Find White Papers
Home
About Us
List Your Papers
    

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

code 42

Results 1 - 25 of 25Sort Results By: Published Date | Title | Company Name
Published By: Code42     Published Date: Mar 31, 2017
Download the Windows 10 migration checklist today for a list of all factors to consider as you prepare to upgrade your enterprise PCs.
Tags : 
    
Code42
Published By: Code42     Published Date: Mar 31, 2017
Download the white paper today to learn how to simplify your next device refresh.
Tags : 
    
Code42
Published By: Code42     Published Date: Mar 31, 2017
Data migration strikes dread in the hearts of IT admins everywhere. It’s expensive, time-consuming, and often results in data loss. As the amount of enterprise data on laptops increases, the time and burden it takes to manage the continuous tech refresh process increases as well. But it doesn’t have to.
Tags : 
    
Code42
Published By: Code42     Published Date: Mar 31, 2017
Watch this on-demand webinar to explore three distinct migration approaches taken by real businesses.
Tags : 
    
Code42
Published By: Code42     Published Date: Jul 12, 2017
Read the white paper today to learn how to keep your data on endpoints beyond your network.
Tags : 
deduplication,  worker productivity,  backup solution,  recover data, data security,  protecting data
    
Code42
Published By: Code42     Published Date: Jul 12, 2017
Read the white paper today to learn more about how OneDrive creates these security issues when used as a backup solution.
Tags : 
onedrive,  backup solution,  backup,  restore data,  cyber protection, data security,  security issues
    
Code42
Published By: Code42     Published Date: Apr 22, 2016
Rapid changes in technology and software, and the nearly universal shift to electronically stored information (ESI), has made eDiscovery more complex and expensive. In a movement to simplify and standardize their procedures—and dissolve some of the extra tensions surrounding litigation—many organizations are bringing phases of the eDiscovery process in house, in particular legal hold. Among other benefits, Code42 eDiscovery simplifies legal hold management. Litigation preparation can be a large task crossing over many departments, but will consistently feature two main players: Legal and IT. This document focuses on those two groups, and aims to enable one to see the eDiscovery world through the point of view of one group—or the other. Read more to find out the details.
Tags : 
code 42, legal process, ediscovery, litigation issues, enterprise applications
    
Code42
Published By: Code42     Published Date: Apr 22, 2016
Today, in the age of information, people are paid for their ideas: to create original knowledge products or add value to existing products. Given their self-reliance, it is not surprising that workers take pride in their outputs—up to half of employees take a portfolio of files with them when they leave. When employees move on, many feel entitled to the work they’ve created.They presume it is acceptable to transfer work documents to personal computers, removable media, tablets, smartphones or online file sharing apps. Some pilfered data is innocuous and already in the public realm. But some of it is classified. Read this paper to find out how to collect and secure data to protect operations, reputation and continuity when employees leave.
Tags : 
data protection, code 42, data security, intellectual property, database security, information management, secure content management
    
Code42
Published By: Code42     Published Date: Apr 22, 2016
The study’s findings highlight discrepancies—between IT departments and end users—in the approach and attitudes toward data protection. The results provide compelling evidence that there is vast room for improvement in securing critical data flowing between the corporate enterprise and endpoint devices. Read this paper to find how to protect your data today.
Tags : 
datastrophe study, code 42, data protection, data backups, anti spyware, anti virus, application security, authentication, email security, encryption, firewalls, hacker detection, internet security, intrusion detection, security management, data loss prevention
    
Code42
Published By: Code42     Published Date: Apr 22, 2016
Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.
Tags : 
endpoint backups, data visability, code 42, data loss, data recovery, backup and recovery, disaster recovery, data protection, database security, data loss prevention
    
Code42
Published By: Code42     Published Date: Apr 22, 2016
Read this whitepaper to find out strategic solutions to your data protection issues.
Tags : 
data protection, data control, code 42, data visibility, encryption, hacker detection, network security appliance, security management
    
Code42
Published By: Code42     Published Date: Apr 22, 2016
Dramatic changes are underway in offices around the world, with Macs rapidly gaining market share in modern enterprises. Read this white paper to discover the industry-wide transitions to Macs, and tips to smooth your integration of Apple devices.
Tags : 
mac, code 42, apple devices, modern offices, business integration, linux, productivity, project management, service management, desktop management
    
Code42
Published By: Code42     Published Date: Mar 31, 2017
Today’s enterprise is vastly different than five years ago: 75 percent of the workforce is mobile, 90 percent of companies support Mac devices, five malware attacks happen every second and half of enterprise data lives outside the data center. As everything around you changes, you’re expected to support the enterprise with flat budgets and static head counts. Endpoint backup enables you to protect enterprise data and mitigate the growing risk of data loss, ransomware and insider threat.
Tags : 
    
Code42
Published By: Code42     Published Date: Mar 31, 2017
Read the white paper today to learn more about how EFSS creates these security issues when used as a backup solution.
Tags : 
    
Code42
Published By: Code42     Published Date: Mar 31, 2017
Read the white paper today to learn how automatic endpoint backup eliminates the issues created by antiquated network drive backup.
Tags : 
    
Code42
Published By: Code42     Published Date: Apr 04, 2017
Download the white paper today to learn why local dedupe is the superior choice to global dedupe.
Tags : 
    
Code42
Published By: Code42     Published Date: Apr 04, 2017
Three decades after the height of the cold war between Apple and IBM, these former nemeses have formed a partnership emblematic of the shifting tide in enterprise IT. Macs are no longer just a niche choice for the creative class. In this report, see how Macs have proven themselves in the enterprise. They’re easier to support than PCs, increase worker productivity, enhance information security and save money.
Tags : 
    
Code42
Published By: Equity Administration Solutions Inc     Published Date: Jun 19, 2013
Learn the 10 key legal requirements, employer and employee tax considerations, and the most common challenges in offering a Code Section 423 plan.
Tags : 
tax, requirements, stock purchase plans, legal, employer tax, employee tax
    
Equity Administration Solutions Inc
Published By: Code42     Published Date: Jan 13, 2016
BACKUP ISN’T JUST A COPY IN THE CLOUD. IT’S THE ANTIDOTE TO EVERYTHING. Be it user error, natural disaster, hardware failure, malware, theft or litigation—there’s a countermeasure to restore your business to normal. Skeptical? Click through the eBook to ?nd out how backup makes the enterprise impervious.
Tags : 
code42, endpoint backup, cloud storage, data migration, data storage solutions, e-discovery, security, it management, knowledge management, enterprise applications
    
Code42
Published By: Code42     Published Date: Jan 13, 2016
Whether in search of better managers, higher pay or more recognition, people are changing careers faster than ever. The average tenure of wage and salary employees is 4.6 years. With more and more employees working exclusively with corporate data, higher attrition translates to higher levels of data loss. Many employees feel entitled to the work they’ve created and ignore security policies, simply taking the data they want. While some of this pilfered data is innocuous or already in the public realm, some of it is classified, such as customer and employee information, payment data and intellectual property. Code42 provides enterprise organizations with a way to view, manage and protect data from walking out the door. Download the white paper to learn how.
Tags : 
code42, data protection, payment data, data protection, corporate data security, security, it management, knowledge management, enterprise applications
    
Code42
Published By: Code42     Published Date: Jan 13, 2016
Today’s organizations face a ballooning data management and risk problem. The use of laptops, tablets, workstations, servers and smartphones in the enterprise to create and store critical data is growing at an alarming rate. Many companies still rely on a legacy, platform-specific data backup solution, even though it doesn’t provide consistent backup across the enterprise. This outdated approach becomes especially risky when IT faces a data migration initiative. Whether migrating to a new version or brand new hardware on the client or server—organizations risk immense data loss and an expensive, intensive disaster recovery undertaking if they launch a data migration effort without first properly securing their data. Continuous, real-time data backup is the only viable solution for protecting all enterprise data while providing for a seamless migration process. But how do you achieve it?
Tags : 
code42, best practices, platform-specific data, endpoint backup, data migration, real-time data backup, data solutions, security, it management, knowledge management, enterprise applications
    
Code42
Published By: Code42     Published Date: Jan 13, 2016
Read this white paper to learn how the common approaches to e-Discovery miss the mark and how endpoint backup can streamline the collection and preservation of electronically stored information.
Tags : 
code42, e-discovery, endpoint backup, e-discovery methods, data collection, compliance requirements, security, it management, knowledge management, enterprise applications
    
Code42
Published By: Code42     Published Date: Feb 28, 2018
Business Continuity Starts with the Ability to Go Back No matter the size of the business, no matter the industry, the business world moves faster than ever. Constant digital innovation is only accelerating that pace. Yet, to keep business moving forward, ensure uninterrupted productivity and guarantee business continuity, organizations need to first focus on the ability to go back— to undo, restore and recover.
Tags : 
    
Code42
Published By: Code42     Published Date: Feb 28, 2018
Disaster Recovery Plan Roadmap Learn how automatic backup delivers guaranteed business data protection and recovery—no matter the threat. When ransomware hits, the average small business experiences two full days of downtime. One-third of businesses lose revenue and all experience brand and loyalty damage that’s harder to quantify. To stop the bleeding, most small businesses end up paying at least $2,500 to get their data back. But paying the ransom doesn’t guarantee anything. Plenty of businesses have fully complied with the ransom demands, only to have the ransomer increase the ransom request—or simply take off with the ransom and the data.
Tags : 
    
Code42
Published By: Code42     Published Date: Apr 22, 2016
Backup isn't just a copy in the cloud. It's the antidote to everything. Be it user error, natural disaster, hardware failure, malware, theft or litigation—there’s a countermeasure to restore your business to normal. Skeptical? Click through the eBook to find out how backup makes the enterprise impervious.
Tags : 
back up protections, hardware failure, data protection, code 42, backup and recovery, storage management, application integration, business integration, enterprise software
    
Code42
Search