Laptop Backup for Remote Workforce
sponsored by Druva
WHITE PAPER:
This whitepaper discusses the key concerns in remote-backup (like bandwidth and network access) and the shortcomings in existing solutions which makes employees avoid backups. Learn more by accessing this paper today.
Posted: 18 Oct 2010 | Published: 18 Oct 2010
|
|
|
Data Deduplication and Druva inSync
sponsored by Druva
WHITE PAPER:
Enterprises are seeking new ways to keep up with the challenges of managing and protecting their rapidly expanding corporate data. While data growth is not new, the pace of growth has become more rapid, the location of data more dispersed, and the linkage between data sets more complex. This hitepaper explains source based deduplication technology.
Posted: 18 Oct 2010 | Published: 18 Oct 2010
|
|
|
Threat Containment for Facebook
sponsored by BlueCoat
WHITE PAPER:
This technical brief discusses multiple Blue Coat solutions to address malicious content control, enforce acceptable use policies, prevent sensitive information leakage and enhance user productivity on Facebook.
Posted: 08 Oct 2010 | Published: 08 Oct 2010
|
|
|
Developing a Data Protection Strategy for Virtual Server Environments
sponsored by i365, makers of Evault
WHITE PAPER:
Virtualization is no longer strictly an enterprise technology; it is increasingly being adopted by IT groups in small and mid-size businesses (SMBs). However, those organizations are quickly learning that virtualization can also increase complexity in certain areas of IT, particularly in data protection. Read this white paper to learn more.
Posted: 29 Sep 2010 | Published: 29 Sep 2010
|
|
|
Cloud Backup and Recovery
sponsored by Vision Solutions
WHITE PAPER:
The right way to evaluate the quality of your system and data protection is to evaluate the Recovery Time Objective (RTO) and Recovery Point Objective (RPO). These metrics define how long you think it will take you to get back online and how current the data has to be. Read this white paper to learn more.
Posted: 28 Sep 2010 | Published: 28 Sep 2010
|
|
|
HP Data Protector software Granular Recovery Extension for SharePoint 2007 FAQ
sponsored by Hewlett Packard Enterprise
WHITE PAPER:
Used by more than 37,000 customers worldwide, HP Data Protector provides automated backup and recovery of physical and virtual servers from disk or tape. Read this paper to learn answers to some of the most frequently asked questions about HP Data Protector software and the Granular Recovery Extension for SharePoint 2007.
Posted: 01 Sep 2010 | Published: 01 Sep 2010
|
|
|
McAfee Total Protection for Secure Business
sponsored by Insight
WHITE PAPER:
Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business.
Posted: 31 Aug 2010 | Published: 31 Aug 2010
|
|
|
Five Network Security Threats and How to Protect Your Business
sponsored by Qwest Communications
WHITE PAPER:
Threats abound in today’s corporate networks. Keeping your enterprise and its assets secure requires a proactive security strategy. Discover the five most costly network security threats and see how you can protect your business with a layered security approach.
Posted: 26 Aug 2010 | Published: 25 Aug 2010
|
|
|
Why Your Organization Needs to Implement DLP
sponsored by Trend Micro, Inc.
WHITE PAPER:
Outbound content sent from any communications tools or stored on laptops and removable storage devices must be monitored and managed in order to minimize risk and to ensure that the content is appropriate and in compliance with an organization’s policies, statutory obligations and industry best practices. Read this paper to learn more.
Posted: 15 Jul 2010 | Published: 15 Jul 2010
|
|
|
Data Protection Solutions at Midsize Organizations
sponsored by Trend Micro, Inc.
WHITE PAPER:
In January of 2008, a random sample of online technical newsletter subscribers at midsize companies (100- 5,000 employees) received an email invitation to participate in a survey about data protection solutions use at their organizations. The goal of the survey was to identify sources of and/or reasons for information security breaches and more.
Posted: 15 Jul 2010 | Published: 01 Feb 2008
|
|
|
Data Protection: Solutions for Privacy, Disclosure and Encryption
sponsored by Trend Micro, Inc.
WHITE PAPER:
Trend Micro data protection solutions address privacy, breach disclosure, and encryption requirements with Email Encryption and Data Loss Prevention solutions. These solutions address common IT compliance challenges with accuracy, usability, and cost-effectiveness. Read this white paper for more details.
Posted: 15 Jul 2010 | Published: 15 Jul 2010
|
|
|
Steps to Discovery and Protection of Sensitive Data: Find IT. Search IT. Mask IT.
sponsored by dataguise, Inc.
WHITE PAPER:
Protecting sensitive data in the enterprise has never been more important, or more challenging. An effective data protection strategy must start with finding all of the data repositories on the network and identifying all of the sensitive data contained in those repositories. Read this paper to learn more.
Posted: 01 Jun 2010 | Published: 01 Jun 2010
|
|
|
Solving Four Primary Security Challenges of Microsoft SharePoint
sponsored by Sophos UK
WHITE PAPER:
This white paper examines SharePoint's benefits and risks and recommends best practices for protecting an organisation's digital assets.
Posted: 25 May 2010 | Published: 01 Nov 2009
|
|
|
Data Loss Prevention for IBM i
sponsored by Innovatum, Inc.
WHITE PAPER:
Open system technology has introduced real threats to data; making loss—whether from theft, malicious manipulation or inadvertent misuse—easier than before. The IBM i has exceptional audit capabilities making it one of the most secure technology platforms. Read this white paper to learn how the IBM i might be a good solution for your organization.
Posted: 16 Apr 2010 | Published: 16 Apr 2010
|
|
|
Beyond FTP: Securing and Managing File Transfers
sponsored by Linoma Software
WHITE PAPER:
Every day, millions of files are exchanged all over the world by corporations, government entities and other organizations. Most file transfers use the popular protocol known as FTP. This paper will examine how FTP has become the standard for business-to-business file transfers and the key pitfalls that face management using this open protocol.
Posted: 15 Mar 2010 | Published: 15 Mar 2010
|
|
|
Three Ways to Prevent Insider Risk Within Your SCCM-Managed Environment
sponsored by Lumension
WHITE PAPER:
Read this white paper to learn how removable device policy enforcement can prevent risks while enabling managed use of necessary productivity tools—seamlessly within your Microsoft® System Center Configuration Manager-managed environment.
Posted: 27 Jan 2010 | Published: 27 Jan 2010
|
|
|
Next Generation Data Protection Solutions
sponsored by EMC Backup and Recovery Solutions
WHITE PAPER:
This paper compares traditional data protection options and provides an overview of the impact data deduplication is having on the storage industry. Deduplication is quickly gaining momentum in the growing disk-to-disk backup market and offers several significant improvements over traditional data protection methods.
Posted: 14 Jan 2010 | Published: 14 Jan 2010
|
|
|
You’re Not As Backed Up As You Think
sponsored by EMC Corporation
WHITE PAPER:
Learn how to overcome the challenges of traditional data backup for your small to mid-size organization and discover the benefits of implementing a Software-As-A-Service (SaaS) backup solution.
Posted: 11 Dec 2009 | Published: 11 Dec 2009
|
|
|
Top-10 Guide for Protecting Sensitive Data from Malicious Insiders
sponsored by Imperva
WHITE PAPER:
For years, organizations have worked diligently to lock down their perimeters only to find out that the most devastating enemy is already inside. Insider threats abound -- both careless mistakes and malicious attacks. This guide will explore the top ten ways to protect sensitive data from the very people that need access to it.
Posted: 12 Nov 2009 | Published: 12 Oct 2009
|
|
|
Data Loss Prevention 2.0: Preventing the loss of confidential information via webmail, Facebook, wikis and blogs
sponsored by Code Green Networks, Inc.
WHITE PAPER:
In today’s technology rich environment organizations are finding employees often post sensitive company information to insecure or public Internet sites using Web 2.0 applications. Code Green Networks TrueDLP provides organizations with a complete data loss prevention solution to stop the loss or theft of confidential or proprietary information.
Posted: 09 Nov 2009 | Published: 09 Nov 2009
|
|
|
Implementing an Effective Data Loss Prevention Solution for Your Network
sponsored by IBM
WHITE PAPER:
Read this paper for a thorough examination of data loss prevention and for a step-by-step guide for implementing an effective DLP solution in your organization.
Posted: 27 Oct 2009 | Published: 25 Jul 2009
|
|
|
Safeguarding Your Data with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER:
The need to protect sensitive data has increased dramatically in the past several years. This can be attributed to a continually-evolving environment in which business requirements have changed and in which new regulatory mandates have come into existence.
Posted: 05 Oct 2009 | Published: 05 Oct 2009
|
|
|
Achieving GLBA Compliance with Red Hat Enterprise Virtualization for Desktops
sponsored by Red Hat and JBoss
WHITE PAPER:
This paper will illustrate how Red Hat Enterprise Virtualization for Desktops can help organizations comply with specific GLBA mandates while increasing overall efficiency and agility.
Posted: 05 Oct 2009 | Published: 05 Oct 2009
|
|
|
Healthcare Data Loss Assessment: Measure sensitive patient data loss on your network
sponsored by Code Green Networks, Inc.
WHITE PAPER:
Loss of patient data is a top concern for any healthcare organization. They handle some of the most sensitive and personal data on the individuals they treat. Patients trust healthcare organizations to safeguard sensitive data. Read this whitepaper to find more about how a data loss prevention (DLP) solution can protect patient data.
Posted: 09 Sep 2009 | Published: 09 Sep 2009
|
|
|
Protecting Healthcare Organizations from Patient Data Loss
sponsored by Code Green Networks, Inc.
WHITE PAPER:
Negative publicity from a data breach can have lasting consequences, undermining patient confidence and damaging an organization's reputation. This paper covers potential data breaches within healthcare organizations and strategies for preventing them. Read on to learn more about the steps you can take to protect patients' sensitive information.
Posted: 08 Sep 2009 | Published: 08 Sep 2009
|
|