Cisco Systems Inc

Enterprise data News

View All News

Enterprise data Get Started

Bring yourself up to speed with our introductory content

View All Get Started

Evaluate Enterprise data Vendors & Products

Weigh the pros and cons of technologies, products and projects you are considering.

  • Mobile data backup helped by encryption, data policies

    More and more corporate data is being created and living on mobile devices such as tablets and smartphones. That dynamic requires a new approach to mobile data backup than protecting data stored on traditional servers.

    Interest in endpoint and mobile device data protection has intensified as more companies allow workers to use personal computing devices at work.

    Once considered an obscure novelty, smartphones and tablets have evolved into powerful tools with increasing storage capacity.

    As employees, contractors, partners and other authorized users access and manipulate data wherever they are, IT administrators scramble to ensure that corporate data remains safe and secure. The need for faster restores, more frequent data protection, data growth and other challenges has fueled the search for alternatives to traditional backup technologies.

    Mobile data backup technologies range from endpoint backup, file synchronization and sharing products and traditional on-premises backup with options for cloud-based replication.

    Mobile devices present significant challenges to backup administrators. Personal tablets and smartphones aren't connected to the corporate network at all times, which means extra effort must be taken to back them up during intermittent periods of connectivity.

    Backup storage processes that run against the device must be done in a way that doesn't interfere with the user's normal work activity. Lack of consistency across mobile devices is another challenge.

    Organizations need to adopt mobile device usage policies and deploy technologies that enhance data security and mobile device management. Mobile data protection products are often used with tiered storage, in which inactive data is moved automatically to low-cost storage.

     Continue Reading

  • How data obfuscation techniques can help protect enterprises

    Data obfuscation techniques can help enterprises protect corporate information and limit risks of data exposure or leaks. Expert Ajay Kumar explains how these techniques work. Continue Reading

  • How to determine which data governance tool best meets your needs

    This buyer's guide provides insights to help you determine if your organization could benefit from data governance software and how to navigate the buying process. Continue Reading

View All Evaluate

Manage Enterprise data

Learn to apply best practices and optimize your operations.

  • Digital governance and compliance tactics for the regulated business

    Digitization has become a fact life for businesses, but the increased data volumes and associated information security risks puts a strain on digital governance, risk and compliance (GRC) resources. Businesses have struggled as unprecedented data volumes in the digital age have made them particularly enticing -- and vulnerable -- to hackers. The big data explosion has also made it difficult for companies to adapt information governance processes to stay compliant with constantly evolving regulatory mandates. All is not lost, however: Predictive analytics and automation tools are evolving to help with GRC maintenance, while companies are also seeing the benefits of integrating risk management processes across company departments. In this SearchCompliance handbook, get advice on how to adapt your company's GRC budgeting and strategic processes to keep up with the speed of digital business. Continue Reading

  • Enterprise data protection strategy requires evolution

    Your enterprise data protection family tree must incorporate both data availability and data management branches. Continue Reading

  • Enterprise data protection strategy needs archive, backup

    Whether you use disk, tape or cloud in your enterprise data protection, where you send your archives and backups is up to you. Continue Reading

View All Manage

Problem Solve Enterprise data Issues

We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.

  • Compromised credentials: What can enterprises do?

    Attackers use compromised credentials to infiltrate enterprises undetected and steal corporate data. Expert Nick Lewis offers the best ways to handle this threat. Continue Reading

  • Can steganography techniques help attackers hide?

    Attackers may be looking to use steganography techniques to hide their malware. Expert Nick Lewis explains how they work and how to spot them. Continue Reading

  • Cybersecurity and privacy compliance: The delicate balance

    As information has transformed into a huge business asset for modern companies, it has come at a price: Data is now a target for hackers seeking sensitive information about enterprises and their customers. This new online data security focus has forced businesses to invest in resources that protect trade secrets and other company information. At the same time, ensuring personal privacy has become a top concern for consumer advocates, and data security initiatives sometimes infringe on personal information protection measures. For companies to be successful in the digital age, GRC resources must walk the fine line between adequate cybersecurity and privacy protection for both employees and customers. In this handbook, learn the latest data governance strategies to help organizations strike this balance necessary to protect both corporate and personal information. Continue Reading

View All Problem Solve

-ADS BY GOOGLE

SearchBusinessAnalytics

SearchAWS

SearchContentManagement

SearchOracle

SearchSAP

SearchSOA

SearchSQLServer

Close