"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

loss

Results 251 - 275 of 499Sort Results By: Published Date | Title | Company Name
Published By: NetApp     Published Date: Oct 12, 2010
Read about the simplicity of architecting a robust infrastructure with Microsoft® Windows® Server 2008 R2 Hyper-VT in a virtual environment with NetApp® storage, to provide the ability to maintain HA for both the computing and storage resources between the primary and secondary sites and complete disaster recovery in the event of the loss of a whole site.
Tags : 
netapp, hyper v, microsoft exchange server, sql server, sharepoint server mixed workload, disaster recovery, data center, virtualization, storage virtualization, windows server, data center design and management
    
NetApp
Published By: IBM     Published Date: Oct 23, 2009
Listen to the recording, "CDPS Analyst Interview with John Webster of Illuminata," to see how the IBM Comprehensive Data Protection Express solution addresses the needs of midmarket companies that don't have adequate backup and recovery capabilities for their critical data.
Tags : 
data loss, ibm, data protection, backup and recovery, disaster recovery
    
IBM
Published By: Stratus Technologies     Published Date: Sep 19, 2007
For mission-critical IT, service outages and data loss pose serious consequences.  This white paper examines how availability management, disaster recovery and business continuity support one another and offers insight to find success at all of them.
Tags : 
business continuity, disaster recovery, high availability, stratus, stratus technologies, linux, sap, windows, service management
    
Stratus Technologies
Published By: Stratus Technologies     Published Date: Nov 11, 2009
You probably know Stratus Technologies' fault-tolerant ftServer systems and services for delivering uptime of nearly 99.9999% for the world's most essential applications. What you might not know is how effectively - and how simply - our mission-critical Support Services let your enterprise protect this industry-leading availability. Our focus on preventing downtime and data loss brings you much more than basic break-fix support. If you're used to average server support, get ready to experience meaningful differences. One example: It's not uncommon for Stratus Support Services to identify problems before our customers do. Stellar satisfaction ratings of 96% or higher show the value our clients place in these services.
Tags : 
activeservice, stratus, fault tolerance, ftserver, application management, virtual technician, project management
    
Stratus Technologies
Published By: Sophos     Published Date: Dec 17, 2012
It takes more than antivirus to stop today’s advanced threats. An endpoint protection solution is an important part of your IT security strategy to protect corporate assets.
Tags : 
endpoint, antivirus, anti-spyware, firewall, endpoint security, data loss prevention, security
    
Sophos
Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance, aveksa
    
Aveksa
Published By: Proofpoint     Published Date: Apr 22, 2010
This report summarizes the findings of Proofpoint's sixth-annual email security and data loss prevention study, including surprising statistics about how large companies manage the risks associated with outbound email, blog postings, media sharing sites, social networking sites, mobile Internet-connected devices and other electronic communications streams.
Tags : 
proofpoint, outbound email, data loss prevention, email security, social networking, electronic messaging, mobile email, mobile data systems, wireless messaging
    
Proofpoint
Published By: Proofpoint     Published Date: Apr 22, 2010
Learn more about Proofpoint Encryption, Proofpoint's easy-to-deploy and easy-to-use policy-based email encryption solution and why email encryption is a critical component of today's email security solutions.
Tags : 
proofpoint, enterprise data protection, email encryption, security, data loss prevention, encryption, messaging
    
Proofpoint
Published By: Dell Storage     Published Date: Jan 16, 2009
System reliability is a vital component in Storage Area Network (SAN) design that keeps your production environment operating and avoids data loss and downtime. But since SANs are built using both mechanical and electronic parts, component failures due to usage, environmental factors, or manufacturing defects are not uncommon. Even in completely redundant systems, controllers can fail, fans can stop operating, power supplies can burn out, and disk drives can degrade or fail.
Tags : 
dell, san, storage area networks, component failures, data loss, reliable san, building san, raid, storage, iscsi, storage management
    
Dell Storage
Published By: Cisco     Published Date: Jan 29, 2009
For small and medium-sized businesses (SMBs), the impacts of a disaster can result in loss of or lack of access to data, applications, and work facilities. Those with disaster recovery plans in place fared much better than those without such contingency plans.
Tags : 
cisco, disaster preparedness, medium-sized businesses, smb, contingency plans, business continuity, recovery management, data protection, failover, points of failure, workforce continuity plan, disaster recovery plan, disaster response, voip, security, disaster recovery
    
Cisco
Published By: Cisco     Published Date: Feb 13, 2009
This white paper details how continuous data protection for files is important in this current day where lost data can significantly affect productivity, customer satisfaction, and, ultimately, revenue.
Tags : 
cisco, data protection, network storage systems, data recovery, data loss, security, data management
    
Cisco
Published By: NeoSpire Managed Hosting     Published Date: Sep 01, 2009
In today's economy, companies are trying to assess if they can afford to become PCI compliant. What many of those same companies forget to consider whether they can afford not to be compliant. Since 2007, merchants who were found to be non-compliant with PCI DSS faced fines of $5,000 to $25,000 per month from Visa. It may seem expensive for merchants to install and maintain new security measures to become PCI compliant and validated, but these costs are only a fraction of what it would cost a company to be found in non-compliance or suffer a data breach. Learn more about PCI DSS compliance and how NeoSpire Managed Hosting can help.
Tags : 
pci compliance, neospire, pci dss faced fines, datalossdb.org, heartland payments, tjx companies, breach cardholder data, hardware, and software, achieving pci standards compliance, protect against security breaches, security management, security policies
    
NeoSpire Managed Hosting
Published By: Progress Software BTA Telecommunications     Published Date: Apr 09, 2009
Did you know that 61 telcos worldwide reported a loss of up to 10% of revenue due to order fallout? Why is this happening? How else is order fallout affecting companies? This report by Vanson Bourne, an independent research firm, examines the scope and nature of the problem. Business transaction assurance-making sure orders process successfully-may seem simple but it isn't. Learn about the challenges that telecommunications experts face and why current monitoring and management systems can't do the job.
Tags : 
progress software, telecommunications, telcos, telecom, business transaction, vanson, transaction failure, best practices, business process management
    
Progress Software BTA Telecommunications
Published By: SAS     Published Date: Aug 03, 2016
Failing to contain financial crime hits banks with the double impact of crime-related losses and fines imposed by regulators and law enforcement agencies. Depending on the magnitude of a bank’s failure to stem financial crime, fines can run into hundreds of millions of dollars – and even higher in exceptional cases. More importantly, institutions are keen to protect their brand from association with transnational organized-crime rings and scandals related to corruption.
Tags : 
best practices, productivity, finance, financial crime, security, business analytics, business intelligence
    
SAS
Published By: SAS     Published Date: Apr 25, 2017
Tax evasion is the largest economic crime in the world (in terms of monetary loss), costing trillions of dollars to governments around the globe. A 2011 study by The Tax Justice Network estimates that on a global scale, total tax evasion is in excess of US$3.1 trillion, or about 5.1% of world GDP.1 And that’s just the known tax evasion and noncompliance; it doesn’t include the underground economy and cash businesses.
Tags : 
    
SAS
Published By: SAS     Published Date: Apr 25, 2017
Insurers have long been plagued by fraud, error, waste, and abuse in health care payments. The costs are huge – amounting to as much as 25 percent of payments made. Today’s data management and analytics platforms promise breakthroughs by incorporating comparative and behavioral data to predict as well as detect loss in all its forms. To explore the opportunities and how insurers can capitalize on them, IIA spoke with Ben Wright, Sr. Solutions Architect in SAS’s Security Intelligence Global Practice.
Tags : 
    
SAS
Published By: SAS     Published Date: Oct 18, 2017
How much are fraud, error, waste and abuse costing your organization? Costs to insurers are huge – as much as 25 percent of payments made. But data management and analytics can save the day. This paper discusses how data can be used to predict and detect loss in all its forms.
Tags : 
    
SAS
Published By: Lumension     Published Date: Nov 19, 2010
Learn how removable device policy enforcement can mitigate these risks while enabling managed use of these necessary productivity tools.
Tags : 
lumension security, usb insecurity, universal serial bus, enterprise, policy, risk mitigation, productivity tool, data loss, data theft, malware, productivity
    
Lumension
Published By: Lumension     Published Date: Mar 30, 2011
Learn how to protect against what comes in your environment via USB in this Lumension white paper from Web Buyer's Guide
Tags : 
lumension, usb, malware, security, data loss, threat, cybersecurity, security management
    
Lumension
Published By: Lumension     Published Date: Jan 11, 2012
Learn the key steps to enhancing your security visibility so that you have a voice at the executive table and not just a seat.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security
    
Lumension
Published By: Lumension     Published Date: Jan 11, 2012
There is hope for IT administrators seeking to gain control over the Windows environment while still offering local admin rights to the user base.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, access control, application security
    
Lumension
Published By: Lumension     Published Date: Mar 31, 2012
This whitepaper will take an in-depth look at virtualization technologies, security risks, and virtualization technology management models.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security, virtualization
    
Lumension
Published By: Lumension     Published Date: Mar 31, 2012
Don't leave your endpoint unpatched and insecurely configured. Mitigate your endpoint risks by implementing these five tips that will help you keep endpoints patched and avoid preventable attacks.
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss, data theft, endpoint protection, compliance, outsourcing, cybercrime, data theft, web 2.0, workforce mobility, malware, encryption, data encryption, regulatory compliance, endpoint security, security, it management
    
Lumension
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search      

Special Report

In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory