Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

implications malware

Results 1 - 11 of 11Sort Results By: Published Date | Title | Company Name
Published By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
    
Oracle
Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: Menlo Security     Published Date: Jun 01, 2018
"Uncover the Business Impact of Managing Risky Web Content Download this white paper to learn: How to safely manage ""uncategorized"" websites when sites are unknown to the secure web gateway (SWG) policies, which are largely based on website categories, such as news, entertainment, weather, social media, etc. The cost implications of securing web content, including staffing, clean-up and risk mitigation Isolation - a new technique for malware prevention to maintain end user & IT staff productivity Administrators can either be lenient in allowing access to uncategorized sites, increasing malware risk, or deny access and deprive employees of necessary information. There are hidden costs to both approaches. "
Tags : 
    
Menlo Security
Published By: Symantec     Published Date: Jul 28, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
how malware works, implications of malware, impacts of malware, website security, internet threats, security
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2014
This paper explains how malware works and the implications to clients, customers and the wider community.
Tags : 
malware, implications of malware, protecting from malware
    
Symantec
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.