Data Management

The latest white papers, case studies and webcasts to help technology professionals ensure data is safe from risk and disaster with quality back-up, infrastructure and information management.

  • White Papers // May 2015

    Phishing: When Email is the Enemy

    Assuming your employees or spam filter can detect the difference between legitimate emails and phishing scams is not enough. Discover the challenges of staying ahead of phishing and learn a framework to incorporate anti-phishing actions into your existing security processes.

    Sponsored By Dell Software

  • White Papers // May 2015

    Ten Sneaky Things a Spammer Will Do

    Spam will continue to plague Inboxes until it is no longer profitable for the spammer or there is a hack-proof method of prevention that is easy to use. Read this ebook and learn the techniques spammers employ to reach their target audience, and discover the solutions that can help protect...

    Sponsored By Dell Software

  • White Papers // May 2015

    The 12 Leading Players in the Corporate Web Security - Market Quadrant

    Webroot has again been identified as a “Trail Blazer” in the Corporate Web Security Market Quadrant 2014 report by The Radicati Group. The independent analysis recognizes Webroot SecureAnywhere® Web Security Service for its cloud-based threat detection, predictive threat intelligence and robust content filtering. The report includes in-depth, expert analysis of...

    Sponsored By Webroot

  • White Papers // May 2015

    HP ArcSight Logger Data Sheet

    Collect logs and machine data from any device, vendor and source with broadest set of data collection comprehensively at high speeds. To learn more, read the data sheet.

    Sponsored By Hewlett-Packard (HP)

  • White Papers // May 2015

    The Importance of Cyber Threat Intelligence to a Strong Security Posture

    Recently, the Ponemon Institute surveyed 693 IT security professionals from Fortune 1000, Global 2000 and the Forbes List of Largest Private Companies in order to understand how organizations are using, gathering and analyzing threat intelligence as part of their broader cybersecurity strategy. The resulting report answers the following questions: •...

    Sponsored By Webroot

  • White Papers // May 2015

    HP Vertica powers real-time data analytics at Empirix

    In today’s connected, fast-paced and competitive world, mobile and telecommunications companies face increasing demands associated with massive amounts of data. Empirix IntelliSight, powered by HP Vertica, is an analytics and predictive tool that can for example intelligently rank network issues to ensure excellent customer experiences.

    Sponsored By Hewlett-Packard (HP)

  • White Papers // May 2015

    AT&T Leverages HP Vertica Analytics Platform to Change the Economics of Providing Actionable Insights to Decision Makers

    HP Vertica has changed the economics of using Big Data analytics for AT&T's LOBs while minimizing the likelihood that performance bottlenecks will prevent business teams from realizing the full potential of Big Data analytics. As a result, AT&T's data analytics team can now provide more actionable data, and Big Data...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // May 2015

    HP Logger: Collects, Stores, & Analyses logs for security and compliance

    With HP Logger you can improve everything from IT operations, compliance and risk management to security intelligence. This universal log management solution collects machine data from any log-generating source and unifies the data for searching, indexing, reporting, analysis, and retention. HP Logger can be used by organizations of any size...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // May 2015

    How to install HP Logger in 2 hours to provide immediate reports

    HP Logger collects information from any system that generates log data. It can process that information as much or as little as desired, and can produce ultra-fast searching across the data.

    Sponsored By Hewlett-Packard (HP)

  • White Papers // May 2015

    Webroot 2015 Threat Brief

    Did you know that: • 85,000 malicious IPs are launched every day? • Less than 55% of all URLs are Trustworthy? • 30% of Internet Users access Phishing sites? • 15% of New files are malicious executables? • Only 28% of mobile apps are trustworthy? The Webroot 2015 Threat Brief,...

    Sponsored By Webroot

  • White Papers // Mar 2015

    Data Sheet : Symantec Endpoint Encryption - Get you facts right

    In an era where cyber-attacks are growing and becoming increasingly sophisticated, it's not surprising to find that the number of data breaches has also grown exponentially. Regulatory requirements make encryption a necessity for many. Companies that need to comply with regulations such as PCIDSS or HIPAA must have an auditable...

    Sponsored By Symantec

  • White Papers // Mar 2015

    Data Sheet : Symantec Endpoint Security - Get you facts right

    Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that cannot be stopped by antivirus alone. It’s time to move beyond antivirus. Download this report to learn how you can focus on your business without compromising security or performance with Symantec™ Endpoint Protection providing:...

    Sponsored By Symantec

  • White Papers // Apr 2015

    Analyst report: Digital Asset Management for Customer Experience

    As demands for rich customer experiences and omni-channel marketing evolve, the need for Digital Asset Management (DAM) software to manage rich media across the customer lifecycle is growing. Leading organizations are turning to DAM to push their assets seamlessly across all channels and deliver compelling, media rich customer experiences. Read...

    Sponsored By Open Text

  • White Papers // Apr 2015

    Reduce costs and boost productivity: Connect the digital media supply chain

    Today, every brand must act like a media company, producing digital content and rich media assets to reach and engage customers. But, often companies are managing disparate content, processes and systems. Read the v-Book, 5 Tips for Orchestrating the New Digital Experience, to learn how to connect and streamline your...

    Sponsored By Open Text

  • White Papers // Apr 2015

    Unified Backup: Virtual & Physical

    Protecting data is a holistic practice; so, you're only as strong as your weakest link. Find out how the latest release of Dell AppAssure unifies virtualized stand-alone backup, replication and recovery processes — without compromising data protection. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    Be a C-suite hero with these 5 key virtual + physical data protection takeaways.

    Redefine your business goals and drivers for data protection, and think like a CIO when you apply the five key takeaways in this eBook. Discover alternative approaches to protect your hybrid, virtual and physical environments, and embrace new solutions to secure your data assets.

    Sponsored By Dell Software

  • White Papers // May 2015

    How to develop a Business Continuity Plan

    A disaster or interruption can occur at any time without any warning—your company’s survival depends on the steps you take to prepare for these potentially catastrophic events. The most effective preparation takes the form of a written document called a Business Continuity Plan (BCP). This document serves as a guide...

    Sponsored By Macquarie Telecom Australia

  • White Papers // May 2015

    Disaster Avoidance vs Disaster Recovery

    Disaster Avoidance (DA) and Disaster Recovery (DR) are both critical elements of a general disaster-coping strategy.This paper explores the difference between the two and what each can do to prepare companies for disaster. This report explores such topics as: Why is disaster preparedness important? Stopping disasters before they start Which...

    Sponsored By Macquarie Telecom Australia

  • White Papers // Apr 2015

    Top 10 Criteria for Selecting a Managed Services Provider

    When you’re faced with growing expectations to create business value with limited resources, where can you turn? Increasingly, IT organizations are looking to trusted IT services providers like IBM to help reduce cost, manage complexity, maintain leading-edge skills and adopt technology innovation. Read the white paper to find out how...

    Sponsored By IBM

  • White Papers // Apr 2015

    Go Omni-Channel. Get with the DAM Program

    Omni-Channel is what it's all about. Digital Asset Management (DAM) is the foundation to get you there. DAM breaks down silos and pushes your rich media assets seamlessly across all channels, delivering experiences that excite customers to buy. Get with the DAM omni-channel program and see how it all works...

    Sponsored By Open Text

  • White Papers // Apr 2015

    It's a new DAM world. Are you ready to start your digital transformation?

    Today's customers want video, pictures, and engaging experiences in real time, across any platform or device. This demand for rich media has outpaced companies’ abilities to manage those assets. Digital Asset Management (DAM) empowers companies to respond to real-time demands from customers by connecting people, processes, and content. Content at...

    Sponsored By Open Text

  • White Papers // Apr 2015

    The Visibility Void

    Attacks through HTTPS can be a vulnerability for enterprises. To identify hidden threats to the business, enterprises need complete visibility into encrypted traffic. However, to comply with local privacy regulations and their own acceptable use policies, enterprises must have the means to selectively decrypt this traffic. An encrypted traffic management...

    Sponsored By Blue Coat Systems, Inc.

  • White Papers // Apr 2015

    Videocast Demo: SSL Visibility Appliances today

    Learn how to maximize the features and functions of this powerful Encrypted Traffic Management (ETM) solution by watching our demo video. It shows you configuration best practices and step-by-step instructions on how to: Use the dashboard to monitor status, health, and connectivity of the system Optimize your use...

    Sponsored By Blue Coat Systems, Inc.

  • White Papers // Apr 2015

    Building Higher IT Business Continuity in the Face of Disaster

    Some disasters, such as hurricanes, are preceded by a warning. Most are not. Forces of nature, malicious acts, or even human error can have a detrimental impact on your business. Be prepared by learning some first steps and follow-ups to upgrade your disaster preparedness. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    Dell Data Protection Point of View

    Your backup methodology depends on data classification, recovery objectives and IT infrastructure. Learn how to enable the best data-protection methods for your environment — safeguarding your organization’s critical information and applications - without adding excessive costs or complexity. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    Disk Backup Appliances: The Next Generation

    Have you examined your backup strategy recently? You may be exposing your business to unnecessary risk and expense. Find out how you can save time on deployment, simplify day-to-day management, shrink your backup windows and significantly reduce your backup-storage footprint. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    How to Avoid the Coming Backup Crunch

    Data is exploding at a time when tolerances for loss are near zero. Learn about a proven solution that enables organizations to capture continuous backup snapshots, automate recoverability testing, and offload data deduplication/compression tasks using minimal infrastructure and human resources. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    Protecting Exchange: Best Practices and Practical Tips

    Protecting email data is critical for today's organizations, yet most disaster-recovery plans don’t incorporate a comprehensive email data-protection strategy. Find out the best ways to safeguard precious email data in your Microsoft Exchange environment. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    Superior VMware® Protection for Limited IT Budgets

    A complete VMware data-protection strategy should offer protection for mission-critical applications, along with automated nightly backup and replication for less critical data. Find out the four major criteria for implementing cost-effective data protection in your own VMware environment. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // Apr 2015

    The Buyers Guide to Virtual and Physical Data Protection

    New technologies now make data protection faster and more reliable both for physical and virtual machines. Let this guide help you sort through traditional and cutting-edge data-protection solutions to find the best option for your environment. Read the White Paper >>

    Sponsored By Dell Software

  • White Papers // May 2015

    Seven steps to software security

    After a decade of news detailing countless successful cyber‑attacks, it’s hard to imagine a corporation not understanding they need a software security solution. Unlike implementing software quality assurance, the processes that go into making applications more secure are still relatively immature. This paper provides seven practical steps organisations can begin...

    Sponsored By Hewlett-Packard (HP)

  • White Papers // May 2015

    Accelerate IT Service Delivery

    In order for Infrastructure and Operation (I&O) leaders to better support the needs of their businesses, both now in the future, many are turning to converged infrastructure (CI). Unlike monolithic, hardware-defined infrastructure adapts quickly and intelligently to workloads while providing faster time-to-deployment and better end-to-end management and life cycle support....

    Sponsored By HP Intel Xeon

  • White Papers // May 2015

    Make IT an Engine of Innovation

    Innovative companies around the world have embraced a modernized, business-centric approach to IT, delivering orchestrated solutions that help achieve better business results. Now, more efficient and agile servers support this innovation by combining compute, storage, and networking resources to manage entire IT environments as programmable elements that are flexibly tailored...

    Sponsored By HP Intel Xeon

  • White Papers // Apr 2015

    Addressing Customer Analytics with Effective Data Matching

    With the advent of big data, organizations worldwide are attempting to use data and analytics to solve problems previously out of their reach. Many are applying big data and analytics to create competitive advantage within their markets, often focusing on building a thorough understanding of their customer base.

    Sponsored By IBM

  • White Papers // Apr 2015

    Analyst Research Magic Quadrant for Master Data Management of Customer Data Solutions

    Read this Gartner Report: Gartner Magic Quadrant for Customer Master Data This Gartner's Magic Quadrant offer insight into the part of the packaged MDM solution market that focuses on how organizations master and share a "single version" of customer data

    Sponsored By IBM

  • White Papers // Apr 2015

    Bloor Research Report - E360

    Early adopters of an extended 360 degree view of the customer will get competitive advantages over their rivals and this will force laggards to adopt a similar approach or lose business.

    Sponsored By IBM

  • White Papers // Apr 2015

    Enhanced 360 Handbook

    How can organizations tap into the vast flow of data, weed out the information that matters, and then link that meaningful sentiment to specific customers? This ebook explores how an enhanced 360-degree view of the customer optimizes and facilitates more personalized customer interactions.

    Sponsored By IBM

  • White Papers // Apr 2015

    Magic Quadrant for Master Data Management of Product Data Solutions

    The MDM of product data solutions market segment grew nearly 9% in 2013. Increasingly, end-user organizations are exploiting MDM as the heart of a digital business transformation. This Magic Quadrant, which evaluates 15 providers, will help find the right vendor for their needs. 

    Sponsored By IBM

  • White Papers // Apr 2015

    Supercharge Salesforce.com Initiatives with a 360 Degree View of the Customer

    Salesforce.com is an industry leading cloud CRM solution which helps organizations streamline and effectively manage sales processes, customers and opportunities. The effectiveness of these initiatives can be improved dramatically by providing Salesforce with a 3600 view of the Customer to overcome the limitation of fragmented data that Salesforce currently relies...

    Sponsored By IBM

  • White Papers // Apr 2015

    The Total Economic Impact™ Of IBM’s Information Management Solutions - A Forrester Report

    In October 2014, Forrester Consulting worked with IBM on a commissioned study to analyze the total economic impact that IBM's Information Management solutions have on three specific big data use cases to help its customers solve important business problems.

    Sponsored By IBM