> Technology > Security > High Availability
 

High Availability

High Availability is a system design protocol and associated implementation that ensures a certain absolute degree of operational continuity during a given measurement period.
Results 1 - 25 of 203Sort Results By: Published Date | Title | Company Name
White Paper Published By: Secunia     Published Date: Oct 12, 2011
This report investigates year-to-year trends since June 2011, including the evolving threat of software portfolios and global vulnerability data.
Tags : 
application security, authentication, email security, high availability, identity management
    
Secunia
Free Offer Published By: EMC     Published Date: Apr 18, 2013
See for yourself how easy it is to implement RSA Archer Business Continuity Management & Operations right out of the box. Try it free for 30 days, then take advantage of the special purchase offer through 7/31/13.
Tags : 
business continuity, disaster recovery, encryption, hacker detection, high availability
    
EMC
White Paper Published By: Emerson Network Power     Published Date: Nov 19, 2009
Download your free white paper today to get a better understanding of the trends driving data center design and management and how you can use them to reduce costs, improve equipment utilization and ensure high availability!
Tags : 
emerson network power, liebert, data center trends, data center design and management, high availability
    
Emerson Network Power
White Paper Published By: Vision Solutions     Published Date: Apr 11, 2008
Until recently, System i high availability solutions were reserved mostly for large enterprises. Now that high availability is dramatically easier to use and less expensive to own and manage, the picture has changed.
Tags : 
high availability, disaster recovery, vision, vision solutions, ibm
    
Vision Solutions
White Paper Published By: NaviSite     Published Date: Sep 02, 2014
This paper defines seven steps - sequentially - that have been tested and refined, to help you develop a cloud security plan.
Tags : 
cloud security, developing a cloud security plan, cloud security steps, managed cloud services, application security
    
NaviSite
White Paper Published By: Vision Solutions     Published Date: Aug 26, 2014
This paper debunks 7 virtualization DR myths
Tags : 
virtualization myths, disaster recovery, back up, high availability, virtual servers
    
Vision Solutions
White Paper Published By: SilverSky     Published Date: Apr 16, 2013
Threats to the security of your network will never completely go away, but the ability to prepare for, recognize and quickly remediate these threats should be a part of day-to-day company operations. This white paper gives you eight essentials for managing vulnerabilities in a network including internal and external assessments, how frequently you should run scans for threats and the importance of broadening testing beyond basic network services and operating systems.
Tags : 
vulnerability management, security, threat management, security, assessment
    
SilverSky
White Paper Published By: McAfee     Published Date: Mar 08, 2013
McAfee® Vulnerability Manager for Databases automatically discovers networked databases; determines if the latest patches have been applied; and tests for common weaknesses, making it easier to demonstrate compliance and better protect critical data.
Tags : 
database security, database vulnerability manager, database compliance, mysql security, database password security
    
McAfee
White Paper Published By: Symantec     Published Date: Nov 19, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 24, 2014
This Manifesto sets out a plan to reduce, as much as possible, the real and growing risks we face as individuals, businesses and governments, to make us cyber-resilient.
Tags : 
cyber resilience, reducing the risk of cyber attacks, how to become cyber resilient, anti spam, anti spyware
    
Symantec
White Paper Published By: Dell-Intel     Published Date: Oct 30, 2008
Dell servers have been optimized to help provide strong support for the latest ESX release, VMware ESX 3.5 Update 2, including enhanced performance for virtualized environments based on support for six-core Intel Xeon processors. Organizations that do not approach server virtualization with a clear plan risk developing a chaotic, inflexible infrastructure that wastes energy and resources.
Tags : 
hyper v, dell, intel, it infrastructure, virtualization
    
Dell-Intel
White Paper Published By: Oracle Corporation     Published Date: Apr 01, 2013
Discover how to accelerate database performance, handle change and growth in scalable, incremental steps, and deliver mission-critical data availability and protection with this unique commercial solution.
Tags : 
database, oracle, storage, data, data warehousing
    
Oracle Corporation
Case Study Published By: HP     Published Date: Jul 29, 2008
This case study highlights how one of the world's leading manufacturing companies employed a Mission Critical architecture to protect their most important systems. Learn how this customer achieved 99.99% availability of their systems for 4 straight years. As a result of adopting a high availability strategy, this HP customer saved 97 million Euros, by avoiding lost downtime.
Tags : 
mission critical, manufacturer, manufacturing, high availability, network architecture
    
HP
White Paper Published By: Vision Solutions     Published Date: Feb 18, 2008
Continuous member service is an important deliverable for credit unions, and. the continued growth in assets and members means that the impact of downtime is affecting a larger base and is therefore potentially much more costly. Learn how new data protection and recovery technologies are making a huge impact on downtime for credit unions that depend on AIX-hosted applications.
Tags : 
vision, high availability, ibm, aix, cdp
    
Vision Solutions
White Paper Published By: McAfee     Published Date: Mar 07, 2013
McAfee delivers a complete database security solution that protects your entire database environment efficiently and cost effectively, while maintaining optimum system performance and availability.
Tags : 
database security, database security compliance, database activity monitoring, virtual patching for databases, database compliance audit
    
McAfee
White Paper Published By: McAfee     Published Date: Jun 03, 2014
Discover how Advanced Evasions will break the security protection model being used by most organisations and learn how to better protect your business against these attacks.
Tags : 
advanced evasion techniques, hacking methods, protection, firewalls, network security
    
McAfee
White Paper Published By: Bit9     Published Date: Mar 07, 2013
Download this white paper and learn how to use a progressive, three-step approach to build trust, monitor activity and tailor protection to your enterprise and build an adaptive application control framework.
Tags : 
security, risk management, roi, cost reduction, enterprise
    
Bit9
White Paper Published By: Bit9     Published Date: Mar 07, 2013
In this whitepaper, Industry Analyst Frost and Sullivan examines today’s advanced threat landscape and recommends that organizations adopt a new approach to server security that is based on trust.
Tags : 
data breaches, data center, security, cyber threats, server
    
Bit9
White Paper Published By: Vision Solutions     Published Date: Dec 11, 2008
This paper presents an overview of IBM System i high availability to companies that are beginning to explore this powerful business continuity technology.
Tags : 
vision, high availability, ibm, monitoring, network architecture
    
Vision Solutions
White Paper Published By: Vision Solutions     Published Date: Dec 31, 2007
This paper presents an overview of iSeries high availability to companies that are beginning to explore this powerful business continuity technology. The critical components of high availability solutions are detailed in this paper, including data replication engines, system monitors, role swap capabilities, and the importance of autonomic processes.
Tags : 
disaster recovery, business continuity, disk backup, tape backup, data backup
    
Vision Solutions
Webinar Published By: VMware Dell     Published Date: Sep 29, 2008
Virtualization offers the promise of simplifying your IT infrastructure from the desktop to the data center. But can your virtual environment maintain the level of availability you need to keep your business running or to recover from a disaster?
Tags : 
vmware, dell, virtual data center, data protection, disaster recovery
    
VMware Dell
White Paper Published By: Asentria Corporation     Published Date: Sep 04, 2007
Organizations today depend upon their networks to increase productivity and reduce network infrastructure and maintenance costs. Accordingly, these networks must be secure and perform reliably in order to accommodate geographically dispersed users. Unplanned remote site downtime due to equipment failure or adverse environmental conditions can severely impair network service.
Tags : 
telecom alarms, snmp traps, remote site managers, terminal servers, remote access
    
Asentria Corporation
White Paper Published By: Symantec     Published Date: Jun 02, 2011
Download this white paper and learn how system-level protection can help your business keep data secure, available, and organized.
Tags : 
symantec, esg, data backup and recovery, system-level protection, data protection
    
Symantec
White Paper Published By: KACE     Published Date: Nov 14, 2006
This Enterprise Management Associates (EMA) white paper takes a close look at automated IT management, especially for  medium-sized businesses.
Tags : 
it management, ema, enterprise management associates, automated it, it automation
    
KACE
Start   Previous   1 2 3 4 5 6 7 8 9    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.