Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > High Availability

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

High Availability

High Availability is a system design protocol and associated implementation that ensures a certain absolute degree of operational continuity during a given measurement period.
Results 151 - 175 of 203Sort Results By: Published Date | Title | Company Name
White Paper Published By: Symantec     Published Date: Jan 04, 2012
Read the white paper to learn how TLS works, best practices for its use and the various applications in which it can secure business computing.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Jan 04, 2012
Read this white paper and learn how the proper IT security policies can actually drive more sales.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Jan 04, 2012
This paper highlights how attackers distribute malwale and how cybercriminals have developed attack techniques.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Jun 02, 2011
Learn how Symantecs SBE Solutions faired when benchmarked by PassMark Software.
Tags : 
symantec sbe solutions, passmark software, performance testing, small business, endpoint protection security software
    
Symantec
White Paper Published By: Symantec     Published Date: Jun 02, 2011
Download this white paper and learn how system-level protection can help your business keep data secure, available, and organized.
Tags : 
symantec, esg, data backup and recovery, system-level protection, data protection
    
Symantec
White Paper Published By: Symantec     Published Date: Jun 02, 2011
Download this survey now to understand the attitudes and practices of SMBs toward disaster preparedness.
Tags : 
symantec, smb, disaster prepardness survey, backup and recovery, data protection
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 02, 2006
IT administrators need to minimize downtime for critical IT services by rapidly recovering entire systems to dissimilar hardware platforms or virtual environments. Symantec Backup Exec System Recovery Server Edition combines the speed and reliability of disk-based, bare-metal Windows system recovery with dissimilar hardware restoration and lights-out operation.
Tags : 
backup, infrastructure, internetworking hardware, networking hardware, network management
    
Symantec
White Paper Published By: Symantec     Published Date: Nov 02, 2006
The IT threat landscape has changed from individual hackers disrupting network operations to organized crime stealing confidential information. Antivirus technology must be joined by a coordinated, multilayered defense that includes proactive vulnerability-based intrusion prevention, file-based intrusion prevention, and inbound and outbound traffic control.
Tags : 
security, hacker detection, internet security, crimeware, spyware
    
Symantec
White Paper Published By: Tail-f Systems     Published Date: Sep 16, 2008
The key issues involved in developing on-device network management systems for carrier-grade enterprise and operator networks are the same for any other networked resource, only with more complexity and built-in restrictions due to the limited space and processing capabilities inherent to these types of devices.
Tags : 
network management, on-device network management systems, carrier-grade requirements, high availability, network scalability
    
Tail-f Systems
White Paper Published By: Thawte     Published Date: Oct 06, 2014
In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.
Tags : 
access control, anti spam, anti spyware, anti virus, application security
    
Thawte
White Paper Published By: The Bunker     Published Date: Nov 30, 2010
What questions should an organization ask about security and availability when contemplating a cloud computing model
Tags : 
cloud, security, data centre, sla, continuity
    
The Bunker
White Paper Published By: TIBCO     Published Date: Mar 27, 2013
What are some of the pitfalls you can avoid when augmenting an existing infrastructure to maximize performance, results, and success? Read on.
Tags : 
integration, infrastrucutre, performance, enterprise, high availability
    
TIBCO
White Paper Published By: TraceSecurity     Published Date: Sep 15, 2010
This paper defines the different types of penetration tests, explains why the tests should be performed, details their benefits and even provides guidance for choosing the right vendor.
Tags : 
penetration, test, pen, tracesecurity, risk
    
TraceSecurity
White Paper Published By: Tripwire     Published Date: Feb 08, 2013
It’s no small feat to balance access to data to meet business goals with protecting that very same data from hackers.
Tags : 
high availability, cloud, security, hacker detection, intrusion prevention
    
Tripwire
White Paper Published By: uptime software     Published Date: Dec 06, 2007
You’ll learn what the 12 pitfalls of IT Systems Management really are, as well as the bridges you need to cross them. Learn what the big framework solutions don't want you to know, and why they might not be the answer for your IT Department. Learn to leverage what you have and your limited budget to get you the Systems Management tools and Solutions you need.
Tags : 
high availability, systems management, server management, network management, server
    
uptime software
White Paper Published By: uptime software     Published Date: Dec 06, 2007
Monitoring servers, applications, and services has become an essential part of the IT department over the past 10 years. However, it can be a daunting task to find the right solution for your Enterprise. This brief paper will examine the differences between Agent and Agentless monitoring, so you can make the right decision based on your company's needs, the metrics you need, your budget range, your resource availability, and your management's reporting needs.
Tags : 
server monitoring, monitoring tool, capacity planning, performance monitoring, service level management
    
uptime software
White Paper Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
Download Protecting Users From Firesheep and other Sidejacking Attacks with SSL to learn how to avoid HTTP attacks.
Tags : 
verisign, firesheep, sidejacking, attacks, security
    
VeriSign Authentication Services, now a part of Symantec Corp.
White Paper Published By: Vision Solutions     Published Date: Aug 26, 2014
This paper debunks 7 virtualization DR myths
Tags : 
virtualization myths, disaster recovery, back up, high availability, virtual servers
    
Vision Solutions
White Paper Published By: Vision Solutions     Published Date: Aug 26, 2014
This paper will help you navigate the virtualization solutions available and explain how Hyper-V can benefit you.
Tags : 
backup, high availability, disaster recovery, virtualization software, hyper-v
    
Vision Solutions
White Paper Published By: Vision Solutions     Published Date: Aug 26, 2014
This paper explores the market leading solutions available for data protection and recoverability.
Tags : 
data protection, data recovery, geocluster, data cluster. failover clustering, storage
    
Vision Solutions
White Paper Published By: Vision Solutions     Published Date: Aug 26, 2014
This executive overview aims to detail how systems migrations are inevitable through upgrades, but business downtime isn't.
Tags : 
systems migrations, business downtime, system migration, business continuity, vision solutions
    
Vision Solutions
White Paper Published By: Vision Solutions     Published Date: Aug 26, 2014
This paper will lead you through 3 essential steps to help ensure business continuity and survival.
Tags : 
guide to recovery, business continuity, disaster recovery, downtime, business impact of downtime
    
Vision Solutions
White Paper Published By: Vision Solutions     Published Date: Aug 21, 2014
A report on research findings into the state of resilience and methods used companies to ensure their strength.
Tags : 
data management strategies, data protection, system migrations, data safeguarding, backup and recovery
    
Vision Solutions
White Paper Published By: Vision Solutions     Published Date: Feb 26, 2010
Achieving effective and efficient high availability protection for larger IBM i environments requires careful thought and clear understanding of the technology options. This white paper describes what you need to know in order to make an informed decision about IBM i high availability strategies so that your business requirements for Recovery Time Objective (RTO) and Recovery Point Objective (RPO) are not compromised
Tags : 
vision, high availability, ibm, cdp, aix
    
Vision Solutions
White Paper Published By: Vision Solutions     Published Date: Dec 11, 2008
This paper presents an overview of IBM System i high availability to companies that are beginning to explore this powerful business continuity technology.
Tags : 
vision, high availability, ibm, monitoring, network architecture
    
Vision Solutions
Start   Previous    1 2 3 4 5 6 7 8 9    Next    End
Search