Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

endpoint data

Results 51 - 75 of 109Sort Results By: Published Date | Title | Company Name
Published By: Code42     Published Date: Apr 22, 2016
The study’s findings highlight discrepancies—between IT departments and end users—in the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.
Tags : 
datastrophe study, code 42, data protection, data backups
    
Code42
Published By: Code42     Published Date: Apr 22, 2016
Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.
Tags : 
endpoint backups, data visability, code 42, data loss, data recovery
    
Code42
Published By: Code42     Published Date: Apr 22, 2016
Read this whitepaper to find out strategic solutions to your data protection issues.
Tags : 
data protection, data control, code 42, data visibility
    
Code42
Published By: IBM     Published Date: Apr 06, 2016
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, data security, risk management, big data, security
    
IBM
Published By: IBM     Published Date: Apr 04, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, ibm bigfix, ibm security qradar, risk management, endpoint intelligence, security, enterprise applications
    
IBM
Published By: Druva     Published Date: Mar 30, 2016
How To Leverage Endpoint Data Protection To Ease OS Migrations
Tags : 
druva, windows 10 migration, endpoint data protection, user training
    
Druva
Published By: Dell     Published Date: Feb 04, 2016
Security risks have grown roughly in proportion to the meteoric growth in employee-owned mobile devices within the workplace. Meanwhile cyber-attacks are growing in sophistication and severity. According to data from a new IDG Research survey, these dynamics have IT decision makers scrambling to tighten and revise BYOD policies while addressing the holistic issue of endpoint security. Download this two-page paper detailing the IDG Research results and for expert advice on securing your organization’s data in an increasingly mobile world.
Tags : 
security risks, byod, cyber attacks, byod policies
    
Dell
Published By: Code42     Published Date: Jan 13, 2016
BACKUP ISN’T JUST A COPY IN THE CLOUD. IT’S THE ANTIDOTE TO EVERYTHING. Be it user error, natural disaster, hardware failure, malware, theft or litigation—there’s a countermeasure to restore your business to normal. Skeptical? Click through the eBook to ?nd out how backup makes the enterprise impervious.
Tags : 
code42, endpoint backup, cloud storage, data migration, data storage solutions, e-discovery, security, it management, enterprise applications
    
Code42
Published By: Code42     Published Date: Jan 13, 2016
Today’s organizations face a ballooning data management and risk problem. The use of laptops, tablets, workstations, servers and smartphones in the enterprise to create and store critical data is growing at an alarming rate. Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn’t provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Whether migrating to a new version or brand new hardware on the client or server—organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data. Continuous, real-time data backup is the only viable solution for protecting all enterprise data while providing for a seamless migration process. But how do you achieve it?
Tags : 
code42, best practices, platform-specific data, endpoint backup, data migration, real-time data backup, data solutions, security, it management, enterprise applications
    
Code42
Published By: Code42     Published Date: Jan 13, 2016
Read this white paper to learn how the common approaches to e-Discovery miss the mark and how endpoint backup can streamline the collection and preservation of electronically stored information.
Tags : 
code42, e-discovery, endpoint backup, e-discovery methods, data collection, compliance requirements, security, it management, enterprise applications
    
Code42
Published By: IBM     Published Date: Jan 07, 2016
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, threat, endpoint, security, intelligence, qradar
    
IBM
Published By: Druva     Published Date: Jan 04, 2016
Endpoint backup has gone beyond simple backup/restore to a broader end-user data protection solution reducing various risks and increasing user productivity. This research helps I&O leaders evaluate enterprise endpoint backup solutions in two scenarios: cloud deployment and on-premises deployment.
Tags : 
enterprise, endpoints, backup, vendor comparison, cloud, on premise
    
Druva
Published By: Intel Security     Published Date: Oct 21, 2015
Encryption solutions are a key component of data protection and are part of Intel Security protection suites.
Tags : 
mcafee, intel, data, security, protection, networking
    
Intel Security
Published By: Intel Security     Published Date: Oct 20, 2015
Modern hybrid data centers, which embrace physical, virtual, and cloud servers, require a new security mindset. The biggest challenges faced by IT in this type of environment is workload discovery, comprehensive security with minimal performance impact, and management. This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : 
data center security, datacenter security, server security, endpoint security, virtual system security, data center virtualization, datacenter virtualization, virtual data center, virtual datacenter, security, data center
    
Intel Security
Published By: MuleSoft     Published Date: Oct 13, 2015
Learn the recommendations to meet the following challenges: Financial services firms are deploying private clouds and PaaS to improve IT manageability and to empower developers, but still need to manage and monitor legacy environments and third party applications Many firms are adopting PaaS to manage microservices and break down legacy applications into discrete components, resulting in many more endpoints to make discoverable, secure, connect, manage and monitor Applications and container technologies deployed on the PaaS may lack the ability to generate “machine data”--detailed information on memory utilization, system resources, endpoint analysis and other critical monitoring statistics
Tags : 
financial services paas, private clouds, disparate environments, memory utilization, it manageability, enterprise applications
    
MuleSoft
Published By: IBM     Published Date: Oct 02, 2015
IBM BigFix and IBM Security QRadar solutions empower IT teams to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
ibm, bigfix, security qradar, security, endpoint intelligence, data security
    
IBM
Published By: IBM     Published Date: Sep 30, 2015
Automate and strengthen security and endpoint management to better protect data and meet HIPAA and meaningful use requirements
Tags : 
    
IBM
Published By: IBM     Published Date: Jul 15, 2015
This whitepaper talks about how to view up-to-the-minute endpoint intelligence within the context of other vulnerability data, prioritize vulnerabilities for remediation and quickly take corrective action to help minimize risks.
Tags : 
security intelligence, endpoint management, ibm security, proactive risk management, vulnerability data, security management, risk management
    
IBM
Published By: CommVault     Published Date: Jun 10, 2015
For optimum protection while enhancing user productivity, consider the following features in this buyers guide.
Tags : 
protection, backup, productivity, flexibility, network management, infrastructure, network performance management
    
CommVault
Published By: IBM     Published Date: Apr 09, 2015
The information explosion, the proliferation of endpoint devices, growing user volumes and new computing models like cloud, social business and big data have created new vulnerabilities. Data security is a moving target—as data grows, more sophisticated threats emerge; the number of regulations increase; and changing economic times make it difficult to secure and protect data. Because data is a critical component of daily business operations, it is essential to ensure privacy and protect data no matter where it resides. Different types of information have different protection requirements; therefore, organizations must take a holistic and systematic approach to safeguarding information.
Tags : 
ibm, cloud, social business, big data, data security, data protection, privacy, security, it management
    
IBM
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
Endpoint security is at a critical juncture. Increasingly, employees at organizations of all sizes are using a wider variety than ever of desktop and mobile devices, including smartphones, tablets and laptops, as they work from broadly dispersed locations, including home offices. Often, organizations are permitting and even encouraging employees to use their own devices under BYOD (bring your own device) policies. With these devices, employees are accessing not only corporate data and applications, but also social media, banking and shopping sites. Download this white paper to learn more about endpoint security.
Tags : 
endpoint security, desktop devices, mobile devices, byod, corporate data, technology, networking, security, it management, wireless
    
CDW-Trend Micro
Published By: CDW-Trend Micro     Published Date: Mar 26, 2015
In today’s ‘always on, always connected’ world where sensitive data is almost certain to be stored electronically, organizations can no longer afford to operate without some form of Endpoint Protection. The costs related to network downtime or stolen data resulting from malicious attacks significantly outweighs that of maintaining an up to date solution. Although the unified nature of Endpoint Protection has made extensive security functionality easier to manage, selecting the right products can be a difficult task. This whitepaper aims to explain how the core functionality of Enterprise Protection suites have developed, what to look for in a solution, and which technologies will need to be considered in the future. In today’s business environment, it is no longer a question of whether to invest in Endpoint Protection, but a question of which solution is right for your organization.
Tags : 
endpoint security, data security, endpoint protection, enterprise protection, technology, networking, security, it management
    
CDW-Trend Micro
Published By: Arcserve     Published Date: Feb 26, 2015
In typical organizations, most data resides outside the data center, so it is important that the protection of desktop and laptop computers is given the same priority as file servers and application servers. Have you deployed the right data protection strategy for endpoints? We’re here to help! Arcserve UDP offers a FREE Workstation edition product that specifically focuses on backing up data on endpoints. Not only can desktops and laptops be protected for FREE with award-winning technology that minimizes bandwidth and storage requirements, but they can participate in the global deduplication schema offered by UDP (for 30 days), and have their data protected in public and private clouds, and more! This is too good to pass up! Get your FREE Arcserve UDP Workstation edition now.
Tags : 
arcserve, unified data protection, software download, bandwidth, deduplication, it management, enterprise applications
    
Arcserve
Published By: Dell     Published Date: Jan 26, 2015
Forrester presents the relevant endpoint security data from their most recent surveys, with special attention given to those trends affecting SMBs (firms with 20 to 999 employees) and enterprises (firms with 1,000+ employees), along with analysis that explains the data in the context of the overall security landscape. As organizations prepare for the 2015 budget cycle, security and risk (S&R) professionals should use this annual report to help benchmark their organization’s spending patterns against those of their peers — while keeping an eye on current trends affecting endpoint security — in order to strategize their endpoint security adoption decisions. Please download this Forrester Research report, offered compliments of Dell, for more information.
Tags : 
dell, windows, endpoint security adoption, forrester, smbs, budget cycle, security
    
Dell
Start   Previous    1 2 3 4 5    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.