enterprise storage

Results 276 - 300 of 328Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: May 30, 2008
Businesses need a better way to leverage information, manage analytic results and glean business insights across the enterprise.  Are you seeking a simple, flexible and optimized solution?  Watch this short video to learn about IBM's Balanced Warehouse -- the complete ‘ready-to-go’ data warehousing solution comprised of pre-tested, scalable and fully-integrated system components of DB2 Warehouse, Server and Storage.
Tags : 
business intelligence, data warehousing, warehouse, ibm, leveraging information, li campaign, ibm li
    
IBM
Published By: IBM     Published Date: Dec 03, 2008
Small and mid-sized businesses are dealing with larger volumes of data than ever before, but without the big enterprise budgets. What they need are budget-stretching solutions that reduce the complexities of data storage while being easy to use.
Tags : 
ibm, express seller, storage solutions, modular systems, ibm express advantage, ibm system storage, storage
    
IBM
Published By: IBM     Published Date: Dec 30, 2008
Research giant Forrester estimates that on average, data repositories for large applications grow by fifty percent annually. However, up to half of all that data can be duplicate or otherwise unnecessary. With no end in sight for the increase of raw data (both structured and unstructured), organizations must be ever more strategic about where and how to store enterprise information. Meanwhile, a tightening economy is putting pressure on costs, just as compliance mandates call for greater visibility into processes and data. What to do? Register for this Web Seminar to learn the four pillars of strategic storage, and how they can be used to simultaneously reduce costs, while improving speed, accuracy and accountability. The four pillars will be discussed in detail, with real-world examples of each: deep compression, database archiving,de-duplication thin provisioning.
Tags : 
strategic storage, ibm, enterprise information, deep compression, database archiving, de-duplication, thin provisioning, knowledge management, storage, data management
    
IBM
Published By: Sanbolic     Published Date: Aug 21, 2009
Enterprise data requirements grow at 50 - 100 percent a year, creating a constant storage infrastructure management challenge. As new storage is brought into the environment, it is typically added within inflexible single server-silos.
Tags : 
storage, storage area network, storage area networks, san, sans, ip san, ip networks, ip storage, storage infrastructure, cost control, data growth, flexible storage, sanbolic
    
Sanbolic
Published By: Neterion     Published Date: Dec 05, 2006
The demands on Storage Area Networks (SANs) go far beyond where they were only a few years ago. It is no longer good enough to just provide a large pool of scalable storage with good performance.
Tags : 
gigabit, storage area network, ethernet, sans, storage area networks, san, storage, disaster recovery, neterion
    
Neterion
Published By: Neterion     Published Date: Dec 05, 2006
The relentless growth of data and network-intensive applications such as digital imaging, multimedia content, and broadcast/video continues to drive volumes of enterprise data and network traffic. As growth continues, IT managers are challenged with implementing solutions without interrupting critical business processes.
Tags : 
network infrastructure, traffic management, bandwidth management, bandwidth, network management, neterion, networking
    
Neterion
Published By: digitiliti     Published Date: Apr 02, 2007
The challenge of managing, protecting and storing digital data is a major issue for businesses of every size and category. Companies generally rank the improvement of their storage infrastructure as a top objective, and the escalation of data protection costs has become an overriding concern. According to recent research, the data storage capacity of the average North American enterprise is now 59 terabytes, and the projected annual production data growth is 20 to 30 percent.
Tags : 
data storage, software, data security, data protection, enterprise software, storage, digitiliti, backup and recovery, data backup
    
digitiliti
Published By: Decru     Published Date: Apr 23, 2007
Company data is vulnerable to threats from - insiders, unauthorized access to data, data backup, off-site mirroring - just to name a few. Encrypting data at rest, on tape or disk, significantly mitigates these threats. This document provides guidance into some of the factors a company should consider when evaluating storage security technology and solutions.
Tags : 
storage, security, encryption, key management, protecting your data, security controls, networked storage environments, audit & logging, role based administration, secure access controls, enterprise security, data security, network security, storage management, authentication, standards compliance, security & privacy, security appliances, decru
    
Decru
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
CCU sought to encrypt its backup tapes for keeping customer data secure in transit and in storage at the offsite tape-vault vendor’s facility. As a financial institution, CCU was subject to stringent government regulations. With nearly 60 gigabytes of data to encrypt each night, CCU knew that a software solution was out of the question.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Given Payformance’s longstanding commitment to protecting the privacy of its clients’ information, the company has decided to investigate data encryption solutions for its primary hard drive storage and secondary backup tape storage. With its multi-vendor interoperability, NeoScale’s CryptoStor storage security appliances emerge as the obvious choice.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Chartered in 1973, San Francisco-based Spectrum Federal Credit Union serves over 12,000 members. When the issue arose on how to protect their members’ personal data residing on backup tapes, Spectrum FCU took no chances – they and their Techical Advisory Board made the decision to encrypt this important information with the help of NeoScale Systems, an undisputed leader in this emerging market.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Qsent needed to shore up its disaster recovery strategy. This meant sending backup tapes – each with more than 2.5 terabytes of data – between data centers and storing them offsite. To keep all its data safe and secure, Qsent chose NeoScale’s CryptoStor wire-speed tape security appliance to encrypt and decrypt data.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
With horror stories in the news every week about lost or stolen laptops and backup tapes, the senior management team at Oregon Community Credit Union knew they had to do everything within their powers to protect their critical data as it traveled offsite to a third-party tape vaulting vendor. They were tasked with finding an affordable solution that would strike a balance between security, ease of use, and scalability.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
As more states pass regulations governing the security, confidentiality, and integrity of customer data, a leading national bank has recognized its need to ensure the safety and security of personal data for its thousands of customers. To ensure compliance and maintain the security of this information, the bank has deployed NeoScale’s CryptoStor Tape appliances to help accomplish its objectives.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: TeraCloud     Published Date: Dec 11, 2007
Storage spawns where it is needed. This leaves IT to manage many islands of storage devices scattered across the enterprise. Compliance requirements, multimedia-rich applications, unstructured content and a proliferation of databases are pushing IT departments to increase the size and complexity of their storage networks. All of this is occurring at a time when the need for centralized storage management has never been greater.
Tags : 
storage, storage management, infrastructure, compliance, tsa, teracloud, teracloud storage analytics, san, storage area networks
    
TeraCloud
Published By: TeraCloud     Published Date: Dec 11, 2007
TSF delivers the first Java-enabled enterprise Storage Resource Management (SRM) solution that simplifies the administration and management of distributed and mainframe storage resources across the entire enterprise, from a single point of control. TSF helps you plan more effectively, lower administration costs, and puts you in control of your storage environment.
Tags : 
storage, srm, storage resource management, storage management, tsf, tsa, teracloud, teracloud storage, infrastructure, san, sans, storage area
    
TeraCloud
Published By: VMware Dell     Published Date: Jun 17, 2008
Faced with an aging set of servers within its IT infrastructure, United Bank and Trust decided to embrace virtualization as way to move forward. United deployed the VMware Infrastructure 3 solution together with an EqualLogic PS Series virtualized iSCSI SAN, which established an enterprise storage platform to achieve the high availability, data protection and performance required for United’s new generation, virtualized IT environment.
Tags : 
server, server virtualization, virtual machine, virtual server, vmware, equallogic, dell equallogic, virtualization, vmware, virtual infrastructure, x86
    
VMware Dell
Published By: VMware Dell     Published Date: Sep 30, 2008
This white paper describes a virtualized infrastructure that applies storage and server virtualization technologies to cost-effectively achieve a flexible, high performance, dynamic IT infrastructure that is simple to manage and scale.
Tags : 
vmware, dell, virtual server, virtual storage, equallogic, iscsi san, esx server, internet engineering task force (ietf)
    
VMware Dell
Published By: Diligent Technologies     Published Date: Apr 11, 2008
This document is intended for the use of Enterprise1 Storage Professionals, focused on Data Protection — Backup, Restore,DR and Archive operations — who are interested in evaluating the potential impact of de-duplication technologies to their business. There is much hyperbole associated with de-duplication. The purpose of this document is to help readers distill the essence from the hype, as the basis for sound decision-making.
Tags : 
diligent, diligent technologies, deduplication, de-duplication, data center, datacenter, data protection, storage, data management
    
Diligent Technologies
Published By: Red Hat     Published Date: Jan 20, 2011
In this session, attendees will explore the new features of Red Hat Enterprise Linux 6 performance. John Shakshober (Shak) will share the scalability optimizations for larger SMP systems, > 1TB of memory, new transparent hugepage support, multi-q network performance of 10Gbit and Infiniband, and KVM enhancements that went into Red Hat Enterprise Linux 6. Shak will also share benchmark data from industry standard workloads using common applications such as database servers, Java engines, and various financial applications on the latest Intel and AMD x86_64 hardware.
Tags : 
red hat, enterprise, linux 6 performance, memory, storage, database servers
    
Red Hat
Published By: HP and Intel® Xeon® processors     Published Date: Sep 06, 2011
Read this report to see how and why savvy enterprises are turning to tape-based storage for all their archiving needs.
Tags : 
hp + intel, storage technology, tape, data centers, data mobility group, archiving
    
HP and Intel® Xeon® processors
Published By: HP and Intel® Xeon® processors     Published Date: Sep 06, 2011
Read this report to better understand the unique file-based storage challenges these organizations face and possible solutions for overcoming them to achieve maximum ROI.
Tags : 
hp + intel, information assets, content driven enterprise, archiving, storage solutions, large content environments
    
HP and Intel® Xeon® processors
Published By: HP and Intel® Xeon® processors     Published Date: Aug 01, 2012
It is often said that a chain is only as strong as its weakest link. The corollary is also true-adding an ostensibly strong link to a weak chain doesn't necessarily deliver much tensile value. Yet, from all the rhetoric and hype, you might be forgiven for thinking that solid-state storage will single-handedly strengthen every weak storage chain, wherever the solid-state storage is and however it is used. Specification-based strength added to a weak chain will soon be exposed in the real world, whether it's a tug-of-war team or a storage system.
Tags : 
hp 3par storage, storage value chain, solid state, optimization, ssd, enterprise storage, i/o service, adaptive optimization, user relevance, enterprise applications, storage
    
HP and Intel® Xeon® processors
Published By: Dell Storage     Published Date: Apr 21, 2011
Enterprise Manager provides a single storage resource management (SRM) interface for one or more Compellent SANs. The software also integrates with VMware vCenter to enhance server and storage visibility and manageability. This demo video shows how to use Enterprise Manager to collect VM host and guest storage statistics from vCenter, create, map and rescan storage volumes, and then format the volumes with VMFS to create datastores or assign the volumes as RDMs to a virtual machine. (3 min)
Tags : 
dell compellent, vcenter integration, compellent enterprise manager, storage resource management, srm, vmware vcenter, server, storage, virtual machine
    
Dell Storage
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee