Disaster Recovery A Disaster Recovery Plan covers the data, hardware and software critical for a business to restart operations in the event of a natural or human-caused disaster. It should also include plans for coping with the unexpected or sudden loss of key personnel.
Results 1 - 25 of 340 | Sort Results By: Published Date | Title | Company Name |
Intel and McAfee Solutions for Enabling Secure Cloud Adoption
By: McAfee
Published Date: Feb 06, 2013
Insight and control to secure your dynamic cloud environment at every infrastructure layer Tags : | cloud security, cloud computing, public cloud security, private cloud security, cloud security policy enforcement | |
| |
|
|
Focus on 5: Read the Top 5 SIEM issues organizations face today
By: McAfee
Published Date: Feb 06, 2013
Read about the top five issues McAfee customers face with security information and event management (SIEM) and see corresponding use cases and customer case studies. Tags : | big security data, siem, mcafee global threat intelligence, mcafee gti, mcafee risk advisor | |
| |
|
|
Information Security is Becoming a Big Data Analytics Problem
By: McAfee
Published Date: Feb 06, 2013
Gartner defines "big data analytics" as the practices and technology used to pursue emerging and divergent pattern detection as well as enhance the use of previously disconnected information assets. Tags : | big data analytics, gartner, big data, big security data, advanced targeted attacks | |
| |
|
|
Endpoint Security Best Practices Survey Results Whitepaper
By: Symantec
Published Date: Jan 31, 2013
Symantec commissioned Applied Research to field the 2012 Endpoint Security Best Practices Survey to see how more than 1,400 IT professionals around the world are coping with endpoint security. Tags : | endpoint protection, security, best practices, survey, anti spam | |
| |
|
|
PassMark Report: Symantec Endpoint Protection vs. Windows Defender Performance Benchmarks
By: Symantec
Published Date: Jan 31, 2013
PassMark Software conducted objective performance testing on Windows Defender and Symantec Endpoint Protection, on Windows 8 in August 2012. Read this comparison report for detailed results from performance tests. Tags : | endpoint protection, security, performance test, comparison, windows 8 | |
| |
|
|
Business-centric DLP
By: McAfee
Published Date: Jan 28, 2013
Re-think your DLP This white paper discusses how a new DLP model aligns data discovery, classification, policy management, and security controls to your business requirements and processes. Tags : | dlp, business-centric dlp, dlp business rules, discovery, classification | |
| |
|
|
ESG Research Final Sponsor Report Security Management and Operations
By: HP - Enterprise
Published Date: Jan 24, 2013
This report details the current state of the security management market and what to expect moving forward. Tags : | security, testing, security controls, security management, tools | |
| |
|
|
Security for a Faster World - Tech Dossier
By: HP - Enterprise
Published Date: Jan 24, 2013
Business today is driven by a global economy that generates an unprecedented volume, variety, and velocity of data. Security needs to adapt to a world thats evolving faster than ever before. Read this dossier to find out more. Tags : | consumerization, byod, risk management, security, anti spam | |
| |
|
|
eBook: Achieve Complete Security
By: HP - Enterprise
Published Date: Jan 24, 2013
This eBook will help you to assess where you currently are in the security landscape, where youre still unprotected and what you need to do complete your security portfolio. Tags : | security, network security, enterprise, infrastructure, best practices | |
| |
|
|
eBook: Understand and Defend Against Risk
By: HP - Enterprise
Published Date: Jan 24, 2013
This eBook will help you to assess where you currently are in the security landscape, where youre still unprotected and what you need to do complete your security portfolio. Tags : | security, compliance, mobile, tablets, byod | |
| |
|
|
Providing Security for Software Systems in the Cloud
By: HP - Enterprise
Published Date: Jan 24, 2013
This paper details risks to software deployed in the cloud and what steps to take to mitigate that risk. Tags : | cloud, security, attacks, risk, virtualization | |
| |
|
|
Gartner Magic Quadrant for Content-Aware Data Loss Prevention
By: McAfee
Published Date: Jan 23, 2013
DLP solutions must move beyond simple keyword matching and regular expressions. Learn how Gartner evaluates DLP providers and why McAfee is again a leader in the 2013 Gartner MQ for Content-Aware DLP.
gipoco.com
is neither affiliated with the authors of this page or responsible
for its contents. This is a safe-cache copy of the original web site.
gipoco.com
is neither affiliated with the authors of this page nor responsible
for its contents. This is a safe-cache copy of the original web site.
|
| |