productivity. This webcast transcript showcases a technique to prevent email downtime that's non-invasive, remotely managed 24x7, and eliminates the danger of database corruption.

  • e-Guide: Windows Server Disaster Recovery - Planning for the Worst

    Sponsored by: AppAssure Software, Inc.

    The impact of natural, random and man-made disasters on Windows Server applications, especially email, and their subsequent disruption can cripple an organization. This white paper offers advice for protecting your existing Windows Server infrastructure from disruptive application outages.

  • Information Security Magazine - February 2009: BUDGET SQUEEZE - How to Maintain Security during a Recession

    Sponsored by: Information Security Magazine

    Check out this eBook and get expert advice that can help your company successfully improve its threat management posture.

  • Strengthening Enterprise Security through Notebook Encryption

    Sponsored by: Intel Corporation

    Implementing notebook computer encryption is significantly less costly than the potential expense of one data breach. Read this paper to learn why Intel recommends adopting notebook encryption and how to implement it in a cost-effective manner.

  • New Security Solutions Using Intel vPro Technology

    Sponsored by: Intel Corporation

    Intel IT security specialists have identified significant new enterprise security use cases that we can implement using Intel vPro technology. We focused on three high-priority, high-value categories and successfully performed lab tests to validate each use case.

  • Presentation Transcript: Managing Windows with IT Search

    Sponsored by: Splunk

    Read this presentation transcript of the “Managing Windows with IT Search” podcast with Windows Specialist and Director of Product Management at Splunk, Johnathon Cervelli, to learn how IT Search can help you dramatically simplify Windows Systems Management.

  • Symantec Internet Security Threat Report

    Sponsored by: Symantec Corporation

    The Symantec Internet Security Threat Report provides a six-month update of Internet threat activity. It includes analysis of network-based attacks, a review of vulnerabilities, and highlights of malicious code. It also assesses trends in phishing and spam activity. This summary of the report will alert readers to trends and impending threats.

  • Why Use Cisco Network Storage Systems for Your Business

    Sponsored by: Cisco Systems, Inc.

    This white paper highlights two new additions to the Cisco Small Business Network Storage System (NSS) line of products. The Cisco NSS2000 Series is a 2-bay network attached storage (NAS) system, and the Cisco NSS3000 Series is a 4-bay system.

  • Cisco Continuous Data Protection for Files

    Sponsored by: Cisco Systems, Inc.

    Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software.

  • Laws, regulations and compliance: Top tips for keeping your data under your Control

    Sponsored by: Sophos UK

    The challenges of complying with government, industry and internal regulations designed to protect data is becoming harder and more expensive to manage. This paper outlines the rules, looks at the main threats to security compliance and highlights how a well-defined strategy, backed up by powerful technology can provide the solution.

  • Profiting from PCI Compliance

    Sponsored by: IBM

    This paper explores the efficiency gains of building a strategy designed around PCI compliance and discusses the value of obtaining outside support in your compliance efforts; it also examines potential vendor qualifications.

  • The CIO's Guide to Mobile Security

    Sponsored by: BlackBerry

    Learn about the challenges associated with increased worker mobility and how to create an effective enterprise wireless security strategy with some suggestions for an enterprise wireless security policy.

  • Security Appliances: New Strides in Preventing Intrusions

    Sponsored by: IBM

    According to the most recent FBI/CSI survey on computer crime, hackers were responsible for over $23 billion in losses in 2006. But security appliances, which incorporate an array of security functions, now give SMBs the ability to ward off security breaches without breaking the bank or hiring more IT staff.

  • IBM Security Event and Log Management Service

    Sponsored by: IBM

    With Security Event and Log Management Service, you can assemble the collective mindshare of your organization's network applications and operating systems along with disparate security technologies into one platform. You can archive, analyze, correlate and trend security and network events, while managing response and remediation workflow.

  • IBM Introduces New Solutions to Strengthen the Security of Midsize Companies

    Sponsored by: IBM

    Check out this press release to learn about new IBM software that helps midsize companies detect vulnerabilities that can lead to costly security breaches, improve organizational productivity and secure data while maintaining compliance with mandatory business regulations.

  • Support PCI Security Compliance with Enhanced Solutions from IBM

    Sponsored by: IBM

    This white paper briefly describes PCI requirements, the benefits of compliance and the penalties for noncompliance.

  • Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses

    Sponsored by: Cisco Systems, Inc.

    Spam email continues to be a big problem, even for small businesses. LUNAR, a product development consulting firm, had a major spam problem despite having just 50 employees. They found relief with Cisco's Spam and Virus Blocker. This case study details how LUNAR and other small businesses implemented and then benefited from this Cisco software.

  • Managing the Entire Database Security & Compliance Lifecycle

    Sponsored by: Guardium, an IBM Company

    Increased difficulty in protecting data has heightened the need for organizations to simplify compliance and reduce costs by replacing manual, resource-intensive audit processes with automated controls for all their enterprise applications. Read this data sheet to learn how Guardium 7 addresses the entire database security and compliance lifecycle.

  • Presentation Transcript: Data Masking Essentials for SAP Software

    Sponsored by: IBM

    In this paper Sandeep S. Desai and Cynthia Babb explain about the IBM and Enterprise data management, how to protect privacy, what's at stake and data privacy in a sap environment.

  • Virtualize Servers with Microsoft Hyper-V and NetApp

    Sponsored by: NetApp and Microsoft

    Microsoft's Hyper-V technology provides a full-featured server virtualization environment that is well suited for Windows and non-Windows environments. This article will help you understand Hyper-V with some guidelines for getting started using the technology in NetApp environments.

  • Case Study: Transitioning to Server Virtualization with Hyper-V and NetApp

    Sponsored by: NetApp and Microsoft

    Learn how one IT team transitioned to server virtualization with Microsoft® Hyper-V™ coupled with NetApp storage to enable a variety of flexible disaster recovery and availability scenarios.

  • IT Briefing - Desktop and Application Virtualization: Getting Started

    Sponsored by: Citrix

    In this document Barb Goldworm, President, Founder and Chief Analyst of Focus, explains the benefits for desktop and application virtualization.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.