Data Management

Big Data, Hadoop, and analytics help unearth valuable patterns in business information. But without proper management, backup, archiving, and protection, you're taking an unacceptable risk.

  • White Papers // Apr 2015

    EMM: Ovum Decision Matrix

    See where Ovum places the focus on EMM for 2015 and the vendors with the vision and executional ability to deliver.

    Sponsored By IBM

  • White Papers // Apr 2015

    Aragon Research Globe for Mobile Content Management (MCM)

    For a deeper dive into the EMM shift, Aragon sheds light on the need for secure and managed sharing of content to mobile devices.

    Sponsored By IBM

  • Webcasts // Jun 2015

    On-Demand Webcast: How to put IBM Watson to work for powerful information access and insights

    Most organizations struggle to deliver the information and insights their front-line staff need for top performance. The challenges that must be overcome are the amount of information that needs to be digested; the fact that it is scattered among many different silos and across hybrid cloud infrastructures; and the...

    Sponsored By IBM

  • White Papers // Jul 2013

    Beyond the Next Generation: Putting Advanced Network Security To Work

    Driven by demands to unify and extend protection across a broad spectrum of threats, EMA sees in this trend the rise of Converged Network Security (CNS) systems that integrate a wide range of capabilities and break down silos in network defense more than ever before. Scott Crawford, Managing Research Director,...

    Sponsored By IBM

  • White Papers // Aug 2014

    IBM Threat Protection System

    IBM Threat Protection System is designed to proactively and dynamically address today’s tough enterprise security challenges - with an integrated, contextually-aware security approach that builds in next-generation prevention, comprehensive detection, and automated response capabilities.

    Sponsored By IBM

  • White Papers // Jun 2015

    Five Strategies for Modern Data Protection

    Data growth, data center consolidation, server virtualization, and cloud services are wreaking havoc with conventional approaches to backup and recovery. This concise white paper presents five strategies for data protection - from deduplication to automation to granular recovery - that will not only help solve your current data management challenges...

    Sponsored By CommVault

  • White Papers // Jun 2015

    10 Signs that You Need a Modern Data Protection Solution Checklist

    Your business cannot survive without data management and protection, but getting control of rapidly growing and increasingly distributed information silos is a huge challenge. Infrastructures are growing more complex, virtualization and cloud create more obscurity, and BYOD creates dozens if not hundreds of new endpoints to protect. Legacy backup methods...

    Sponsored By CommVault

  • White Papers // Apr 2014

    Five Fundamentals of Virtual Server Protection

    Server virtualization brings many well-known benefits, including cost efficiencies, management automation, and improved agility. Most enterprises are already invested heavily in virtualization technologies, but with these new operating models come challenges to data management and infrastructure protection. This whitepaper outlines five important considerations that must be addressed in order to...

    Sponsored By CommVault Systems

  • White Papers // Apr 2014

    Five Important Questions to Ask Before You Renew With Your Legacy Backup Software Provider

    Over the last five years, many companies have re-signed with their legacy backup solution providers because the benefits of changing were not obvious. But data and information management and protection technologies are growing far more complex and dynamic than they’ve ever been, and new innovations can supply major advantages and...

    Sponsored By CommVault Systems

  • White Papers // Jul 2015

    What does better storage performance mean for your business? – EMC XtremIO

    XtremIO develops enterprise data storage systems based completely on random access media such as flash solid state drives (SSDs). By leveraging the underlying abilities of random access media, XtremeIO delivers unparalleled levels of performance, ease of use, operational efficiency and other advanced storage features. Sub-millisecond response times at scale for...

    Sponsored By EMC

  • White Papers // Mar 2015

    Top 10 Tips for Cyber Resilience

    Symantec has identified the top 10 tips to secure your business against cyber risk and threats. Read this one page report to get insights and recommendation from one of the most trusted brands in Cyber Security - Symantec.

    Sponsored By Symantec

  • White Papers // Jul 2015

    Solution brief: implementing the right security strategy now

    Recent malware incidents have shown how costly and damaging cyber attacks can be: attacks may not necessarily be successful, but when attackers do find their way inside an organisation’s systems, a swift, well-prepared response can quickly minimise damage and restore systems before significant harm can be caused. In order to...

    Sponsored By Symantec

  • White Papers // Jul 2015

    EU General Data Protection Regulation (Dutch)

    After several years of negotiations, sometime towards the end of 2015 will see the introduction of the most important piece of privacy legislation unveiled by the EU for 20 years, the long-awaited General Data Protection Regulation (GDPR). Officially, it’s an overhaul and extension of rules and principles set out in...

    Sponsored By Symantec

  • White Papers // Jul 2015

    Symantec Identity: Access Manager - Bridging The Gap Between IT & Business

    Single Sign-On with strong authentication, access control, and user management for cloud-based apps. Learn More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    State of Privacy: The Data Trust Gap

    7000 people in Europe were asked about their feelings towards the privacy of their personal data. Learn More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    EU General Data Protection Regulation (German)

    After several years of negotiations, sometime towards the end of 2015 will see the introduction of the most important piece of privacy legislation unveiled by the EU for 20 years, the long-awaited General Data Protection Regulation (GDPR). Officially, it’s an overhaul and extension of rules and principles set out in...

    Sponsored By Symantec

  • White Papers // Jul 2015

    EU General Data Protection Regulation

    After several years of negotiations, sometime towards the end of 2015 will see the introduction of the most important piece of privacy legislation unveiled by the EU for 20 years, the long-awaited General Data Protection Regulation (GDPR). Officially, it’s an overhaul and extension of rules and principles set out in...

    Sponsored By Symantec

  • White Papers // Jul 2015

    EU General Data Protection Regulation (French)

    After several years of negotiations, sometime towards the end of 2015 will see the introduction of the most important piece of privacy legislation unveiled by the EU for 20 years, the long-awaited General Data Protection Regulation (GDPR). Officially, it’s an overhaul and extension of rules and principles set out in...

    Sponsored By Symantec

  • White Papers // Jul 2015

    The Evolution of Data Privacy

    Today most organizations handle personal, and other sensitive information. The GDPR will force businesses to take precautions in processing personal data to a new level. It will pay to remember for which data you are Data Controller and Data Processor, bearing in mind you may be both. Read More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    Symantec: Internet Security Threat Report 2015 (Dutch)

    This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longer adequate for today’s threats. Learn More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    Symantec: Internet Security Threat Report 2015 (Spanish)

    This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longer adequate for today’s threats. Learn More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    Symantec: Internet Security Threat Report 2015 (French)

    This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longer adequate for today’s threats. Learn More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    Symantec: Internet Security Threat Report 2015 (Italian)

    This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longer adequate for today’s threats. Learn More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    Symantec: Internet Security Threat Report 2015 (German)

    This guide will provides a four pillar security framework.The framework gives a basis for assessing the maturity of your security program.Taking a preventative approach is no longer adequate for today’s threats. Learn More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    Web Security Threat Report (Dutch)

    Symantec has the most comprehensive source of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Read More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    Web Security Threat Report (Portuguese)

    Symantec has the most comprehensive source of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Read More

    Sponsored By Symantec

  • White Papers // Jul 2015

    Web Security Threat Report

    Symantec has the most comprehensive source of Internet threat data in the world through the Symantec Global Intelligence Network, which is made up of more than 41.5 million attack sensors and records thousands of events per second. Read More..

    Sponsored By Symantec

  • White Papers // Jul 2015

    Always On SSL - Symantec Guide (Portuguese)

    Online attacks are becoming more frequent and increasingly easy to execute. Organisations around the world are under increasing scrutiny, to ensure online transactions involving confidential data are secure. Take your organisation’s security to the next level with Always On SSL.

    Sponsored By Symantec

  • White Papers // Jul 2015

    The Hidden Costs Of Self-Signed SSL Certificate (German)

    Download this white paper, The Hidden Costs of Self-Signed Certificates, to read about the true total cost of ownership for self-signed SSL, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. You'll also learn about risk factors such as how self-signed certificates can increase...

    Sponsored By Symantec

  • White Papers // Jul 2015

    The Hidden Costs of Self-Signed SSL Certificates ( French)

    Download this white paper, The Hidden Costs of Self-Signed Certificates, to read about the true total cost of ownership for self-signed SSL, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor. You'll also learn about risk factors such as how self-signed certificates can increase...

    Sponsored By Symantec

  • White Papers // Aug 2014

    Manage Identities & Access for Continuous Compliance & Reduced Risk

    Identity and access management governance helps determine who has authorized access to what resources, for what purpose and for how long. IAM governance from IBM provides value beyond risk control, with accountability and transparency for user entitlements throughout the user lifecycle.

    Sponsored By IBM

  • Videos // Jun 2015

    EMC on Three Steps to IT Transformation - Video

    Watch to learn about EMC’s practical and straightforward three-step vision for helping you navigate unprecedented business transformation fuelled by technology mega trends: cloud, mobile, social and big data. All businesses need to transform to ensure they survive and grow with IT at the centre of this shifting landscape. The challenge...

    Sponsored By EMC

  • Research // Jun 2015

    Infographic - Seven considerations about IT and data protection that can redefine your business

    This infographic analyses the role of IT when it comes to storage and data protection, why enterprise information is number-one business asset that should be listed on the company balance sheet, how organisations that redefine data protection can transform what’s possible for their businesses, and what this transformation looks like...

    Sponsored By EMC

  • White Papers // Jun 2015

    University of San Carlos (USC) turns to Sophos for simple, comprehensive protection of its campus network

    USC is the premier university in Cebu and one of the top 10 leading universities in the country ranked by the International/World QS rating among the top 300 universities in Asia. Learn how Sophos helped USC achieved a resource-friendly security solution with lower total cost of ownership by standardizing on...

    Sponsored By Sophos

  • White Papers // Jun 2015

    Find the best protection for your business in network security

    Unified threat management (UTM) simplifies network security and data protection. It integrates multiple security capabilities in one platform, all controlled by a simple management console. Learn what a modern UTM can do for you and evaluate solutions to keep your network secure with this Network Protection and UTM Buyers Guide.

    Sponsored By Sophos

  • Research // Jun 2015

    Magic Quadrant for Deduplication Backup Target Appliances

    Deduplication backup target appliances have played an instrumental role in reducing or eliminating tape for backup. This Gartner report analyses the performance of different vendors, and describes the advantages of EMC’s Data Domain for supporting and integrating backup software and enterprise applications, allowing application owners to manage their own backup/recovery....

    Sponsored By EMC

  • White Papers // Aug 2014

    Frost & Sullivan awards IBM 2014 Customer Value Leadership Award for Mobile Identity and Access Management Solution

    This Frost & Sullivan best practices research paper details why IBM have been provided their 2014 Customer Value Leadership in the Mobile Identity and Access Management because of IBM's outstanding performance.

    Sponsored By IBM

  • White Papers // Jun 2015

    Cloud Compitung: A Silver Bullet For Finance?

    The benefits of cloud computing—a high return on investment, greater staff efficiencies, optimization of IT resources, and enhanced visibility and access to information— have piqued the interest of CFOs and finance leaders who are actively evaluating the risks versus the rewards of the cloud delivery model. Read more...

    Sponsored By Workday

  • White Papers // Jun 2015

    Data Protection: Quality Plus Fast ROI

    Too many organizations today struggle with backup and recovery solutions that not only fail in their primary mission of reducing the risk of data loss but also cost far too much — in wasted IT staff time, reduced employee productivity, monthly fees and ever-growing storage requirements. You need reliable, automated...

    Sponsored By Dell

  • White Papers // Jun 2015

    Downtime Costs How Much? Calculating the Business Value of Disaster Recovery

    There is misalignment between what the business expects and what IT can actually deliver — especially when it comes to disaster recovery. Following these nine steps can help you organize your thoughts, ask the right questions and develop the right strategy to begin taking a more business-centric approach to disaster...

    Sponsored By Dell