Data Protection White Papers

Continuous data protection (CDP), also called continuous backup, refers to backup of computer data by automatically saving a copy of every change made to that data, essentially capturing every version of the data that the user saves. It allows the user or administrator to restore data to any point in time.
Results 1 - 25 of 828Sort Results By: Published Date | Title | Company Name
By: ForgeRock     Published Date: Mar 22, 2018

What the Internet of Things means for consumer privacy discusses the findings of an Economist Intelligence Unit (EIU) research programme, sponsored by ForgeRock, that explores the privacy concerns and priorities of global consumers stemming from the Internet of Things (IoT) and related technologies.

Tags : forgerock, consumer privacy, data security, iot, internet of things, internet security, consumer behavior, tracking data, security policies, web service security, business activity monitoring, customer interaction service, data protection, database security, collaborative commerce, customer experience management, secure content management, business technology
    
By: OpenText     Published Date: Feb 06, 2018

Read the white paper to learn how you can address key GDPR requirements by consolidating all your data in a central repository to gain tighter security and control, easier access and retrieval.

Tags : opentext, gdpr compliance, eu privacy, data protection, data access, compliance, network security, remote access, access control, policy based management, security policies, best practices, international computing, business technology, data loss prevention
    
By: OpenText     Published Date: Jan 31, 2018

Read this white paper to learn how to minimize, consolidate, and protect your data and how data identification and analytics play a key role in overcoming GDPR compliance concerns.

Tags : opentext, gdpr, gdpr compliance, data protection, data identification, network security, compliance, identity management, web service security, wireless security, customer service, ebusiness, mobile device management
    
By: OpenText     Published Date: Jan 26, 2018

Read this AIIM white paper to learn how to tackle future information privacy and security concerns of new and future technologies such as IoT and machine learning, and prepare for the GDPR.

Tags : opentext, compliance, gdpr, gdpr compliance, information privacy, data protection, privacy, identity management, policy based management, security policies, pci compliance, business technology
    
By: Virtela Communications, Inc.     Published Date: Oct 13, 2011

Christian Kane is an Enterprise Mobility Management Research Analyst with Forrester Research, where he helps clients develop and improve their desktop and mobile strategy. His research spans mobile hardware, mobile operating systems, mobile device management solutions, and mobile applications.

Tags : cloud computing, technology, virtela, device management, christian kane, mobility management, research, analytical applications, business intelligence, data protection, data quality
    
By: Astaro     Published Date: Jan 19, 2011

Saint Joseph Abbey and Seminary College in Louisiana was using several separate products to help protect their network, filter content and monitor Internet usage. After installing the Astaro Security Gateway home use version, the solution quickly impressed with its usability and power.

Tags : astaro security gateway, saint joseph abbey, network protection, content filtering, monitoring, network management, network security, security management, data protection, content management system
    
By: Attivio     Published Date: Aug 20, 2010

With the explosion of unstructured content, the data warehouse is under siege. In this paper, Dr. Barry Devlin discusses data and content as two ends of a continuum, and explores the depth of integration required for meaningful business value.

Tags : attivio, data warehouse, unified information, data, content, unstructured content, integration, clob, blob, business intelligence, database development, data protection, data quality, data warehousing
    
By: Attivio     Published Date: Aug 20, 2010

Current methods for accessing complex, distributed information delay decisions and, even worse, provide incomplete insight. This paper details the impact of Unified Information Access (UIA) in improving the agility of information-driven business processes by bridging information silos to unite content and data in one index to power solutions and applications that offer more complete insight.

Tags : attivio, data warehouse, unified information, data, content, unstructured content, integration, clob, blob, database development, data protection, data warehousing
    
By: Ounce Labs, an IBM Company     Published Date: Dec 29, 2009

Countless studies and analyst recommendations suggest the value of improving security during the software development life cycle rather than trying to address vulnerabilities in software discovered after widespread adoption and deployment. The justification is clear.For software vendors, costs are incurred both directly and indirectly from security flaws found in their products. Reassigning development resources to create and distribute patches can often cost software vendors millions of dollars, while successful exploits of a single vulnerability have in some cases caused billions of dollars in losses to businesses worldwide. Vendors blamed for vulnerabilities in their product's source code face losses in credibility, brand image, and competitive advantage.

Tags : source code vulnerability testing, independent model, centralized model, distributed model, software development life cycle, source code scanning, application security, source code security testing, identity management, policy based management, security management, security policies, application integration, configuration management, data protection
    
By: Ounce Labs, an IBM Company     Published Date: Dec 15, 2009

Today, when you make decisions about information technology (IT) security priorities, you must often strike a careful balance between business risk, impact, and likelihood of incidents, and the costs of prevention or cleanup. Historically, the most well-understood variable in this equation was the methods that hackers used to disrupt or invade the system.

Tags : ounce labs, it securitym it risk, software applications, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, identity management, internet security, security management, security policies, data protection, database security, vulnerability management
    
By: Vision Solutions     Published Date: Dec 04, 2009

The newest edition of this unique report is filled with survey findings from over 4,000 individuals responsible for the resilience and protection of AIX and IBM i (i5/OS) environments. Discover if and how your peers are meeting recovery-time and recovery-point objectives, disaster recovery plans and more.

Tags : vision solutions, ibm power systems, aix users, data protection, recovery and optimization, it availability, data management, as/400
    
By: Marathon Technologies     Published Date: Sep 18, 2009

There are many expensive, complex technologies that promise high availability for SQL. Fortunately there are also simple, automated ways to get the highest levels of protection. The following five secrets to affordable SQL availability will help you to implement a SQL environment with little or no downtime, zero data loss, and no added IT complexity.

Tags : marathon, downtime, everrun, server, failure, outage, windows, sql, availability, infrastructure, network architecture, network management, server hardware, servers, server virtualization, microsoft exchange, windows server, data protection
    
By: Acronis Inc.     Published Date: Jul 14, 2009

Acronis® Backup & Recovery™ 10 Server for Windows is the next-generation disaster recovery product, designed to back up and protect stand-alone Windows Servers. Download this demo software to learn how Acronis Backup Recovery™ 10 Server for Windows can help you recover the operating system, applications and all data in minutes after any unforeseen event.

Tags : acronis, backup, recovery, windows servers, disaster recovery, stand-alone, data protection, system recovery, application security, backup, data management, trial download, software trial, free trial, security, backup and recovery, microsoft exchange, windows, windows server
    
By: Acronis Inc.     Published Date: Jul 14, 2009

Based on Acronis' patented disk imaging and bare metal restore technologies, Acronis Backup & Recovery 10 Advanced Server is the next generation of the Acronis True Image disaster recovery family for physical and virtual environments. Register below to receive access for a free trial version.

Tags : acronis, backup, recovery, server, windows, disaster recovery, stand-alone, data protection, system recovery, application security, backup, data management, windows server, free trial, demo software, bare metal, virtual backup, data deduplication, security, backup and recovery
    
By: Ounce Labs, an IBM Company     Published Date: Jul 08, 2009

The Business Case for Data Protection, conducted by Ponemon Institute and sponsored by Ounce Labs, is the first study to determine what senior executives think about the value proposition of corporate data protection efforts within their organizations. In times of shrinking budgets, it is important for those individuals charged with managing a data protection program to understand how key decision makers in organizations perceive the importance of safeguarding sensitive and confidential information.

Tags : ounce labs, it securitym it risk, software applications, ciso, pci dss, hipaa, glba, data security, source code vulnerabilities, source code analysis, it security, cryptography, security management, security policies, application integration, business intelligence, configuration management, data integration, data protection, vulnerability management
    
By: Vision Solutions     Published Date: Jun 10, 2009

Journaling? RAID? Vaulting? Mirroring? High availability? Know your data protection and recovery options! Download this information-packed 29-page report that reviews the spectrum of IBM i (i5/OS) and AIX resilience and recovery technologies and best practices choices, including the latest, next-generation solutions.

Tags : aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i, next generation solutions, recovery time, hacmp, high availability, clustering, environmental conditions, operator error, software bugs, data loss, 99.99, failure, logical volume manager
    
By: Vision Solutions     Published Date: Jun 10, 2009

For IT departments looking to bring their AIX environments up to the next step in data protection, IBM’s PowerHA (HACMP) connects multiple servers to shared storage via clustering. This offers automatic recovery of applications and system resources if a failure occurs with the primary server.

Tags : aix, i5/os, vision, resilience, recovery, recovery solutions, os/400, ibm i, next generation solutions, recovery time, hacmp, high availability, clustering, environmental conditions, operator error, software bugs, data loss, 99.99, failure, logical volume manager
    
By: Vision Solutions     Published Date: Jan 22, 2009

This white paper explores how the power of an information availability solution can unlock the latent potential of your IT environment and deliver new value for your organization. It includes an Action Worksheet to use in discussions with your IT executives.

Tags : vision solutions, data protection, information availability, banking industry, crm, enterprise applications, data management, customer relationship management, as/400
    
By: Vision Solutions     Published Date: Sep 11, 2008

Journaling is a powerful feature, one that IBM has continued to develop and improve over the years. Yet, depending upon your business requirements, you probably still need more protection against downtime than journaling alone can provide. This white paper will cover what you need to know about journaling, what it can do and how it supports and cooperates with high availability software.

Tags : vision, high availability, ibm, idata protection, journaling, as/400, database development, data integration, data protection, data replication
    
By: Vision Solutions     Published Date: Jul 06, 2008

This white paper provides a road map to the most effective strategies and technologies to protect data in AIX environments and provide fast recovery should data be lost or corrupted due to accident or malicious action. The paper also outlines the benefits of continuous data protection (CDP) technologies for AIX.

Tags : vision, high availability, ibm, aix, cdp, as/400, data protection
    
By: Vision Solutions     Published Date: Apr 24, 2008

This white paper will provide a road map to the most effective strategies and technologies to protect data and provide fast recovery should data be lost or corrupted due to accident or malicious action.

Tags : vision, high availability, ibm, cdp, aix, business intelligence, configuration management, data protection
    
By: Vision Solutions     Published Date: Apr 11, 2008

Until recently, System i high availability solutions were reserved mostly for large enterprises. Now that high availability is dramatically easier to use and less expensive to own and manage, the picture has changed.

Tags : high availability, disaster recovery, vision, vision solutions, ibm, backup and recovery, business continuity, as/400, data protection
    
By: Vision Solutions     Published Date: Feb 18, 2008

Continuous member service is an important deliverable for credit unions, and. the continued growth in assets and members means that the impact of downtime is affecting a larger base and is therefore potentially much more costly. Learn how new data protection and recovery technologies are making a huge impact on downtime for credit unions that depend on AIX-hosted applications.

Tags : vision, high availability, ibm, aix, cdp, core union, as/400, data protection, database security
    
By: Vision Solutions     Published Date: Dec 31, 2007

For AIX IT departments looking to take the next step in data protection strategies, CDP is an essential consideration. Analysts agree that businesses will be incorporating this strategy in the next few years as part of an integrated solution. CDP enables you to reverse data corruption in a fraction of the time and labor required for recovery from tape.

Tags : aix, data protection, continuous data protection, cdp, high availability, disaster recovery, disk backup, tape backup, recovery, backup, mimix, vision, vision solutions, platforms, backup and recovery, business continuity, as/400, unix
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End