data protection strategy

Results 26 - 38 of 38Sort Results By: Published Date | Title | Company Name
Published By: Intel Corp.     Published Date: Aug 08, 2012
This document provides a high level overview of how to build a high performance, highly available IP SAN with deduplicated disk protection and long-term tape archive. This document will also put that solution into context with the rest of a typical IT environment.
Tags : 
designing, data, protection, strategy, p4000, storeonce, tape, white, paper, san, deduplicated, disk, protection, archive
    
Intel Corp.
Published By: IBM     Published Date: Jul 12, 2016
Join us for a complimentary webinar with Mark Simmonds, IBM big data IT Architect who will talk with leading analyst Mike Ferguson of Intelligent Business Strategies about the current fraud landscape. They will discuss the business impact of fraud, how to develop a fraud-protection strategy and how IBM z Systems analytics solutions and predictive models can dramatically reduce your risk exposure and loss from fraud.
Tags : 
ibm, z systems, fraud loss reduction, fraud management, fraud prevention, fraud analytics, roi
    
IBM
Published By: Vision Solutions     Published Date: Dec 31, 2007
For AIX IT departments looking to take the next step in data protection strategies, CDP is an essential consideration. Analysts agree that businesses will be incorporating this strategy in the next few years as part of an integrated solution. CDP enables you to reverse data corruption in a fraction of the time and labor required for recovery from tape.
Tags : 
aix, data protection, continuous data protection, cdp, high availability, disaster recovery, disk backup, tape backup, recovery, backup, mimix, vision, vision solutions
    
Vision Solutions
Published By: Unitrends     Published Date: Dec 07, 2009
Backup, despite the breathless hyperbole of many in the industry, is simply a form of insurance. What's important about your backup strategy is getting your systems and data protected in the most effective and affordable manner possible. Speaking plainly - you must be careful that you are in control of your backup strategy rather than your backup strategy (and vendor) being in control of you.
Tags : 
unitrends, backup, data protection, data quality, server, replication, strategy, virtualization, recovery
    
Unitrends
Published By: Unitrends     Published Date: Mar 30, 2010
Clouds are all the rage right now. And the truth is that cloud-based computing can be a tremendous value. Cloud-based computing is not just an opportunity for a bunch of venture capitalists hanging out at Sand Hill Road, it's a wonderful chance for small and medium businesses to take a step toward aligning their information technology spend to increase their focus on revenue-generating opportunities.
Tags : 
unitrends, backup, data protection, data quality, server, replication, strategy, virtualization, cloud, business continuity, cloud-based, revenue, recovery
    
Unitrends
Published By: Riverbed     Published Date: Sep 05, 2014
This white paper details the current challenges organizations face with respect to their evolving IT requirements, growing storage needs, and more extensive data protection requirements. It focuses on an expanding set of cloud-based storage offerings and the buying considerations of those who want to improve the data management metrics associated with data protection services such as backup and recovery. The paper also takes a closer look at the solutions offered by Riverbed Technology that allow organizations to integrate cloud-based storage withing solutions that address a growing set of data protection demands.
Tags : 
cloud, enterprise storage, data protection, it requirements, metrics
    
Riverbed
Published By: HP     Published Date: Jul 08, 2009
Today's economic climate has heightened the goal of every IT department to provide high-quality IT service to the business, at the lowest possible cost, while improving business outcomes. Looking outside of the infrastructure itself, there are two key challenges related to data storage: provisioning capacity for applications and reducing risk through a sound data protection strategy. This white paper discusses the challenges of creating the right storage infrastructure, provides an overview of data storage options, and examines a storage solution that combines blade servers and network-attached storage.
Tags : 
storage, storageworks, hp bladesystem, server, infrastructure, nas, network-attached storage, blade servers, data protection, san, fibre channel, iscsi, serial attached scsi, sas, proliant, msa, disk arrays, ethernet, rack, servers
    
HP
Published By: HP     Published Date: Jul 08, 2009
Data is the backbone of every organization. No matter the business, industry, or size, reliable data access is essential to operations. Should a "worst-case scenario" occur, being prepared with an appropriate disaster recovery strategy is essential. Given the potential high cost associated with data loss, reliable data protection is no longer an option; rather, it is an obligation. This white paper discusses a data protection strategy that takes into consideration the business environment, offering sophisticated features while maintaining simplicity, affordability, and reliability.
Tags : 
storage, data protection, reliability, reliable, disaster recovery, business protection, business continuity, storageworks, rto, rpo, recovery time objective, recovery point objective, tape, lan, san, das, direct attached storage, rdx, d2d, disk to disk
    
HP
Published By: Third Brigade     Published Date: Aug 21, 2009
Organizations that need to protect business critical applications, and sensitive data and hosts recognize that traditional network defenses can be readily bypassed by attackers. This white paper defines four key qualities of an effective host-based IPS.
Tags : 
intrusion prevention, network security, data protection, hacker detection, intrusion detection, ips, intrusion prevention systems, host-based ips, security strategy, third brigade
    
Third Brigade
Published By: Breece Hill, LLC     Published Date: Mar 15, 2007
Once a business clears the financial hurdle and begins to plan their data protection strategy the choices can appear daunting. Do they select tape or disk? Apply differential or incremental backups? How much will a new system cost and how much time will it take to implement? What data should be included in the backup? This article attempts to address these concerns.
Tags : 
smb, storage, archiving, backup, hardware, small business networks, storage, backup and recovery, data protection, data management, breece hill
    
Breece Hill, LLC
Published By: HP and Intel® Xeon® processors     Published Date: Sep 06, 2011
This white paper discusses how SMBs can effectively address their data protection challenges, implementing solutions that help store and protect their business-critical data as they cut costs and improve efficiency and reliability.
Tags : 
hp + intel, data protection stratefy, smbs, backup and recovery, disk, tape, d2d storage, data deduplication
    
HP and Intel® Xeon® processors
Published By: NetApp     Published Date: Mar 05, 2018
Read this comprehensive guide to the General Data Protection Regulation and learn how to comply with new regulations and address business implications, establish a holistic data compliance strategy and better manage your data through the lens of data privacy by design.
Tags : 
netapp, database performance, flash storage, data management, cost challenges
    
NetApp
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015.1 However, only half of enterprises today are using some type of endpoint backup.2 That means that the volume of endpoint data that is in jeopardy is nothing short of significant.
Tags : 
encryption, data loss prevention, mobile app
    
Commvault
Previous    1 2     Next   
Search      

Add Research

Get your company's research in the hands of targeted business professionals.


Featured FREE Resource: