Upcoming Events

Where the Cloud Touches Down: Simplifying Data Center Infrastructure Management

Thursday, July 25, 2013
10:00 AM PT/1:00 PM ET

In most data centers, DCIM rests on a shaky foundation of manual record keeping and scattered documentation. OpManager replaces data center documentation with a single repository for data, QRCodes for asset tracking, accurate 3D mapping of asset locations, and a configuration management database (CMDB). In this webcast, sponsored by ManageEngine, you will see how a real-world datacenter mapping stored in racktables gets imported into OpManager, which then provides a 3D visualization of where assets actually are. You'll also see how the QR Code generator helps you make the link between real assets and the monitoring world, and how the layered CMDB provides a single point of view for all your configuration data.

Register Now!

A Network Computing Webinar:
SDN First Steps

Thursday, August 8, 2013
11:00 AM PT / 2:00 PM ET

This webinar will help attendees understand the overall concept of SDN and its benefits, describe the different conceptual approaches to SDN, and examine the various technologies, both proprietary and open source, that are emerging. It will also help users decide whether SDN makes sense in their environment, and outline the first steps IT can take for testing SDN technologies.

Register Now!

More Events »

Subscribe to Newsletter

  • Keep up with all of the latest news and analysis on the fast-moving IT industry with Network Computing newsletters.
Sign Up

Results tagged "data protection"

Total Search Results : 65

PerspecSys: Removing a Key Security Barrier to Public Cloud Adoption

February 23, 2012 01:00 PM
Several months ago, an IT trade publication (which will remain nameless) published an article whose title stated that public cloud security remains "mission impossible." While the article was well-reasoned and backed off from the title's hyperbolic assertion, the damage had already been done. Actually, the title should have been something more like, "Public cloud security is mission possible, but proceed cautiously."

Virtual Backup Challenges Enterprise IT

February 21, 2012 09:00 AM
Organizations remain challenged when it comes to ensuring data is adequately protected and recoverable, even though advances have been made in backup and data protection technology, industry observers say. Among the reasons cited are that data protection processes don't get reviewed frequently enough, there are few SLA requirements, and there is a lack of visibility into the results of data protection activities.

Security 2011: Attack Of The Human Errors

December 22, 2011 01:33 PM
Some household names in enterprise and consumer technology suffered the embarrassment of having been hacked by cybercriminals in 2011. RSA, of all companies -- the IT security division of EMC -- had to admit that its two-factor SecureID protection technology for customers had been compromised. And the most high profile breach affecting consumers made news when the Sony PlayStation Network was hacked, affecting 77 million customers whose private information was stolen.

DPMS Pioneer Bocada Adds Virtualization, Opens Up SMB Markets

November 01, 2011 08:19 AM
Calling itself the leader in data protection management software (DPMS), Bocada is addressing a gap in backup management reporting caused by the growth of virtualization. Its Vision offering, a DPMS product that manages data protection in virtual environments, is available as a stand-alone offering or in a module for the company's Prism product that bridges the gap between physical and virtual protection.

CTERA Networks Announces First Hybrid-Cloud Solution For Bare Metal And Server Backup

September 21, 2010 10:24 AM
CTERA Networks, an innovator in hybrid cloud storage and data protection, today announced the availability of the first hybrid cloud solution incorporating server backup and bare metal backup. Designed for managed service providers (MSPs) and value added resellers (VARs), CTERA's Cloud Attached Storage family combines cloud and local storage, data protection, and collaboration in a simple, centrally managed appliance-based solution. CTERA is also announcing first shipments of its new data protection appliance, the CTERA C400.

Cleversafe: Making Information Safe Inside And Outside The Cloud

August 03, 2010 03:26 PM
Cloud computing attracts a lot of attention, but it is also being examined closely for whether it meets specific business requirements. Data security tops executive concerns, but other issues such as availability and scalability are often mentioned as well. Cleversafe has come up with a very interesting approach that addresses these and other issues. Founded in 2004, Cleversafe is a small (about 40 employees) company headquartered in Chicago. The focus of its hardware is on data protection with an emphasis on confidentiality, integrity, and availability (CIA), the three core principles of information security as it pertains to data protection. Cleversafe sells its software integrated in storage server appliances, such as Slicestor, and Accesser dispersed storage routers.

Visa Releases New Guidelines For Protecting Card Data

July 19, 2010 03:00 PM
Visa has released guidelines on tokenization to help merchants and card processors better protect customer credit card data and potentially reduce the burden of complying with PCI rules. Tokenization transforms a credit card number into a random number that can be associated with the account number but can't be used for transactions. Merchants and retailers often have to store customer card data for functions such as customer refunds or voiding a purchase. By using tokens instead, merchants and retailers no longer have to store card data, reducing the risk of theft or exposure of their customers' account numbers.

Cloud Update: Providers

June 24, 2010 11:30 AM
As we continue through our quick update of the cloud storage market, this entry will focus on the providers. I describe this group as the data asset holders and as predicted last year, this segment is getting crowded in a hurry, with big names and ones you never heard of. Cloud storage providers are coming from everywhere; software companies, storage hardware companies, server hardware companies, managed hosting services, telecommunications companies and E-commerce book retailers. Providers will need more smarts than money as they attempt to bring solid storage management and data protection processes to the table, as well as offering a complete understanding of data security.

Interactive Data Launches Powerful New Data Permissioning Solution

June 21, 2010 09:52 AM
Interactive Data Corporation, a leading provider of financial market data, analytics and related solutions, today announced the launch of PlusFeedSM Access Control System, a powerful permissioning and entitlement system designed to interface with PlusFeed, Interactive Data's low-latency consolidated datafeed. The new system can help clients to manage enterprise-wide data usage, reporting and associated costs quickly and effectively.

FalconStor Software Ensures Seamless Data Backup And Immediate Recovery For Healthcare Providers

June 21, 2010 09:39 AM
FalconStor Software, Inc., the provider of Totally Open data protection solutions, today announced that healthcare organizations worldwide are deploying FalconStor's data protection solutions for high availability and disaster recovery (DR) of business-critical applications that must comply with data security, privacy and retention policies. Healthcare customers are discovering that by implementing FalconStor's data protection solutions effectively, they are cutting the time of managing their data in half compared to previous solutions they have used.

« Previous Page  | 1 |  2 | 3 | 4 | 5 | 6 | 7  | Next Page » 

Vendor Comparisons
Network Computing’s Vendor Comparisons provide extensive details on products and services, including downloadable feature matrices. Our categories include:

Research and Reports

August 2013
Network Computing: August 2013



TechWeb Careers