
Blogs
Blogs
Matching:
protection
X

Display: |
Accelerate with IBM Storage: Modern Data Protection
Abstract : Traditional backup and restore is no longer sufficient to meet the challenges of the modern IT infrastructure. Not only has the volume and type of data exploded, but organizations need to provide greater availability of that data for both primary...
from Blog: Accelerate with IBM Storage
Modified on by BethAnnStugis
|
|
Backups are not just disk vs tape, its a blend of protection technologies
RichardSwain
Tags:
rto
wine
tivoli
recovery
rpo
ibm
sonas
hsm
backup
ltfs
tsm
data
protection
snapshots
nas
15,237 Views
How does one judge a glass of wine? There are a few tests, how it looks, smells and taste are the basic three. But as the wine is poured you may or may not know that your wine is made up of different varieties of grapes. A producer sits down and experiments...
from Blog: IBM Storage
|
|
BigFix Protection product withdraw from the market and end of support and availability of a migration option Community Blog |
|
Bring industry standard authentication mechanisms to your environment and protect your data Community Blog
Blog Author: Davendra Paltoo, Offering Manager,Data Replication With growing volumes, variety, and velocity of data, the challenge of protecting data continues. Every organization today is striving to protect its customer data and other data as the cost...
from Blog: IBM Data Replication's CDC News
|
|
Configuring Backup and SLA’s with IBM Spectrum Protect Plus Community Blog
Everything and Forever. The nirvana of data protection and retention. Also known as the most common answer given to backup administrators from their users. This is where ambitious requirements meet real-world resource and financial constraints. Let’s see...
from Blog: Storage Management
Modified on by Ming Chow
|
|
Cyber Resiliency with DS8000 Safeguarded Copy
Kimmel
Tags:
protection
safeguarded
sgc
ds8000
ransomware
cyber
lgc
flashcopy
csm
ds8880
corruption
resilience
copy
logical
4,418 Views
Safeguarded Copy is a new DS8000 function helping to protect against logical data corruption. It is available since 28 September 2018. Potential reasons for such logical data corruption can be inadvertent user error, malicious intent, or even cyberattacks....
from Blog: Storageneers
Modified on by Kimmel
|
|
Data Protection Community Blog
In European Law, the right to privacy is a really developed aspect of the Law. The European Union has a very strong directive on data protection, which was adopted in 1995. This directive is based on the regulation of how the personal data of individuals and...
from Blog: IBM Developer Cloud
|
|
Dont give your password out, even to your BOSS! Community Blog
In a recent event, a teacher's aid, Kimberly Hester, was fired to her lack of giving up her password about giving her password to her Facebook up to the superintendent. The reason for the request was a parent and friend of Kimberly saw an supposedly...
from Blog: Honey Badgers
|
|
Eliminating Technology Trade-Offs
TonyPearson
Tags:
geoprotect
sunlight
selenium
seizure
indium
disk
cleversafe
emc
protection
terrorists
zinc
governement
encryption
gallium
tape
tin
facebook
thin+film
sulfur
cadmium
forensics
copper
solar+cells
efficiency
hackers
performance
electricity
chuck+hollis
10 Comments
29,254 Views
The technology industry is full of trade-offs. Take for example solar cells that convert sunlight to electricity. Every hour, more energy hits the Earth in the form of sunlight than the entire planet consumes in an entire year. The general trade-off is...
from Blog: Inside System Storage
|
|
Enhancements to TEM for Core Protection and Data Protection Add-on Community Blog
We are pleased to announce that new versions of TEM for Core Protection and its Data Protection Add-on (Core Protection Module v10.6 SP1) are now available. The highlights of this new release include: * Data Protection 64-bit support * Behavior Monitoring...
from Blog: BigFix
|
|
Failover Microsoft cloud sites within minutes using ASR with IBM XIV Community Blog
EricJohnson
Tags:
azure
center
2012
data
r2
vm
virtual
system
site
replication
planned
microsoft
protection
dr
automation
unplanned
scvmm
cloud
services
ibm
asr
disaster
replica
xiv
11.6.x
failover
hyper-v
recovery
vmm
machine
san
20,273 Views
For information technology (IT) customers looking to control site expansion costs, Microsoft offers their Azure cloud services. To appeal to larger customers with existing disaster recovery (DR) models that span multiple sites and use SAN solutions, Microsoft...
from Blog: Storage ISV
Modified on by EricJohnson
|
|
Feedback session - Automated data protection in the cloud Community Blog
There will be a live session held Tuesday June 12 2012 that will provide an overview of the data protection capabilities that IBM Tivoli Storage Manager for Virtual Environments brings to IBM SmartCloud Provisioning. Come to learn what we have to offer and...
from Blog: Cloud/Virtualization Management
|
|
Getting started with IBM Spectrum Protect Plus Community Blog
Grab a cup of coffee and let’s talk about the latest solution that has been added to IBM’s Data Protection portfolio called Spectrum Protect Plus Spectrum Protect Plus is a revolutionary new data protection and availability solution that...
from Blog: Storage Management
Modified on by Narayan Kumar
|
|
IBM and Ponemon Uncover What Executives Think About Data Protection Community Blog
Today's post comes from Sydney Shealy, Market Segment Manager, Application Security. In their annual report released this month, the IBM X-Force Research and Development team labeled 2011 as the year of the security breach. The report pointed out that...
from Blog: IBM Redbooks Software Blog
|
|
IBM BigFix Protection extends support for Mac OS X 10.11 Community Blog
We are pleased to announce that updates to the Core Protection Module (CPM) sites are available. The main highlight of this release is the support for Mac OS X 10.11. Updated site versions Trend Micro Core Protection Module site version: 70 Trend...
from Blog: BigFix
|
|
IBM Buys Guardium
In one of my last blogs, I wrote about the untold story of data privacy focusing on non-production systems. This past week, IBM made a significant acquisition of Guardium to improve support for compliance and the protection of privacy across all systems. ...
from Blog: Managing the data lifecycle
|
|
IBM Information Archive v1.1 Announcement
TonyPearson
Tags:
2231-is3
nfs
ia
protection
2231-ia3
ibm
api
centera
archive
dr550
emc
ssam
protocols
16,125 Views
Hey everyone, its Tuesday, and that means IBM announcements!
Last October, IBM [ unveiled their plans to take over the world ] of archive solutions, and
today, we make good on that threat with the announcement of the [ Information Archive (IA) v1.1 ]. ...
from Blog: Inside System Storage
|
|
IBM Spectrum Protect Plus unlocks your data for real business value and by the way it’s easy to use! Community Blog
bobby_g
Tags:
spectrum
backup
protect
protection
availability
data
storage
plus
recovery
vm
ibm
11,638 Views
Complexity abounds in the world of #data protection, backup and recovery. Organizations struggle with complex procedures that take forever to setup and implement. System maintenance is always an ongoing challenge. The synchronized coordination between those...
from Blog: Storage Management
Modified on by bobby_g
|
|
IBM Tivoli Storage Manager as a Data Protection Solution
Today, the changes in our world include the instrumentation, interconnectedness, and intelligence of our environments. Such changes combine to produce a massive glut of new useful information, from new and existing sources, with new ways to use it. These...
from Blog: IBM System Storage RedBooks
|
|
Integration and Simplicity in Advanced Threat Protection Community Blog
Guest post by Brian Fitch, Product Manager for IBM Security . The intensity of the threat landscape is constantly increasing and evolving. As a result, we have seen a lot of corresponding innovation in security technologies and services, often times from small...
from Blog: IBM Redbooks Software Blog
Modified on by dwmigration2
|
|
Is it safe?
I read an interesting article today: Hackers aren't as sneaky as you think .
Ah! The good old days. I grew up on the hacker culture. I remember
the inspiration of the movie War Games and the almost romantic vision
of young, smart people getting past the...
from Blog: Walden's Ponderings
|
|
ISS Data Security Services
TonyPearson
Tags:
iss
information+infrastructur...
desktop
laptop
protection
pda
security
12,917 Views
Last week's earthquake in Haiti reminds us all how fragile systems can be. Part of a complete Information Infrastructure is Information Security. Back in 2006, IBM [ acquired Internet Security Services ]. This week, IBM announces two sets of ISS Data...
from Blog: Inside System Storage
|
|
Mobile Computing with Security Community Blog
JaggiD
Tags:
pda
mobile
security
protection
portable
wireless
encryption
devices
testing
byod
usb
computing
infrastructure
10,109 Views
Introduction Mobile computing has brought nearly every aspect of desktop computing in user’s pocket. At personal level, the convenience to speak, on-the-go, texting, and availability of direct person. At work level, productivity and availability of employees...
from Blog: developerWorks India
|
|
New version of IBM BigFix Protection (formerly known as Core Protection Module) is released Community Blog |
|
Pass XML unmodified with XML Threat Protection and Validation
This posting is a followup on "Processing binary data in DataPower stylesheets 2/x (CDATA pass-thru + XML threat protection) https://www.ibm.com/developerworks/mydeveloperworks/blogs/HermannSW/entry/processing_binary_data_in_datapower_stylesheets_2_x_c...
from Blog: HermannSW
|