White Papers by Topic: Security

Resources available: 193

Why Organizations Need LTO-5 Today

For years, tape storage systems have played a key role in efforts to store data for backup and retrieval, archiving, and contingency planning purposes. More recently, tape has been called on to help preserve and safeguard data to meet data retention laws and regulations.

Simplifying Entry-Level Backup/Recovery

Every data center, whether enterprise or SMB, is currently experiencing a period of unprece-dented growth within their data storage environ-ment. Most are expanding their information capa-city by 50% to 70% annually, while many are doubling capacity in the same period. It is an absolute truth that storage requirements will continue to increase in 2010, and beyond.

Need a Long-Term Archive Solution?

Along with their iLayer software, Quantum has delivered an archive solution that reduces the total cost of ownership for the IT infrastructure while at the same time simplifying data protection. To learn more about the Scalar i6000, please read on.

Taking a S.O.F.T. Approach Towards Enterprise Mobility Deployments

The impact of mobility as a transformative technology is unlike most other waves giving how it has as much if not more of an impact on the workforce than the workplace. Given this uniqueness, traditional approaches to assessing the merit and value of deploying and managing mobility solutions can often create "analysis paralysis." This document explores a different approach to planning for mobility in your work place and key considerations for managing mobility deployments.

A Guide to Deploying Application-enabled Smart Phones in the Enterprise

Companies must understand the issues around security and manageability of these devices, and the need to supplement the consumer-oriented device vendor supplied tools which often prove inadequate. A majority of enterprises will soon diversify their end user offerings in smart phone devices, including enabling user-liable devices to connect to their systems.

Mobilizing Business Applications with McAfee

The McAfee® Enterprise Mobility Management (McAfee EMM®) solution provides the foundational underpinnings necessary for an organization to succeed with their application mobilization initiatives.It reassures enterprises that their data is protected and their mobile workforce is productive by enablingthem to connect to enterprise applications securely while providing a scalable architecture that can seamlessly manage up to thousands of mobile users.

Prevent Zero Day Attack with Application Whitelisting

Learn how this US Military Command Center's cyber attack exercise can get your security plan in shape. During a recent exercise, this US military command center discovered serious vulnerabilities in their existing security solutions. Despite being on high alert, personnel accidentally introduced malware that immediately broke through all their layers of defense - except one: Bit9 Parity's Application Whitelisting.

US Government Prevents Malware with Application Whitelisting

This high profile US government agency handles extremely sensitive financial data, and as such, must maintain the highest standards for safety, integrity and security of its systems. Faced with a barrage of malware and under constant attack, this agency banks on Bit9's award-winning application whitelisting solution to eliminate unauthorized software, keeping systems secure and significantly reducing support costs.

Stop the Advanced Persistent Threat

The cyber attacks targeting Google and others rang a loud wakeup call: the reactive approach of blacklisting known viruses is no match for today's advanced threats. Gartner's Neil MacDonald wrote, "Application Whitelisting at the endpoints would have stopped these attacks." Download this Microsoft MVP-authored whitepaper to learn how this proactive approach ensures only trusted software runs, rendering new malware useless.

Stop the Advanced Persistent Threat

The cyber attacks targeting Google and others rang a loud wakeup call: the reactive approach of blacklisting known viruses is no match for today's advanced threats. Gartner's Neil MacDonald wrote, "Application Whitelisting at the endpoints would have stopped these attacks." Download this Microsoft MVP-authored whitepaper to learn how this proactive approach ensures only trusted software runs, rendering new malware useless.

©1994-2014 Infoworld, Inc.