EMC Corporation

Displaying 1-11 of 11 results

  • White Papers // Apr 2014

    The Current State of Cybercrime 2014: An Inside Look at the Changing Threat Landscape

    Web threats and fraud tactics continue to increase in number and sophistication as the profitability of cybercrime transforms the nature of the game. In 2013, phishing alone resulted in $5.9 billion in losses to global organizations, and three in four data breaches were attributed to financial or fraud motives. Cybercriminals...

    Provided By EMC Corporation

  • White Papers // Apr 2012

    Compliance Through RSA Security Management

    If you take the right approach and use the right tools, compliance doesn't have to be the struggle it currently is for many enterprises ? even though it continues to become more complex and stringent. This paper provides five steps to resolving the most fundamental compliance challenges, along with an...

    Provided By EMC Corporation

  • White Papers // Apr 2012

    Security Management

    This solution brief?on RSA?security?management explores an integrated approach to risk, operations and?incident management and addresses potential problems of tactical?security?management.

    Provided By EMC Corporation

  • White Papers // Apr 2012

    ESG Security Management Maturity Model

    The Enterprise Strategy Group has been actively following the information security market since 2003. During this timeframe, ESG has undertaken numerous surveys involving thousands of enterprise security professionals and conducted hundreds of interviews with CISOs and other senior security executives. Over the past few years, ESG has noticed change in...

    Provided By EMC Corporation

  • White Papers // Apr 2012

    EMA: Data Driven Security

    In this paper, Enterprise Management Associates (EMA) explores the convergence of these factors in the rise of Data-Driven Security. The range of data sources for such an approach are explored, along with the advantages of data-driven tactics that can vastly improve the effectiveness of threat detection and response, and the...

    Provided By EMC Corporation

  • White Papers // Jul 2011

    EMC VPLEX With IBM AIX Virtualization and Clustering

    This white paper explores implementing VPLEX storage in advanced AIX configurations using the IBM POWER platform. There are three major sections. First, VPLEX technology is introduced. The next major section covers virtualization with PowerVM, particularly I/O virtualization using Virtual I/O Server (VIOS). The third section discusses implementing local and distributed...

    Provided By EMC Corporation

  • White Papers // Aug 2010

    EMC Data Domain Data Invulnerability Architecture: Enhancing Data Integrity and Recoverability

    Behind all their added value, specialized storage systems are built on software and general-purpose computing components that can all fail. Some failures have an immediate visible impact, such as the total failure of a disk drive. Other failures are subtle and hidden, such as a software bug that causes latent...

    Provided By EMC Corporation

  • White Papers // Jun 2010

    Introduction to EMC Recover Point 3.3: New Features and Functions

    This white paper discusses EMC RecoverPoint version 3.4 software. This software locally and/or remotely replicates one or more SAN or iSCI volumes in one or more storage systems and maintains an online history of all changes to the Volumes. RecoverPoint enables you to bring databases and applications back online quickly...

    Provided By EMC Corporation

  • White Papers // Nov 2009

    Using VMware vSphere With EMC Symmetrix Storage

    This white paper discusses, and provides best practices for, the new features introduced with the release of VMware vSphere 4. Specifically, the features discussed include Storage VMotion, VMFS Volume Grow, VMFS Volume Copy Mounting, and the use of the Pluggable Storage Architecture that allows for the integration of PowerPath /...

    Provided By EMC Corporation

  • White Papers // Apr 2009

    How Services Are Helping Organizations Accelerate Adoption of Next-Generation Data Protection Solutions

    A perfect storm of expanding data volumes*, rising cost pressures, demanding recovery and compliance objectives, and infrastructure complexity is focusing new attention on data protection. Fortunately, next-generation backup, recovery, and archiving technologies are helping to address these issues, while significantly reducing costs, improving energy efficiency, and simplifying and automating operational...

    Provided By EMC Corporation

  • White Papers // Jan 2006

    Shoehorning Security into the EPC Standard

    The EPCglobal Class-1 Generation-2 UHF tag standard is certain to become the de facto worldwide specification for inexpensive RFID tags. Because of its sharp focus on simple \"License plate\" tags, it supports only the most rudimentary of security and privacy features, and essentially none of the cryptographic techniques that underpin...

    Provided By EMC Corporation

  • White Papers // Apr 2009

    How Services Are Helping Organizations Accelerate Adoption of Next-Generation Data Protection Solutions

    A perfect storm of expanding data volumes*, rising cost pressures, demanding recovery and compliance objectives, and infrastructure complexity is focusing new attention on data protection. Fortunately, next-generation backup, recovery, and archiving technologies are helping to address these issues, while significantly reducing costs, improving energy efficiency, and simplifying and automating operational...

    Provided By EMC Corporation

  • White Papers // Apr 2012

    Compliance Through RSA Security Management

    If you take the right approach and use the right tools, compliance doesn't have to be the struggle it currently is for many enterprises ? even though it continues to become more complex and stringent. This paper provides five steps to resolving the most fundamental compliance challenges, along with an...

    Provided By EMC Corporation

  • White Papers // Apr 2012

    Security Management

    This solution brief?on RSA?security?management explores an integrated approach to risk, operations and?incident management and addresses potential problems of tactical?security?management.

    Provided By EMC Corporation

  • White Papers // Apr 2012

    ESG Security Management Maturity Model

    The Enterprise Strategy Group has been actively following the information security market since 2003. During this timeframe, ESG has undertaken numerous surveys involving thousands of enterprise security professionals and conducted hundreds of interviews with CISOs and other senior security executives. Over the past few years, ESG has noticed change in...

    Provided By EMC Corporation

  • White Papers // Apr 2012

    EMA: Data Driven Security

    In this paper, Enterprise Management Associates (EMA) explores the convergence of these factors in the rise of Data-Driven Security. The range of data sources for such an approach are explored, along with the advantages of data-driven tactics that can vastly improve the effectiveness of threat detection and response, and the...

    Provided By EMC Corporation

  • White Papers // Nov 2009

    Using VMware vSphere With EMC Symmetrix Storage

    This white paper discusses, and provides best practices for, the new features introduced with the release of VMware vSphere 4. Specifically, the features discussed include Storage VMotion, VMFS Volume Grow, VMFS Volume Copy Mounting, and the use of the Pluggable Storage Architecture that allows for the integration of PowerPath /...

    Provided By EMC Corporation

  • White Papers // Jun 2010

    Introduction to EMC Recover Point 3.3: New Features and Functions

    This white paper discusses EMC RecoverPoint version 3.4 software. This software locally and/or remotely replicates one or more SAN or iSCI volumes in one or more storage systems and maintains an online history of all changes to the Volumes. RecoverPoint enables you to bring databases and applications back online quickly...

    Provided By EMC Corporation

  • White Papers // Aug 2010

    EMC Data Domain Data Invulnerability Architecture: Enhancing Data Integrity and Recoverability

    Behind all their added value, specialized storage systems are built on software and general-purpose computing components that can all fail. Some failures have an immediate visible impact, such as the total failure of a disk drive. Other failures are subtle and hidden, such as a software bug that causes latent...

    Provided By EMC Corporation

  • White Papers // Jul 2011

    EMC VPLEX With IBM AIX Virtualization and Clustering

    This white paper explores implementing VPLEX storage in advanced AIX configurations using the IBM POWER platform. There are three major sections. First, VPLEX technology is introduced. The next major section covers virtualization with PowerVM, particularly I/O virtualization using Virtual I/O Server (VIOS). The third section discusses implementing local and distributed...

    Provided By EMC Corporation

  • White Papers // Jan 2006

    Shoehorning Security into the EPC Standard

    The EPCglobal Class-1 Generation-2 UHF tag standard is certain to become the de facto worldwide specification for inexpensive RFID tags. Because of its sharp focus on simple \"License plate\" tags, it supports only the most rudimentary of security and privacy features, and essentially none of the cryptographic techniques that underpin...

    Provided By EMC Corporation

  • White Papers // Apr 2014

    The Current State of Cybercrime 2014: An Inside Look at the Changing Threat Landscape

    Web threats and fraud tactics continue to increase in number and sophistication as the profitability of cybercrime transforms the nature of the game. In 2013, phishing alone resulted in $5.9 billion in losses to global organizations, and three in four data breaches were attributed to financial or fraud motives. Cybercriminals...

    Provided By EMC Corporation