enterprise

Results 5626 - 5650 of 6285Sort Results By: Published Date | Title | Company Name
Published By: AT&T     Published Date: Jun 25, 2008
Quantum Cryptography is an emerging technology that may offer new forms of security protection. Relying on the laws of quantum mechanics, transmission is carried by a single particle that can only be measured one time, making encryption and decryption difficult to compromise. Businesses are evaluating architectural solutions using Quantum Cryptography to understand its potential benefits. Future implementations of the technology may soon make it more available for enterprise business.
Tags : 
att, at&t, encryption, decryption, quantum, quantum cryptography, cryptography, qkd, quantum key distribution, security
    
AT&T
Published By: Asentria Corporation     Published Date: Sep 04, 2007
The proliferation of remote and unmanned facilities is exposing many enterprises to devastating events. The need is to not only detect a threatening condition, but to also get a precise message to the person who is prepared to do something about it.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access, snmp monitoring, snmp, contact closures, fault management, network management, remote site monitoring, remote site alarms, environmental monitoring, network alarm monitoring, network alarm management, remote telemetry units, alarm management system, network management systems, network monitoring, protocol mediation
    
Asentria Corporation
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
CCU sought to encrypt its backup tapes for keeping customer data secure in transit and in storage at the offsite tape-vault vendor’s facility. As a financial institution, CCU was subject to stringent government regulations. With nearly 60 gigabytes of data to encrypt each night, CCU knew that a software solution was out of the question.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Given Payformance’s longstanding commitment to protecting the privacy of its clients’ information, the company has decided to investigate data encryption solutions for its primary hard drive storage and secondary backup tape storage. With its multi-vendor interoperability, NeoScale’s CryptoStor storage security appliances emerge as the obvious choice.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Chartered in 1973, San Francisco-based Spectrum Federal Credit Union serves over 12,000 members. When the issue arose on how to protect their members’ personal data residing on backup tapes, Spectrum FCU took no chances – they and their Techical Advisory Board made the decision to encrypt this important information with the help of NeoScale Systems, an undisputed leader in this emerging market.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Qsent needed to shore up its disaster recovery strategy. This meant sending backup tapes – each with more than 2.5 terabytes of data – between data centers and storing them offsite. To keep all its data safe and secure, Qsent chose NeoScale’s CryptoStor wire-speed tape security appliance to encrypt and decrypt data.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
With horror stories in the news every week about lost or stolen laptops and backup tapes, the senior management team at Oregon Community Credit Union knew they had to do everything within their powers to protect their critical data as it traveled offsite to a third-party tape vaulting vendor. They were tasked with finding an affordable solution that would strike a balance between security, ease of use, and scalability.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
As more states pass regulations governing the security, confidentiality, and integrity of customer data, a leading national bank has recognized its need to ensure the safety and security of personal data for its thousands of customers. To ensure compliance and maintain the security of this information, the bank has deployed NeoScale’s CryptoStor Tape appliances to help accomplish its objectives.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Network Engines     Published Date: Sep 21, 2007
Enterprise customers want software applications delivered as server appliances because they help to reduce IT costs and complexity. Appliances provide better performance, security and manageability. Learn from experts, about factors to consider and things to avoid with the appliance delivery model.
Tags : 
software as an appliance, hardware, server hardware, software appliance, software delivery, software management, enterprise software, software installation, network performance, network engine, network engines, networking
    
Network Engines
Published By: Informatica     Published Date: Oct 26, 2007
The goal of pervasive BI applications is to take the data that produced the back office ROI of more than 400% and deliver it to front-line employees in a form appropriate to their job functions – with similar results. There are thousands of business process steps in a typical enterprise where pervasive BI insights can be added. What are leading companies doing with pervasive BI?
Tags : 
business intelligence, database, enterprise data warehouse, data mart, data warehouse, data mining, active data warehousing, active data warehouse, informatica, data management
    
Informatica
Published By: Netwrix     Published Date: Oct 10, 2007
This white paper covers account lockout management process and introduces new cost-effective workflows of account lockout resolution, describing significant ROI enterprises can achieve through the use of automated management solutions.
Tags : 
authentication, account lockout, access control, network security, lockout, user lockout, user authentication, user validation, intrusion prevention, netwrix
    
Netwrix
Published By: Shunra     Published Date: Nov 27, 2007
How SAP uses Shunra VE to keep production problems at bay with pre-production testing on the virtual WAN.  These testing approaches and methodologies  reached far beyond conventional application testing and have become the preferred approach to ensure success. SAP does it, so should you!
Tags : 
soa, application testing, application testing software, sap, sap case study, soa applications, testing, virtual wan, wide area network, shunra, ppi
    
Shunra
Published By: Computhink     Published Date: Jan 31, 2008
Download this informative webcast by Doug Brennecke, VP Sales at Computhink, featuring Tom von Gunden, chief editor of enterprise content management news and solutions site ECM Connection.
Tags : 
document management, compliance, content management, computhink, video
    
Computhink
Published By: ElcomSoft     Published Date: Dec 06, 2007
Information protection gets much attention these days. Many have realized that their data is a treasure, which not only should be treated properly, but should be protected as well. So a few dollars spent on defending against security threats now can reap millions in avoiding future losses due to hacking of your enterprise network.
Tags : 
passwords, password, password management, security management, good password, bad password, data protection, elcomsoft
    
ElcomSoft
Published By: TeraCloud     Published Date: Dec 11, 2007
Storage spawns where it is needed. This leaves IT to manage many islands of storage devices scattered across the enterprise. Compliance requirements, multimedia-rich applications, unstructured content and a proliferation of databases are pushing IT departments to increase the size and complexity of their storage networks. All of this is occurring at a time when the need for centralized storage management has never been greater.
Tags : 
storage, storage management, infrastructure, compliance, tsa, teracloud, teracloud storage analytics, san, storage area networks
    
TeraCloud
Published By: TeraCloud     Published Date: Dec 11, 2007
TSF delivers the first Java-enabled enterprise Storage Resource Management (SRM) solution that simplifies the administration and management of distributed and mainframe storage resources across the entire enterprise, from a single point of control. TSF helps you plan more effectively, lower administration costs, and puts you in control of your storage environment.
Tags : 
storage, srm, storage resource management, storage management, tsf, tsa, teracloud, teracloud storage, infrastructure, san, sans, storage area
    
TeraCloud
Published By: VMware Dell     Published Date: Jun 17, 2008
Faced with an aging set of servers within its IT infrastructure, United Bank and Trust decided to embrace virtualization as way to move forward. United deployed the VMware Infrastructure 3 solution together with an EqualLogic PS Series virtualized iSCSI SAN, which established an enterprise storage platform to achieve the high availability, data protection and performance required for United’s new generation, virtualized IT environment.
Tags : 
server, server virtualization, virtual machine, virtual server, vmware, equallogic, dell equallogic, virtualization, vmware, virtual infrastructure, x86
    
VMware Dell
Published By: VMware Dell     Published Date: Sep 29, 2008
As a growing law firm, Sills Cummis found itself presented with several classic IT challenges. It had to contend with server proliferation within its data center, implement a cost-effective disaster recovery system, and ensure high availability of key applications and services for its attorneys. Through its purchase of the VMware Infrastructure 3 suite, Sills Cummis was able to tackle all of these problems.
Tags : 
vmware, dell, sills cummis epstein, gross p.c., servers, sql server
    
VMware Dell
Published By: VMware Dell     Published Date: Sep 29, 2008
Virtualized IT infrastructures can simplify management and facilitate business continuity while helping minimize power consumption and procurement costs. Virtualization also helps organizations automate disaster recovery plans. Dell EqualLogic PS Series arrays and VMware® Site Recovery Manager (SRM) software provide integrated, cost-effective, automated site recovery and testing for enterprise data centers.
Tags : 
vmware, dell, iscsi, equallogic, site recovery manager, navicure, disaster recovery
    
VMware Dell
Published By: VMware Dell     Published Date: Sep 30, 2008
This white paper describes a virtualized infrastructure that applies storage and server virtualization technologies to cost-effectively achieve a flexible, high performance, dynamic IT infrastructure that is simple to manage and scale.
Tags : 
vmware, dell, virtual server, virtual storage, equallogic, iscsi san, esx server, internet engineering task force (ietf)
    
VMware Dell
Published By: Clarus Systems     Published Date: Mar 18, 2008
The recent momentum of Unified Communications (UC) and the disruptive enabling technology of IP Telephony have created a convergence between Voice Engineering and IT departments that is unprecedented - even since the advent of computer telephony integration. However, despite rapid and significant advances within these technologies, many enterprises, even the early adopters, have not fully embraced the alignment of these two worlds.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: Clarus Systems     Published Date: Mar 18, 2008
Clarus Systems, Inc. answers the demands of the market by providing enterprises, systems integrators and managed service providers with scaleable IP Communications solutions that maximize ongoing operations and ensure increased end user confidence and efficiency. Learn more about Clarus Systems and how they can help your business in this data sheet.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: Clarus Systems     Published Date: Mar 18, 2008
Enterprise networks are going through massive change, and the convergence of voice and data including Communication deployments, upgrades, transformations and ongoing management remain a top priority. According industry analysts at Aberdeen Group, 61% are planning for Communications in the next two years. In order to get the most from their Unified Communications investment at the time of deployment and beyond, enterprises must leverage both active testing and configuration analysis techniques to certify and validate that environments are configured as designed.
Tags : 
itil, clarus systems, ipt, ip telephony, unified communications, cisco, callmanager, best practices, voice engineering, pdioo, strategies, deployment, operations, day 1, day 2, clarusipc, automated testing, business intelligence, performance management, configuration management
    
Clarus Systems
Published By: Easynet     Published Date: Mar 26, 2008
Compliance with the payment card industry (PCI) data security standard is now a reality for every retailer: compliance should be high on every retailer's list of priorities for enterprise security. With this reality comes the need for retailers to fully understand their PCI compliance status through a thorough gap analysis and associated risk assessment.
Tags : 
compliance, vpn, retail, managed networks, easynet
    
Easynet
Start   Previous    219 220 221 222 223 224 225 226 227 228 229 230 231 232 233    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com