> Technology > Data Security
 

Data Security

Data Security
Results 151 - 175 of 289Sort Results By: Published Date | Title | Company Name
White Paper Published By: Dell EMC     Published Date: Nov 02, 2015
If you are considering Hybrid Cloud, tune in to this revealing conversation with EMC’s Chad Sakac and Wikibon Analysts, Dave Vallente and Stu Miniman.
Tags : 
emc, wikibon, analysis, virtualization, cloud
    
Dell EMC
White Paper Published By: Dell EMC     Published Date: Nov 02, 2015
This paper examines enterprise-class snapshot technologies, discussing use cases for snapshots as well as classic challenges associated with using snapshot technologies in pure hard disk drive (HDD)–based arrays.
Tags : 
emc, afa, enterprise, hdd, array
    
Dell EMC
White Paper Published By: Aria Systems     Published Date: Nov 02, 2015
With millions of dollars hanging in the balance, selecting the right billing vendor is critical. Download Aria’s “7 Reasons to Evaluate Cloud Billing” to help you identify why cloud billing could be your best option. For example, cloud-billing vendors are often found to be more nimble than their on-premise billing counterparts, particularly for enterprises with multiple product lines and business in multiple geographies and currencies. Discover key advantages: • Accelerated go-to-market for products and services • An enhanced customer experience • The elimination of patches and upgrades • The ability to monetize your assets and services in new ways
Tags : 
aria systems, cloud billing, billing vendors, networking, data management
    
Aria Systems
White Paper Published By: Intel Security     Published Date: Oct 21, 2015
Learn how McAfee Server Security Suites take a discover, protect, expand approach to keep data secure, allowing you to grow your virtual environment with peace of mind.
Tags : 
mcafee, intel, security, virtual, cloud
    
Intel Security
White Paper Published By: Intel Security     Published Date: Oct 21, 2015
This white paper offers three options for Windows Server 2003 migration, along with a variety of measures you can take that will help you maintain a strong security posture in the face of today’s dynamic threat landscape.
Tags : 
mcafee, intel, security, windows, server
    
Intel Security
White Paper Published By: Intel Security     Published Date: Oct 21, 2015
This white paper offers insights into how McAfee Server Security Suites tackles all of these challenges and provides better visibility across the entire enterprise data center.
Tags : 
mcafee, intel, security, data, center
    
Intel Security
White Paper Published By: Intel Security     Published Date: Oct 21, 2015
This 36 page report highlights some of the many ways that security technologies and services - from silicon to sign-on are evolving to provide the visibility and control needed to deploy workloads flexibility in the evolving datacenter, which spans both private and public clouds.
Tags : 
mcafee, intel, security, data, cloud
    
Intel Security
White Paper Published By: Intel Security     Published Date: Oct 21, 2015
This solution brief discusses three migration paths and how to choose the best one for your situation.
Tags : 
windows server 2003, w2k3, microsoft eol, microsoft eos, server security
    
Intel Security
White Paper Published By: Intel Security     Published Date: Oct 21, 2015
Intel Security data protection solutions offer a variety of encryption capabilities and solutions to cover both Windows and Apple devices.
Tags : 
mcafee, intel, encryption, apple, filevault
    
Intel Security
White Paper Published By: Intel Security     Published Date: Oct 21, 2015
Encryption solutions are a key component of data protection and are part of Intel Security protection suites.
Tags : 
mcafee, intel, data, security, protection
    
Intel Security
White Paper Published By: Intel Security     Published Date: Oct 21, 2015
McAfee Data Loss Prevention offers comprehensive protection for your most sensitive data regardless of where it resides or where it travels—in the cloud or on premises.
Tags : 
mcafee, intel, security, content, protection
    
Intel Security
White Paper Published By: Intel Security     Published Date: Oct 21, 2015
In this brief, we’ll take a look at common use cases that show how integration between McAfee Advanced Threat Defense and other security controls from McAfee, a part of Intel Security, create a multipronged strategy designed to make enterprise defenses both more effective in detecting previously unknown malware and globally responsive when a new attack occurs.
Tags : 
mcafee, intel, security, threat, strategy
    
Intel Security
White Paper Published By: Cyveillance     Published Date: Oct 20, 2015
In this white paper, we examine what we consider to be three necessary steps when making a business case for threat intelligence for your organization. Companies must define what they need and why they need it, align security needs and business objectives, and finally, develop an effective plan. We then offer two example scenarios of how businesses can put these steps together and created a solid justification for threat intelligence.
Tags : 
cyveillance, threat intelligence, security, security professionals, it management
    
Cyveillance
White Paper Published By: Juniper Networks     Published Date: Oct 20, 2015
In today’s world, your firewall must be able to take immediate action based on known or emerging intelligence.
Tags : 
juniper, cloud, data center, security intelligence, networking
    
Juniper Networks
White Paper Published By: Juniper Networks     Published Date: Oct 20, 2015
Expand data center operations for greater automation and ease of management in a private cloud infrastructure to keep pace with exploding demand for images, video, and music from customers.
Tags : 
juniper, shutterstock, metafabric, private cloud, data center
    
Juniper Networks
White Paper Published By: Juniper Networks     Published Date: Oct 20, 2015
Design a flexible and agile campus and data center network that will scale with a fast growing business.
Tags : 
juniper, cloud, data center, zulily, network
    
Juniper Networks
White Paper Published By: Juniper Networks     Published Date: Oct 20, 2015
As with sports cars, performance is a top buying criteria for firewalls. Because if you can’t keep up with the traffic—real traffic, not traffic in the labs—your apps will be unhappy, and your users even more so.
Tags : 
juniper, firewall, traffic, networking, security
    
Juniper Networks
White Paper Published By: Juniper Networks     Published Date: Oct 20, 2015
How did firewalls develop to provide the strong, deep security and sophisticated capabilities that they offer us today? It’s a long story that took place over a relatively short period of time, and most likely you were part of it.
Tags : 
juniper, firewall, packet, filter, security
    
Juniper Networks
White Paper Published By: Juniper Networks     Published Date: Oct 20, 2015
RAND reports present research findings and objective analysis that address the challenges facing the public and private sectors.
Tags : 
juniper, cybercrime, data, narkets, research
    
Juniper Networks
White Paper Published By: Intel Security     Published Date: Oct 20, 2015
Most effective DLP solutions are implemented as a business process, rather than a “set and forget” technology. Get complimentary access to this Gartner report ($195 value.) In this report, Gartner dentifies some key challenges CISOs face and provides guidance on a business process approach to a successful DLP implementation.
Tags : 
intel, gartner, data loss, dlp, ciso
    
Intel Security
White Paper Published By: IBM     Published Date: Oct 19, 2015
IBM InfoSphere Information Server connects to many new ‘at rest’ and streaming big data sources, scales natively on Hadoop using partition and pipeline parallelism, automates data profiling, provides a business glossary, and an information catalog, plus also supports IT.
Tags : 
ibm, infosphere, data profiling, business glossary, partition
    
IBM
White Paper Published By: Juniper Networks     Published Date: Oct 19, 2015
In today’s rapidly evolving world, the modern enterprise has the benefit of many technologies that were unheard of just 10 years ago – the cloud, for instance. However, with every new technology – cloud included – there are new security challenges. With huge numbers of users, devices and data deployed to take advantage of the latest technologies, the enterprise is becoming increasingly vulnerable to data loss, malicious attacks and network instability.
Tags : 
juniper, security, network, enterprise, cloud
    
Juniper Networks
White Paper Published By: Juniper Networks     Published Date: Oct 19, 2015
New Juniper Networks-sponsored research, by the RAND Corporation, “The Defender’s Dilemma: Charting a Course Toward Cybersecurity,” introduces a first-of-its-kind heuristic model that helps companies map the economic drivers and challenges of defense.
Tags : 
juniper, rand, cybercrime, cybersecurity, threat
    
Juniper Networks
White Paper Published By: Juniper Networks     Published Date: Oct 19, 2015
The guidelines provided in this white paper make up some of the best practices entailed in creating an overall security policy for your organization that underlies deployment of effective firewalls.
Tags : 
juniper, firewall, threat, security, policy
    
Juniper Networks
White Paper Published By: Intralinks     Published Date: Oct 14, 2015
A quick-reference guide to defining your organization’s collaboration needs – and finding the right vendor to meet them.
Tags : 
enterprise, intralinks, collaboration, security, data
    
Intralinks
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12    Next    End
Search      

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com