Skip to main content
 

data

Results 9701 - 9725 of 11673Sort Results By: Published Date | Title | Company Name
Published By: HP     Published Date: Aug 08, 2014
Although modern backup solutions can offer significant recovery agility, backup as an IT process is generally less than “enough” for the data protection goals that IT is being asked to deliver. As IT is embracing snapshots, replication, archiving, and availability mechanisms to enhance business continuity/disaster recovery (BC/DR) preparedness, it is important to realize that there is a better way than piecemealing each component, and then wondering why CapEx and OpEx are so out of line.
Tags : 
vendor, backup, recovery solutions, lower costs, speed recovery, infrastructure, risk, simplified management, performance, connectivity
    
HP
Published By: HP     Published Date: Aug 08, 2014
In this report, we’ll examine first why HP StoreOnce and HP Data Protector products are truly game-changing on their own rights. Then, we will look at why they get even "better together” as a complete BURA solution that can be more flexibly deployed to meet backup challenges than any other solution in the market today.
Tags : 
backup, recovery solutions, lower costs, speed recovery, infrastructure, risk, simplified management, performance, connectivity
    
HP
Published By: HP     Published Date: Aug 21, 2014
This video (3:58 min) shows the typical journey that your data might take from its creation to its retirement. HP Experts discuss how various storage solutions are used to best handle, protect and retain that data regardless of how and where it is being used.
Tags : 
data, storage solutions, storeonce, deduplication, storage, it benefits, backup systems, challenges, challenges, technologies
    
HP
Published By: HP     Published Date: Aug 08, 2014
When you have voluminous data sets growing at an unabated rate, in formats that are unique and complex, how do you address your backup and recovery needs? While relying on traditional backup and recovery solutions can complicate matters, a better approach is to use a solution that enables your IT organization to make decisions that are more intelligent by integrating predictive analysis and an adaptive approach to backup and recovery.
Tags : 
transform, backup, recovery solutions, lower costs, speed recovery, infrastructure, risk, simplified management, performance, connectivity
    
HP
Published By: HP     Published Date: Aug 08, 2014
IT organizations are challenged to do more with limited budgets and fewer IT resources. Meeting these pain points requires a paradigm shift towards optimized data protection. As a leader in storage, HP is working with Symantec to deliver innovative solutions to modernize data protection for Symantec NetBackup environments that enable complete protection.
Tags : 
symantec, netbackup, budgets, protection, it organizations, storage, commvault simpana, data protection, recoverability, enterprise, data, storeonce
    
HP
Published By: HP     Published Date: Aug 08, 2014
Enterprise IT organizations are challenged by accelerating data growth and increasing reliance on the data. This requires a fundamental rethinking of how data is protected and accessed. HP StoreOnce backup and CommVault Simpana deliver an integrated, end-to-end data protection and rapid recoverability solution to enhance business continuity and resiliency.
Tags : 
it organizations, storage, commvault simpana, data protection, recoverability, enterprise, data, storeonce
    
HP
Published By: HP     Published Date: Aug 08, 2014
Looking beyond storage, HP Converged Infrastructure solutions enable your business to unleash the potential of your data center and reduce risk. Overcome IT sprawl with simplified management and implementation, enhanced performance, improved availability, and the economies of open standards and connectivity. For the business, this means faster time to revenue, increased agility, lesser risk, and lower cost of operation. HP delivers better value of convergence than other vendors do.
Tags : 
backup, recovery solutions, lower costs, speed recovery, infrastructure, risk, simplified management, performance, connectivity
    
HP
Published By: HP     Published Date: Aug 08, 2014
The deduplication is one of the fastest growing segments in storage. Accordingly, every vendor is telling their version of the deduplication story. With emerging technologies, it is difficult for IT managers to determine what the true IT benefits vs. marketing spin are. This brief document discusses several key areas of deduplication and uncovers six NetApp “challenges” customers should understand when evaluating HP StoreOnce Backup Systems and NetApp as their deduplication solution of choice.
Tags : 
data, storeonce, deduplication, storage, it benefits, backup systems, challenges, challenges, technologies
    
HP
Published By: HP     Published Date: Aug 11, 2014
A few years ago, two technologies emerged to dramatically improve the industry’s ability to protect data. The cost of disk drives came down, and deduplication technology was introduced. This breakthrough is sometimes referred to as Deduplication 1.0. Like any technology, you’d expect it to evolve over time. HP launched the HP StoreOnce deduplication technology roadmap in 2010 to do just that. The result? Deduplication 2.0 or what HP calls “Federated Deduplication”. This next generation deduplication addresses some of the issues inherent in existing deduplication solutions: performance, flexibility, and data management and not only that, when moving from your legacy storage backup systems, you can reduce the amount of your stored backup data by 95 percent or we’ll make up the difference with free disk capacity and support.
Tags : 
deduplication, storage, it benefits, backup systems, challenges, challenges, technologies
    
HP
Published By: HP     Published Date: Sep 04, 2014
AgilOne is a cloud-based predictive intelligence company that is experiencing a high growth rate. The company needed to find, and quickly deploy, a scalable storage solution to support its big data performance and future scalability requirements. Today, utilizing its 3PAR StoreServ storage solutions, AgilOne boasts a lower cost per terabyte, higher efficiency, and the ability to rapidly accommodate its new customers.
Tags : 
3par, agilone, cloud, intelligence, storage, solution, data, scalability
    
HP
Published By: HP     Published Date: Sep 04, 2014
Data Intensity is an enterprise cloud services provider focusing on Oracle applications. Founded in 2001, it currently has 240 employees and operates two data centers with about 1,200 virtual servers. They needed a flexible storage platform to handle growth of individual customer applications, such as Oracle ERP, with minimal downtime with low operating costs. Testing included storage systems from five different vendors to find a solution that was easy to administer and provides thin provisioning, snapshots, and rapid provisioning.
Tags : 
3par, storage, data, cloud, oracle, data intensity, virtual, solution
    
HP
Published By: Yottaa, Inc.     Published Date: May 09, 2014
Most sites aspire to faster page load times. But in order to improve, you first need goals based on real data. Only robust performance benchmarking will tell you how your user experience stacks up against competitors, and how performance varies in all the regions you sell to. This guide presents 9 key tips to ensure you get actionable insights from benchmarking performance against competitors, including common oversights and best practices. The guide also links to free tools that can help you to accomplish your benchmarking project. Download the eBook here!
Tags : 
benchmarking, performance monitoring, website testing, page load time, web performance, optimization, testing tools, free tools, content delivery network, front end optimization, pingdom, neustar, gtmetrix, keynote, gomez, e-commerce, mobile optimization, m-commerce, website development
    
Yottaa, Inc.
Published By: Lattice Engines     Published Date: Jun 19, 2014
Everyone is talking about predictive analytics these days, but what does it mean for B2B marketers? Find out how top demand generation professionals are using predictive applications powered by leading edge data science to optimize all stages of the funnel. Read Lattice Engine’s latest ebook, Decoding Predictive Marketing, and learn where predictive fits into your marketing mix.
Tags : 
lead scoring, marketing automation, predictive analytics, predictive marketing, predictive lead scoring, b2b marketing, lead nurturing, lead management, lead prioritization, lattice engines, demand generation, lead qualification, qualifying leads, score leads, lead score
    
Lattice Engines
Published By: Hewlett-Packard Company     Published Date: May 15, 2014
From core to cloud HP ProLiant Gen8 servers are transforming data center expectations and economics with the world's most intelligent servers. Learn how they deliver maximum performance and reliability while simplifying day-to-day management.
Tags : 
proliant, data centers, server
    
Hewlett-Packard Company
Published By: Fireblade     Published Date: Aug 21, 2014
Fireblade has developed an innovative behavioral approach to website security. It inspects users’ behavior and interactions with and relays the aggregated information to a central cloud, where a continual, real-time risk assessment process uses big data to discern legitimate users from attackers and abusers. Download this whitepaper to learn about this new approach.
Tags : 
fireblade, web application security, cloud security, interactions, cloud computing, hackers, attackers, cyberattack, central security cloud
    
Fireblade
Published By: Fusion-io, Inc.     Published Date: May 27, 2014
Fusion---iodelivers the world's data faster. From e---commerce retailers to the world’s social media leaders and Fortune Global 500 companies, companies are improving the performance and efficiency of their data centers with Fusion---io technology. ioControl Hybrid Storage from Fusion---io is ideal for customers seeking to virtualize mission---critical workloads, deliver high performance VDI, and control efficient application acceleration across shared storage environments.
Tags : 
fusion-io, infrastructure, hybrid storage, i/o gap, flash storage, hybrid storage, hybrid san, hybrid flash array, hybrid storage solution, storage area network, storage area network vendors, iscsi storage, qos, storage qos, automated tiering
    
Fusion-io, Inc.
Published By: Dell Software     Published Date: May 05, 2014
In this research survey, EMA analysts set out to identify and quantify the factors impacting IT organizations as companies increasingly embrace the Cloud.
Tags : 
dell, dell software, dell foglight, apm, application performance, hybrid cloud, cloud computing, data center, application integration, application performance
    
Dell Software
Published By: Dell Software     Published Date: May 05, 2014
This ENTERPRISE MANAGEMENT ASSOCIATES® (EMATM) Impact Brief details the new capabilities and positions this release within a broader industry APM story.
Tags : 
dell software, dell, dell foglight, foglight, apm, application performance mangement, virtual applications, cloud computing, cloud applications, web analytics, big data
    
Dell Software
Published By: AlienVault     Published Date: Oct 21, 2014
While vulnerability assessments are essential, considering vulnerability data in a vacuum greatly limits your ability to prioritize your action plan in an effective way. Without the context of which vulnerabilities are the most severe, which are actively being targeted, which are on critical assets, etc, you may waste time checking things off the list without actually improving security. Join us for this session to learn how to integrate threat intelligence into your vulnerability management strategy.
Tags : 
alienvault, threat intelligence, vulnerability assessments, vulnerability data
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Event logs provide valuable information to troubleshoot operational errors, and investigate potential security exposures. They are literally the bread crumbs of the IT world. As a result, a commonly-used approach is to collect logs from everything connected to the network "just in case" without thinking about what data is actually useful. But, as you're likely aware, the "collect everything" approach can actually make threat detection and incident response more difficult as you wade through massive amounts of irrelevant data. Join us for this session to learn practical strategies for defining what you actually need to collect (and why) to help you improve threat detection and incident response, and satisfy compliance requirements.
Tags : 
alienvault, troubleshooting operational errors, potential security exposures, satisfy compliance requirements
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
When dealing with ransomware threats like CryptoWall, which encrypt your data and demand payment to unlock it, spotting infections quickly is critical in order to limit the damage. AlienVault USM uses several built-in security controls working in unison to detect ransomware like CryptoWall, usually as soon as it attempts to connect to the command and control server. Watch this demo on-demand to see how AlienVault USM detects these threats quickly, saving you valuable clean-up time and limiting the damage from the attack.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Attackers are becoming increasingly skilled at planting malicious code on websites frequented by their desired targets, commonly called "watering hole" attacks. These can be very difficult to detect since they happen as users are going about their normal business. Join us for a live demo showing an example of such an attack, and how to detect it immediately using AlienVault USM. You'll learn: • Common browser vulnerabilities used to execute these attacks • What attackers do next to take control of the system • How to catch it before the attacker moves further into your network
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
Have you ever wondered how the bad guys actually get control of a system? And, how they convert that system into a data-syphoning droid? Join AlienVault security engineer, Tom D'Aquino as he walks you through the steps of a system compromise and how detect these nefarious activities at every stage. You'll learn: • How attackers exploit vulnerabilities to take control of systems • What they do next to find & exfiltrate valuable data • How to catch them before the damage is done with AlienVault USM Using a real-world example of a common vulnerability, Tom will show you how AlienVault USM gives you the evidence you need to stop an attack in its tracks.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Published By: AlienVault     Published Date: Oct 21, 2014
In this webinar, we'll cover the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment so you can: • Detect threats (known and emerging) • Identify vulnerabilities • Accelerate incident response • Identify policy violations • Simplify compliance management Join AlienVault to learn tricks for achieving unified security visibility in the shortest amount of time.
Tags : 
vulnerability, management, risk, prioritize, profile, environment, data, asset value, network, authenticated, unauthenticated, remediation, best practices, intelligence, scores, attacks, policy violations, compromise, ex filtration, exploit
    
AlienVault
Start   Previous    382 383 384 385 386 387 388 389 390 391 392 393 394 395 396    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.