cloud data protection

Results 76 - 100 of 164Sort Results By: Published Date | Title | Company Name
Published By: Forcepoint     Published Date: May 14, 2019
Things are not as they used to be in the enterprise. Todays employees are mobile, theyre storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property. However, the threat-centric security approach, with its static policies forces decisions about cyber activity with no insight into the broader context. The result is a disproportionate number of flagged activities, overwhelming security teams who have no way to understand the ones most worthy of investigation. Read Rethinking Data Security with a Risk-Adaptive Approach to learn how a human-centric, risk-adaptive approach can help your organization be more proactive in order to: Automate policy enforcement to deter data loss events Reduce the number of security alerts Cut down on incident investigation time
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Todays organizations turn to the cloud for all types of productivity-gaining tools including security. Features such as security for mobile users and data loss protection are key, but its also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organizations traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDCs 2017 CloudView Survey; IDCs 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
All Clouds are not Equal Todays organizations turn to the cloud for all types of productivity-gaining tools including security. Features such as security for mobile users and data loss protection are key, but its also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: May 14, 2019
IDC Infobrief: How Security Solutions Enable Cloud Success Cloud applications have transformed how organizations conduct business, increasing productivity and reducing costs. However, moving to the cloud means critical data now flows outside the organizations traditional security boundaries. Unsurprisingly, security concerns still rank as the number one reason for not using cloud services*. This IDC InfoBrief, sponsored by Forcepoint, outlines five key security considerations and best practices for safe cloud adoption, including: Multi-cloud adoption: exposing challenges for security architectures Cloud-first and GDPR implications Cloud application visibility and control Data management and DLP in the cloud Leveraging User and Entity Behavior Analytics (UEBA) for protection Read the eBook to find out the five information security lessons learned from transitioning to the cloud. *IDCs 2017 CloudView Survey; IDCs 2017 CloudImpact Survey
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Things are not as they used to be in the enterprise. Todays employees are mobile, theyre storing and accessing data in cloud apps, and are in disparate networks. While the present-day digital world has changed, the objective of data protection has not: you must still ensure the security of your critical data and intellectual property without impacting an employees ability to do their job. The key is to gain visibility into user interactions with data and applications. Once this is achieved, you can apply a level of control based on the specific users risk and the sensitivity or value of the data. An organizations data protection program must consider the human point the intersection of users, data and networks. Enterprises must remain vigilant of data as it moves across hybrid environments and highlight the users who create, touch and move data who may pose the greatest risk to an organization.
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
In todays average large enterprise, more than 1,000 cloud applications may be in usewhether sanctioned or unsanctioned by IT. But traditional security technologies cant adequately address the inevitable security and compliance challenges that follow. The Cloud Access Security Broker (CASB) is an emerging security technology that specifically addresses the data protection challenges and other associated threats that come with the cloud. Based on results from an in-depth survey of decisions makers and influencers with CASB deployment experience, this Osterman Research whitepaper: Analyzes the core drivers behind CASB adoptions Provides guidance in how to demonstrate need for CASB technology in a particular organization Identifies features and functionality to consider when evaluating CASB solutions
Tags : 
    
Forcepoint
Published By: Forcepoint     Published Date: Jun 06, 2019
Todays organizations turn to the cloud for all types of productivity-gaining tools including security. Features such as security for mobile users and data loss protection are key, but its also important to separate fact from fiction when looking at the infrastructure of the provider. This ebook helps you consider the importance of: Data center locations Security controls, data privacy, availability, reliability, and performance What your organization or agency actually needs Download the ebook to discover five common misconceptions about cloud-based security infrastructure, and what you should really be looking for in a cloud-based security solution.
Tags : 
    
Forcepoint
Published By: Arbor Networks     Published Date: Jan 18, 2013
This Frost & Sullivan whitepaper provides an overview of the latest DDoS attack trends, and offers examples of how cloud service and hosting providers can use Arbor Networks solutions to protect their data centers from DDoS attacks and increase revenue by offering Arbor-based, managed DDoS protection services.
Tags : 
ddos, arbor networks, cloud services, protection, data center, ddosattack, hosting provider
    
Arbor Networks
Published By: EVault Inc.     Published Date: Aug 22, 2012
Go hybrid and get the best of both data protection worlds. Cloud-connected backup and recovery seamlessly combines cloud-based and onsite data protection technologies for fast, local restores and ensured, offsite disaster recovery. Read the white paper to: . Discover the benefits of transitioning from tape to disk . Learn how to get shorter backup windows and faster recovery times . Ensure your data is totally secure and easily recovered
Tags : 
white paper, cloud, connected, backup, recovery, hybrid, data, protection, local, restores, offsite, disaster, storage, data protection, data quality, data replication, database security, data warehousing, content management, data center
    
EVault Inc.
Published By: EVault Inc.     Published Date: Aug 22, 2012
How will you prepare your company for cloud adoption? Cloud services are especially attractive to midmarket companies hit with the high cost of meeting compliance requirements. Author and information security expert Felix Santos discusses: . Information security and data protection in the cloud . Recent cloud standards and audit initiatives . Evaluation criteria for selecting a cloud provider that offers trusted data assurance
Tags : 
evault, ebook, trusted, data, assurance, cloud, services, compliance, security, data, protection, audit, standards, evaluation, criteria, provider, assurance, storage, hipaa compliance, data center
    
EVault Inc.
Published By: Cloudian     Published Date: Feb 20, 2018
We are critically aware of the growth in stored data volumes putting pressure on IT budgets and services delivery. Burgeoning volumes of unstructured data commonly drive this ongoing trend. However, growth in database data can be expected as well as enterprises capture and analyze data from the myriad of wireless devices that are now being connected to the Internet. As a result, stored data growth will accelerate.
Tags : 
    
Cloudian
Published By: Veeam '18     Published Date: Mar 13, 2018
In todays digital economy, IT organizations are increasingly using public cloud technologies and services to meet their needs for increased agility and innovation, as well as cost management. This use of public cloud technologies is further complicated when companies use multiple cloud service providers, a concept also known as multi-cloud, and attempt to integrate on- and off-premises environments, known as hybrid cloud. IT organizations now must manage systems that span across both multi-cloud and hybrid cloud environments, which presents new challenges for data protection. The Veeam Availability Platform offers solutions that can provide data protection to, from, and within multi-cloud environments, ensuring companies can fully leverage their public cloud providers and existing on-premises systems.
Tags : 
cloud, enterprise, solutions, digital, organizations
    
Veeam '18
Published By: Veeam '18     Published Date: Dec 04, 2018
"In todays era, organizations are increasingly adopting multiple cloud services, including public, private, and hybrid clouds, to meet increased agility, innovation and cost management goals. Veeam ensures availability in these environments by providing data protection to, from, and within multi-cloud environments. ESG led a research among IT decision makers to better understand the extent to which multiple cloud service providers are being used today and how that influences the use of on-premises and hybrid cloud environments in the future. Read this ESG brief to learn more about: The current trend in multi-cloud adoption for large companies The future of on-premises IT environment How the Veeam Availability Platform delivers the next generation of availability for the always-on enterprise And more! "
Tags : 
    
Veeam '18
Published By: Cohesity     Published Date: Aug 09, 2019
As organizations continue to look for ways to increase business agility, a need for a modern database architecture that can rapidly respond to the needs of business is more apparent than ever. While an RDBMS still serves as a lifeline for many organizations, the adoption of technologies such as NoSQL and Hadoop are enabling organizations to best address database performance and scalability requirements while also satisfying the goals of embracing hybrid cloud and becoming more data-driven. And with organizations relying so heavily on these new technologies to yield rapid insights that positively impact the business, the need to evaluate how those new technologies are managed and protected is essential. Hadoop and NoSQL workloads are now pervasive in production environments and require production-class data protection, yet few data protection solutions offer such capabilities today.
Tags : 
    
Cohesity
Published By: Druva -AWS     Published Date: Apr 28, 2018
Data Loss Protection for Your SaaS & Cloud Apps SaaS applications like Office 365, G Suite, Box and Salesforce are not necessarily built to deliver a complete solution for data protection. This guide reveals the unforeseen risks of trusting your SaaS application to protect your data.
Tags : 
    
Druva -AWS
Published By: Acronis     Published Date: Jan 20, 2012
Today, the cloud stirs up all manner of possibilities for handling data protection, but the cloud also brings many challenges: security, bandwidth, connection availability and data recovery.
Tags : 
acronis, data, data management, virtualization, infrastructure, hybrid, backup, data recovery, data integration, data protection, data quality, database security
    
Acronis
Published By: McAfee EMEA     Published Date: Nov 15, 2017
Private cloud is one of the critical deployment architectures IT teams are adopting as they transition to a service-centric delivery model. More than 75% of organizations? already use private clouds to lower costs, increase agility and exert greater control over security, data protection and compliance. The transition to private cloud represents a paradigm shift in how IT is provisioned and data centers are deployed. Virtualization is expanding beyond servers into storage and networking, while software-defined models allow new levels of agility through advanced automation and orchestration. https://www.eventbrite.com/e/mpower-emea-cybersecurity-summit-2017-tickets-36893006977?aff=kp4
Tags : 
cloud, security, guide, privacy, architectures, organizations, compliance, protection
    
McAfee EMEA
Published By: Nasuni     Published Date: Apr 28, 2011
Traditionally slow access speeds prevented the real use of the cloud in disaster recovery planning. However, modern cloud storage gateways accelerate the speed of access and can provide immediate access to data stored in the cloud. Read on to learn more today!
Tags : 
nasuni, disaster recovery, cloud storage, offsite data protection, backup and recovery, data protection, cloud computing
    
Nasuni
Published By: mindSHIFT Technologies     Published Date: Jul 01, 2014
In this whitepaper, you will learn how your company can benefit from cloud-based business continuity and the 10 steps it can take to execute an effective plan.
Tags : 
mindshift, cloud, cloud based business continuity plan, business continuity plan, data management, data protection, scalability, cloud architecture, cloud infrastructure, virtualization, cloud computing, infrastructure
    
mindSHIFT Technologies
Published By: Mimecast     Published Date: Nov 06, 2017
Trying to manage disparate email solutions? Not just for e-discovery, archiving and recovery, but security and continuity as well? Your perfect-world archive is achievable. Reduce administrative complexity with a 100% cloud solution for not only your email archiving but continuity and security, too. Watch the virtual event on cloud archiving on-demand now, featuring: Amanda Crew, from the hit show Silicon Valley, with a brief history of cringeworthy archive failures. First-hand industry insight from Mimecast CEO Peter Bauer and CTO Neil Murray. A deep dive demonstration of the leading cloud archive solution including, data protection, recovery, e-discovery and compliance features. View on-demand now
Tags : 
mimecast, virtual event, email archiving, email solutions, cloud archiving
    
Mimecast
Published By: Trend Micro SPN     Published Date: Sep 23, 2009
To keep ahead of the threats, you need to rethink your security and ask whether traditional security technologies are up to today's challenges. This eBook explains how correlating web, email and file reputations within a smart protection network is core to Outthinking the cyber criminals.
Tags : 
trend micro, trend, cloud-client, malware, anti-virus, hijacked, fraud, virus, security, data leakage protection, dlp, smart security, data-stealing, anti spam, anti spyware, anti virus, hacker detection, internet security, policy based management, enterprise software
    
Trend Micro SPN
Published By: EMC Corporation     Published Date: Jun 14, 2013
Private cloud improves performance and reliability for mission-critical applications supporting humanitarian projects.
Tags : 
private cloud, cloud, reliability, performance, applications, data growth, digital, technology, enterprise storage, virtualization, data protection, security, enterprise applications, storage, data management
    
EMC Corporation
Published By: CenturyLink     Published Date: Mar 09, 2012
IT Security challenges are more complex than ever, as mobile devices, social technologies and cloud computing take hold. Find out how these top 2012 security trends will affect your organization-and make sure your data protection measures are ready.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles, networking, security, wide area networks, wide area networking, enterprise, protocals, mpl
    
CenturyLink
Published By: CDW     Published Date: Feb 24, 2015
The fundamentals of security and management of software have not changed. But the new computing environment mobile devices, cloud computing and virtualization requires new approaches to familiar challenges. Whats more, software publishers are bringing a new energy to their own vigilance. A capricious economy has many of them stepping up the number of customer audits. As organizations deal with these software licensing challenges, they also face increasingly sophisticated security threats that continuously morph, just a step ahead of remedies to stop them. Organizations need a comprehensive approach to security and software asset management. This white paper will examine the interconnection between SAM and security, offering practical advice on how enterprises can protect themselves and where to go for support.
Tags : 
software asset management, it enterprise, software licensing, mobility, cloud computing, data protection, data management, software testing, software compliance, virtualization
    
CDW
Start   Previous    1 2 3 4 5 6 7    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.