endpoint data

Results 1 - 25 of 120Sort Results By: Published Date | Title | Company Name
Published By: Dell     Published Date: May 09, 2017
The workplace is changing and the one-size-fits-all approach to technology is changing along with it. As a result, your organization may need to rethink how to keep productivity high, promote collaboration, delight employees with the latest devices all while keeping IT within budget. This interactive eGuide will be your one-stop resource to understand all the new innovation available in Dell’s latest notebooks, desktops, 2-in-1s and ecosystem that can keep your organization future-ready. Access the eGuide from Dell and Intel® and you will learn: • How the workplace and workforce is changing • What tools and solutions help IT go from maintenance to innovation • How innovation is changing notebooks, 2-in-1s, desktops and workstations • The latest Windows 10 features employees will be talking about • What you need to keep endpoints and data secure
Tags : 
    
Dell
Published By: Code42     Published Date: Apr 04, 2017
Download “The business of ransomware: What every CXO should know” to see how a modern approach to endpoint data protection can disarm this accelerating threat.
Tags : 
ransomware, cyber attack, recovery, cyber security, cyber criminals, ransomware as a service, cyberthreat, data breach
    
Code42
Published By: Code42     Published Date: Apr 04, 2017
Too often, organizations mistake electronic file sync and share as synonymous with endpoint backup, leaving critical data unprotected. In an ideal data management strategy, endpoint backup works alongside file sync and share to silently protect every version of every file. Together, the two technologies mitigate the growing risk of data loss to data breach, ransomware, or insider threat.
Tags : 
ransomware, cyber attack, recovery, cyber security, cyber criminals, ransomware as a service, cyberthreat, data breach
    
Code42
Published By: McAfee     Published Date: Mar 31, 2017
This paper reviews five use cases, ranging from accidental policy violations by an insider to malicious thefts by unknown applications or stolen credentials, and presents the measurable benefits of an integrated security solution and the capabilities of pervasive data protection.
Tags : 
unified data protection, data protection, pervasive data protection, optimized data lifecycle security, optimized data security
    
McAfee
Published By: Code42     Published Date: Apr 28, 2016
Endpoint data backup is the foundation of an effective enterprise data security strategy. With half of enterprise data living on the endpoints, the attack surface is wide and risk of data leakage, loss, theft and breach is great.
Tags : 
    
Code42
Published By: Commvault     Published Date: Jul 06, 2016
ENDPOINT DATA. It’s often one of the most forgotten aspects of an enterprise data protection strategy. Yet, content on laptops, desktops and mobile devices is among a company’s most valuable data even while it’s potentially at the greatest risk. According to IDC there will be some 1.3 billion mobile workers by 2015. However, only half of enterprises today are using some type of endpoint backup. That means that the volume of endpoint data that is in jeopardy is nothing short of significant. Download to read the buyer's checklist on endpoint data protection!
Tags : 
commvault, endpoint data protection, endpoint data, data protection, backup, encryption, data loss prevention, mobile app
    
Commvault
Published By: Code42     Published Date: Jan 12, 2016
Endpoint backup is more than a copy of your data stored in the cloud; it’s the antidote to everything that ails enterprise endpoints.
Tags : 
code42, data, backup, security, endpoint, endpoint backup, employee churn, endpoint data
    
Code42
Published By: Code42     Published Date: Jan 12, 2016
CrashPlan provides enterprise organizations with a way to view, manage and protect data from walking out the door.
Tags : 
code42, data, protection, churn, security, insider threat, employee churn, employee turnover
    
Code42
Published By: Dell     Published Date: Feb 04, 2016
Security risks have grown roughly in proportion to the meteoric growth in employee-owned mobile devices within the workplace. Meanwhile cyber-attacks are growing in sophistication and severity. According to data from a new IDG Research survey, these dynamics have IT decision makers scrambling to tighten and revise BYOD policies while addressing the holistic issue of endpoint security. Download this two-page paper detailing the IDG Research results and for expert advice on securing your organization’s data in an increasingly mobile world.
Tags : 
security risks, byod, cyber attacks, byod policies
    
Dell
Published By: Dell     Published Date: Jan 26, 2015
Forrester presents the relevant endpoint security data from their most recent surveys, with special attention given to those trends affecting SMBs (firms with 20 to 999 employees) and enterprises (firms with 1,000+ employees), along with analysis that explains the data in the context of the overall security landscape. As organizations prepare for the 2015 budget cycle, security and risk (S&R) professionals should use this annual report to help benchmark their organization’s spending patterns against those of their peers — while keeping an eye on current trends affecting endpoint security — in order to strategize their endpoint security adoption decisions. Please download this Forrester Research report, offered compliments of Dell, for more information.
Tags : 
dell, windows, endpoint security adoption, forrester, smbs, budget cycle, security
    
Dell
Published By: Code42     Published Date: Nov 19, 2015
Eliminate Data Loss Risk by Protecting All Enterprise Information
Tags : 
    
Code42
Published By: Code42     Published Date: Nov 19, 2015
Find out why using endpoint backup for data/device migrations is painless for users, faster for admins and better for users.
Tags : 
    
Code42
Published By: Code42     Published Date: Jul 07, 2015
Beyond baseline requirements like centralized management, user transparency, scheduled backups and the ability to restore to different devices, buyers must evaluate against endpoint data protection differentiators to ensure they purchase the most secure and scalable solution for their organization.
Tags : 
    
Code42
Published By: Code42     Published Date: Jul 07, 2015
Continuous, real-time data backup is the only viable solution for protecting all enterprise data while providing for a seamless migration process. But how do you achieve it?
Tags : 
    
Code42
Published By: Code42     Published Date: Oct 08, 2015
Join Code42 and featured speaker, IDC Program Vice President Laura DuBois to learn: - Up-to-the minute trends in endpoint security - The challenges and opportunities of growth in unstructured data - How IT can regain control without compromising end-user productivity -Table stakes for enterprise-grade endpoint backup
Tags : 
    
Code42
Published By: Code42     Published Date: Oct 16, 2015
Today’s organizations face a ballooning data management and risk problem. The use of laptops, tablets, workstations, servers and smartphones in the enterprise to create and store critical data is growing at an alarming rate.
Tags : 
backup, data, legal hold
    
Code42
Published By: Code42     Published Date: Oct 16, 2015
Find out why using endpoint backup for data/device migrations is painless for users, faster for admins and better for users.
Tags : 
backup, data, legal hold
    
Code42
Published By: Code42     Published Date: Mar 20, 2014
Enterprise IT teams face increasing challenges as the amount of valuable data living on endpoints continues to grow. Adding complexity is the mounting list of government regulations to which enterprises must comply. Read how endpoint backup can satisfy data collection and preservation requirements in a more streamlined and cost-effective manner than traditional e-discovery methods.
Tags : 
code 42, enterprise it, e-discovery, esi, endpoint backup, crashplan, data management
    
Code42
Published By: Code42     Published Date: Mar 20, 2014
Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn't provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data.
Tags : 
code42 software, endpoint backup, data migration, data loss, data management, data risk, encryption
    
Code42
Published By: Code42     Published Date: Mar 20, 2014
Traditional backup protected information stored on servers in data centers, and it was very manageable. A predictable, controlled, contained environment that underwent scheduled backups and updates. But then the inevitable happened: office employees began saving information to desktops; mobile workers began doing the same with laptops; and backup admins began losing control.
Tags : 
code42 software, enterprise endpoint backup, data center, server backup, security
    
Code42
Published By: Code42     Published Date: Mar 20, 2014
While consumerization offers many benefits for both end users and the enterprise in terms of convenience, efficiency and productivity, it presents important challenges for IT departments, especially in terms of endpoint backup and data security. To reap the benefits of consumerization while avoiding security and other pitfalls requires an understanding of the origins of this latest IT trend, its enduring presence and how the most successful enterprises have effectively embraced this new reality.
Tags : 
codefourtytwo software, code 42, endpoint backup, data protection, mobile data, mobile devices, mobile security
    
Code42
Published By: Code42     Published Date: Jan 12, 2016
Code42 legt seinen Schwerpunkt auf die Datensicherheit und--sicherung–und das aus gutem Grund. Auf einem einzigen Gera¨t werden heute knapp 500 Mal mehr Daten gespeichert als noch vor einem Jahrzehnt. Somit wachsen die Sicherheitsrisiken exponentiell und auch die Gefahr eines Datenverlusts steigt. Die meisten Notfallpla¨ne konzentrieren sich auf Server von Rechenzentren und Disk-Arrays, dabei wird vergessen, dass beinahe zwei Drittel der Unternehmensdaten sich jedoch außerhalb des Rechenzentrums auf Laptops befinden.
Tags : 
code42, endpoint, endpoint backup, endpoint data, data security, data protection
    
Code42
Published By: Intel Security     Published Date: Oct 21, 2015
Encryption solutions are a key component of data protection and are part of Intel Security protection suites.
Tags : 
mcafee, intel, data, security, protection, networking
    
Intel Security
Published By: Palo Alto Networks     Published Date: May 25, 2017
The security perimeter once familiar to the enterprise has become incredibly fragmented. Data and applications reside everywhere: on the network, endpoints and in the cloud. The cloud, in particular, is seeing huge growth with enterprises adopting these environments at a rapid pace. According to Gartner, 55 percent of large enterprises will successfully implement an all-in cloud SaaS strategy by 2025.1 Combined with an increasingly mobile and global workforce, and more importantly, increasingly distributed SaaS cloud environments, organizations are now faced with securing a multitude of applications, users, devices and networks – all hosting sensitive data that is critical to business growth, reputation and customer trust.
Tags : 
    
Palo Alto Networks
Published By: Palo Alto Networks     Published Date: Dec 02, 2016
Your business relies on a Microsoft® infrastructure that stretches from your network to the cloud to endpoints located around the world. In many ways, the success of your business relies on how secure your Microsoft infrastructure is. Your users do not care where the applications and data reside; they only care about getting their job done. SharePoint®, Skype for Business, or Active Directory® deployed on the network, in Azure®, or as part of your Office 365® subscription should have no impact on the success of your business.
Tags : 
palo alto, advanced enpoint protection, strategy works, company protection, security, microsoft
    
Palo Alto Networks
Start   Previous   1 2 3 4 5    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.