> Technology > Security > High Availability
 

High Availability

High Availability is a system design protocol and associated implementation that ensures a certain absolute degree of operational continuity during a given measurement period.
Results 76 - 100 of 203Sort Results By: Published Date | Title | Company Name
White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
The WebPulse delivers fast and effective Web 2.0 threat protection for 75 million users worldwide. Find out more about how WebPulse can protect you!
Tags : 
webpulse, defense, malware, security, protection
    
Blue Coat Systems
White Paper Published By: EdgeWave     Published Date: Oct 15, 2011
In this white paper, you'll learn top email threats beyond spam in the age of blended threats and what you can do to protect your business.
Tags : 
web filter for enterprise, web security, email security, messaging security, spam
    
EdgeWave
White Paper Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Download Protecting Users From Firesheep and other Sidejacking Attacks with SSL to learn how to avoid HTTP attacks.
Tags : 
verisign, firesheep, sidejacking, attacks, security
    
VeriSign Authentication Services, now a part of Symantec Corp.
Case Study Published By: Secunia     Published Date: Oct 12, 2011
This study identifies the 3rd party program vulnerabilities and the threat they represent.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security
    
Secunia
White Paper Published By: Secunia     Published Date: Oct 12, 2011
This report investigates year-to-year trends since June 2011, including the evolving threat of software portfolios and global vulnerability data.
Tags : 
application security, authentication, email security, high availability, identity management
    
Secunia
White Paper Published By: Secunia     Published Date: Oct 12, 2011
Measurements within this white paper demonstrate that an intelligent patching strategy is an effective approach for reducing vulnerability risks.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security
    
Secunia
White Paper Published By: Secunia     Published Date: Oct 12, 2011
This paper discusses the limitations of security and highlights how cybercriminals can achieve their goals without administrative access.
Tags : 
vulnerability assessment, internet security, windows patching, exploit definition, endpoint security
    
Secunia
Webinar Published By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down
    
Absolute Software
Webinar Published By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down
    
Absolute Software
White Paper Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This white paper shows how integrated security suites can help organizations achieve high security and compliance with internal and external mandates, while also providing lower out-of-pocket costs, simplified management, and no compatibility issues.
Tags : 
fingerprint authentication, identity management, identity protection, data security, identity theft
    
DigitalPersona UK
White Paper Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper examines the common misconceptions about full disk encryption.
Tags : 
digital persona, encryption, myths, fingerprint authentication, identity management
    
DigitalPersona UK
White Paper Published By: DigitalPersona UK     Published Date: Jul 21, 2011
This whitepaper takes a deeper look at the steps you can take to protect your critical data and provide secure access to that data via the cloud to improve your security posture and reduce cost.
Tags : 
end point security, digitalpersona, saas, security as a service, cloud
    
DigitalPersona UK
White Paper Published By: Symantec     Published Date: Jun 02, 2011
Learn how Symantecs SBE Solutions faired when benchmarked by PassMark Software.
Tags : 
symantec sbe solutions, passmark software, performance testing, small business, endpoint protection security software
    
Symantec
White Paper Published By: Symantec     Published Date: Jun 02, 2011
Download this white paper and learn how system-level protection can help your business keep data secure, available, and organized.
Tags : 
symantec, esg, data backup and recovery, system-level protection, data protection
    
Symantec
White Paper Published By: Symantec     Published Date: Jun 02, 2011
Download this survey now to understand the attitudes and practices of SMBs toward disaster preparedness.
Tags : 
symantec, smb, disaster prepardness survey, backup and recovery, data protection
    
Symantec
White Paper Published By: IBM Corp     Published Date: May 31, 2011
Unique Express implemented a comprehensive Omnix Transport Solution running on an IBM® System x® server. The end result was a dramatically better management of driver and vehicle resources, saving tens of thousands of dollars per year.
Tags : 
unique express, computer-based transport solution, ibm system x server, omnix software, high availability
    
IBM Corp
White Paper Published By: EMC Corporation     Published Date: May 27, 2011
This ESG white paper confirms that momentum continues to build around server virtualization. Learn about an in-depth survey of 463 senior IT professionals in both large midmarket and enterprise-class organizations in North America and resulting trends.
Tags : 
enterprise strategy group, esg, emc, backup and recovery, enterprise applications
    
EMC Corporation
White Paper Published By: Emerson Network Power     Published Date: Dec 14, 2010
Learn best practices for optimizing critical systems for cloud deployment in existing facilities, including optimizing power architectures for high availability.
Tags : 
emerson network power, liebert, dcim, data center infrastructure management, cloud computing
    
Emerson Network Power
White Paper Published By: Emerson Network Power     Published Date: Nov 02, 2010
The ten steps outlined in this paper represent proven strategies for improving data efficiency and availability and create the foundation for holistic data center infrastructure management.
Tags : 
virtualization, high availability, emerson power network, liebert, data center infrastructure management
    
Emerson Network Power
White Paper Published By: Emerson Network Power     Published Date: Nov 19, 2009
Download your free white paper today to get a better understanding of the trends driving data center design and management and how you can use them to reduce costs, improve equipment utilization and ensure high availability!
Tags : 
emerson network power, liebert, data center trends, data center design and management, high availability
    
Emerson Network Power
White Paper Published By: Neverfail Group     Published Date: Aug 21, 2009
This document introduces Neverfail Heartbeat, a technology that enables the protection of applications against many potential failures, including application failure, operating system failures, and hardware, network or site failures, at a reasonable cost.
Tags : 
microsoft, ms windows, windows, application security, cost control
    
Neverfail Group
White Paper Published By: Neverfail Group     Published Date: Aug 21, 2009
This white paper discusses Windows high availability, with a focus on business drivers and benefits. Cost and real-world benefits are considered the two most important elements in choosing the right high availability solution.
Tags : 
database, microsoft, ms windows, windows, application security
    
Neverfail Group
White Paper Published By: McAfee Inc     Published Date: Aug 19, 2009
If you're in IT, you understand all too well the challenge of competing priorities. Security is important-but so are all of your other jobs. That's why McAfee offers a practical approach to managing security and lays out an approach for managing security in just 15 minutes a day. Read more.
Tags : 
mcafee, security, pci, hipaa, epolicy orchestrator
    
McAfee Inc
White Paper Published By: Stratus Technologies     Published Date: Jun 16, 2009
"Time is money. You can't do business if you can't access your applications. I won't settle for anything less than 99.99% application availability." Steven Sommer, veteran CIO/CTO There is no aspect more critical to a business than the ability of its end users, customers, business partners and suppliers to have high availability access the corporate applications. If applications are unavailable, business ceases. And corporations know it.
Tags : 
c-level, stratus, itic, end users, customers
    
Stratus Technologies
White Paper Published By: VMware     Published Date: Mar 16, 2009
Mid-sized businesses have long struggled to protect their IT systems. Many firms are inadequately protected and mistakenly think that a disaster is rare and won’t happen to them anytime soon. This custom Yankee Group Report uses customer interviews, statistical data and Yankee Group SMB survey results to examine disaster recovery (DR) issues.
Tags : 
vmware, disaster recovery, smb, it system, it infastructure
    
VMware
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.