> Technology > Security > High Availability
 

High Availability

High Availability is a system design protocol and associated implementation that ensures a certain absolute degree of operational continuity during a given measurement period.
Results 201 - 204 of 204Sort Results By: Published Date | Title | Company Name
White Paper Published By: Cenzic     Published Date: Nov 29, 2006
The Cenzic Hailstorm® solution helps financial institutions comply with GLBA and other laws by automating risk assessment, checking for vulnerability to the injection of malicious code into Web servers, automating the testing of code and key controls during the software development process, and helping them respond to new vulnerabilities in the software development lifecycle.
Tags : 
application security, auditing, authentication, financial, compliance
    
Cenzic
White Paper Published By: KACE     Published Date: Nov 14, 2006
This Enterprise Management Associates (EMA) white paper takes a close look at automated IT management, especially for  medium-sized businesses.
Tags : 
it management, ema, enterprise management associates, automated it, it automation
    
KACE
White Paper Published By: Symantec     Published Date: Nov 02, 2006
IT administrators need to minimize downtime for critical IT services by rapidly recovering entire systems to dissimilar hardware platforms or virtual environments. Symantec Backup Exec System Recovery Server Edition combines the speed and reliability of disk-based, bare-metal Windows system recovery with dissimilar hardware restoration and lights-out operation.
Tags : 
backup, infrastructure, internetworking hardware, networking hardware, network management
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 02, 2006
The IT threat landscape has changed from individual hackers disrupting network operations to organized crime stealing confidential information. Antivirus technology must be joined by a coordinated, multilayered defense that includes proactive vulnerability-based intrusion prevention, file-based intrusion prevention, and inbound and outbound traffic control.
Tags : 
security, hacker detection, internet security, crimeware, spyware
    
Symantec
Start   Previous    1 2 3 4 5 6 7 8 9     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.