Data Protection Whitepapers


Sort by: Date | Company | Title


14 Tips for your Data Protection Plan
By Symantec | 14/10/2014
This paper outlines the 14 “best practice” tips to help manage the security threats you’re potentially facing. By downloading you’ll learn: • The steps you should follow to protect your organisation from security threats • The measures and policies you should have in place from start to finish • Plus, get an opportunity to get the full picture on the current internet security threat environment
Download this now


Why EMC backup for VNX
By EMC Corporation | 8/9/2014
If you're like most businesses, data loss is not an option. That's why you need a protection strategy for your VNX that includes backup. This whitepaper details the best options out there for enhanced data protection. For backup to be protection of the last resort, it must reside on reliable and cost- effective protection storage. With the industry's most efficient deduplication, you can store months of backups on disk and quickly recover the data you need when you need it. Built-in data integrity protection includes end-to-end data verification, fault-detection and self-healing, and ensures recovery every time.
Download this now


Protection storage architecture: The What, why and how
By EMC Corporation | 8/9/2014
This whitepaper details how Protection Storage Architecture can provide a data protection platform that can evolve with business and technical requirements. Over the next few years, IT will be faced with a new set of data protection challenges, centered on delivering multiple data protection services Transformational architecture not only enables backup teams to solve immediate tactical challenges but also helps IT teams keep business applications running Protection Storage Architecture has three core components: protection storage, data source integration and data management services (Tags: data protection, storage architecture, integration, data management, recovery, backup)
Download this now


EMC Best practices in data protection monitoring
By EMC Corporation | 8/9/2014
This ESG study focuses on why, when it comes to data protection, visibility is the most significant key to success, and how to achieve a truly unified view. · According to the 2013 IT Spending Intentions Survey, improving data backup and recovery was the #2 most important IT priority selected by respondents · Without far reaching visibility, infrastructure is guaranteed to miss backing up some servers, while potentially duplicating protection of others · The clarity gained by a unified view is necessary for proactively reporting protection to stakeholders and compliance to auditors
Download this now


The business value of data domain boost
By EMC Corporation | 8/9/2014
How can you effectively manage your data backups when IT budgets are flat or declining? This whitepaper explains the technical and business reasons why one new innovative technology will change the way you do backups. • Traditional backups are too slow, inefficient, and unreliable for the typical data centre of today. • The definition of insanity is continuing to do the same thing over and over and expecting different results. It’s time to stop the insanity with your backup strategy. • A new solution can dramatically increase backup performance, reliability, operational and disaster recovery, and better leverages current infrastructure
Download this now


Top reasons for entry-level storage and data protection from EMC
By EMC Corporation | 8/9/2014
This whitepaper pushes mid-sized businesses to rethink what’s possible for their data storage and protection, explaining how to experience enterprise-class performance at an entry-level price point. • A simple user interface can perform all block-and file-oriented operations • Advanced efficiency services, such as thin provisioning and file deduplication with compression, reduce initial capacity requirements by up to 50% • Continuous fault detection and self-healing ensure data stays correct and returns correctly so that data is recoverable and accessible throughout its lifecycle
Download this now


Key Communications Systems Are Always Available, Highly Responsive for Global Mining Company
By F5 Networks | 16/7/2014
Mining company Teck Resources wanted to ensure high availability and responsiveness for its critical employee communications systems. To achieve this goal, Teck chose a comprehensive F5 traffic management and secure access solution that provides high availability and give users a more responsive experience.
Download this now


Protecting Against Application DDoS Attacks : A Three-Step Solution
By F5 Networks | 16/7/2014
Today’s security threats increasingly involve application-layer DDoS attacks mounted by organized groups of attackers to damage web-facing applications by exhausting resources. F5 BIG-IP ASM provides application-layer protection against DDoS attacks.
Download this now


DDoS Protection: Recommended Practices
By F5 Networks | 16/7/2014
A DDoS attack can be a stressful engagement where parts of the network will be unresponsive and equipment may be failing all around. That is not the time to be planning a defense—preparing your network applications during “peacetime” will go a long way to helping you mitigate the attack in the future.
Download this now


Rackspace Hosting Links Dedicated Servers to Cloud for Maximum Scalability and Flexibility
By F5 Networks | 16/7/2014
Rackspace Hosting, the world’s leading specialist in hosting and cloud computing, wanted to offer its customers an easy way to link dedicated managed servers to cloudbased servers. The company used Application Delivery Networking devices from F5 to help build a hybrid service called RackConnect.
Download this now