Your Search returned 1 results from our Editorial content

Sort By

MESSAGING SECURITY

Mimecast’s Next Trick: Unlocking Unstructured Data

Many pundits expect Peter Bauer to float Mimecast but his ambitions are bigger than that

   

Your Search returned 36 results from our White Paper Library

Sort By
Vision Solutions

Data Recovery

Disaster Recovery and Availability Technologies for AIX...

Discover the Net-Generation disaster recovery technologies for IBM Power Systems. Read this white paper to know how managers of IBM i (i5/OS) and AIX environments...


Vision Solutions

Security

All that you wanted to know about IBM i (System i/iSeries)...

Do you want to explore the powerful business continuity technology of System i high availability? Then this paper can give you an overview of IBM System...


EMC Corporation

Data Deduplication

The ROI of Backup Redesign Using Deduplication: An EMC Data...

This IDC White Paper takes a look at the specific business value associated with using Data Domain systems as part of rapidly evolving backup and data...


Symantec Corporation

Data Deduplication

Reduce the Cost of Storage

This white paper can help you reduce the cost of storage and cope with ever growing data in the enterprise. Learn how to grow data capacity cost-effectively...


Imation

Disk Storage Systems

Imation RDX Solutions: A Scalable Approach to SMB Data Protection...

This white paper introduces a data protection solution which utilizes RDX technology to provide the benefits of disk and tape backup. Discover a cost-effective...


Informatica

Information Lifecycle Management

Archiving Best Practices: 9 Steps to Successful Application...

This white paper describes why data archiving provides a highly effective application information lifecycle management (ILM) solution and how to implement...


Imation

Disk Storage Systems

A Scalable Approach To SMB Data Protection

Learn why an Imation RDX solution is the perfect scalable solution for SMBs with limited resources.


Previous 1 3 4

Blogs

jon-collins

Thinking Different

In 2016, get ready for the mobile API explosion

Jon Collins’ in-depth look at tech and society

phil-muncaster

China Rising

How far can China push its bid to control the internet?

Phil Muncaster reports on China and beyond

no-image

Most Recent Comments

no-image

Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/775/aruba-networks
  • /view_company_report/1450/carbon-black
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/506/qualys
  • /view_company_report/391/silver-peak-systems
  • /view_company_report/2095/simply-hired
  • /view_company_report/419/splunk
  • /view_company_report/1352/tegile-systems

Poll

Does Altruistic Malware introduce more risk despite good intentions?