Business Continuity White Papers

Business Continuity Planning (BCP) is a methodology used to create a plan for how an organization will resume partially or completely interrupted critical function(s) within a predetermined time after a disaster or disruption. BCP may be a part of a larger organizational effort to reduce operational risk associated with poor information security controls, and thus has a number of overlaps with the practice of risk management.
Results 1 - 25 of 269Sort Results By: Published Date | Title | Company Name
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Kaspersky     Published Date: Feb 14, 2014

Watch this video to discover exclusive market insights from independent analyst Kevin Bailey, Research Director, IDC, on the growing challenges faced by IT managers. Kaspersky Lab experts also provide an overview into how Kaspersky is tackling these challenges head on.

Tags : it security, webinar, free video, security, data protection, business security, business continuity, internet security
    
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection".

Tags : business protection, data protection, business security, it security, business continuity, database security, secure content management
    
By: Comcast     Published Date: Apr 26, 2013

Learn how to select the most optimal business Ethernet service in this 9 step guide that will show you how to meet your many application needs while reducing costs.

Tags : ethernet, wan, wide area network, productivity, business continuity, network, customer satisfaction, bandwidth management
    
By: Lancope     Published Date: Jun 21, 2014

Join us on June 25th at 2PM BST to find out how to detect sophisticated cyber attacks using network logging technologies and learn how you can use these technologies to create an audit trail of network activity.

Tags : lancope, cyberattack, cyber criminals, network security, hackers, audit trail, cyber audit, network intelligence
    
By: Cisco     Published Date: Jun 16, 2014

A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth

Tags : cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, business continuity
    
By: Cisco     Published Date: Jun 16, 2014

A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth.

Tags : cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, application security
    
By: Mimecast     Published Date: May 15, 2014

Best practices for the safe and secure use of file sharing services for organisations.

Tags : file sharing security, file sharing services, best practices, storage services, backup and recovery, storage management, business continuity, email security
    
By: Mimecast     Published Date: May 15, 2014

This report aims to provide a fair and balanced analysis of Microsoft Office 365, its advantages, disadvantages and limitations that can be managed through third party services.

Tags : limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control, access control
    
By: Mimecast     Published Date: May 15, 2014

A report into the downtime in email systems, its impacts and the relevant solutions.

Tags : email continuity, microsoft office 365, mimecast, continuity plans, email downtime, business continuity, email security, email archiving
    
By: Mimecast     Published Date: May 15, 2014

A Forrester total economic impact study of Mimecast's UEM solution.

Tags : unified email management, uem, mimecast, microsoft office 365, email providers, email security, archiving, continuity
    
By: Turn     Published Date: May 06, 2014

What’s the best way to keep your brand safe while running cost-effective campaigns? How do you maximize reach and scale while avoiding undesirable contexts?

Tags : dwa, smart market, brand protection, digital advertising, unprecedented reach, deploy campaign, protection strategy, safeguards
    
By: VictorOps     Published Date: Apr 30, 2014

Once businesses understand the value of uptime, they can substitute data for instinct when calculating operational expenses. This on-demand webinar will provide simple steps businesses can use to produce hard numbers and discuss the ways in which they can apply that data to evaluate and justify spending.

Tags : victorops, operational costs, operational expenses, business continuity, uptime, downtime, performance management, it spending
    
By: IBM     Published Date: Mar 07, 2014

2 Page Written Case Study on Consolidated Communications that discusses the challenges they were facing and how IBM's Predictive Insights capability helped them find problems in their network infrastructure before they actually occurred.

Tags : consolidated communications, ibm, predictive insights, infrastructure, problem solving, network, business continuity, disaster recovery
    
By: Mashery     Published Date: Feb 06, 2014

Enterprise IT faces a new kind of tension: the API economy on the one hand, where enterprises drive new revenue streams by (gulp) publishing corporate data APIs for third-party developers to use, and SOA on the other, where tight governance is the name of the game. But the loose coupling in RESTful web services forces a discipline all its own.

Tags : mashery, apis, soa, api strategy, define goals, iterating, it management, data and content
    
By: IBM     Published Date: Jan 02, 2014

Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inability to quickly access and analyze the information they require. This data typically includes a combination of personal and corporate data locked in various enterprise systems. It exists in different formats and can be hard to analyze, change or share — making it difficult for people to get fast answers to business questions.

Tags : ibm, cognos insight guide, navigating data, interactivity, analytic functionality, enterprise analytics, personal analytics, customer service
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: VMware, Inc     Published Date: Dec 05, 2013

PC life-cycle management (PCLM) solutions primarily focus on deploying or moving an application or an operating environment to a new user location. Functions include packaging, distributing, installing , and updating an application or an operating environment. These solutions provide a certain level of automation and are certainly more advanced than dealing strictly with scripts. However, they have complex workflows and do not provide the highest level of automation. In today's multidevice world, where the average user carries three or more devices, this paradigm alone is not agile enough for modern end users.

Tags : vmware, pc life-cycle management, pclm, operating environment, automation, layered desktop images, automatic synchronize, datacenter backup
    
By: SunGard Availability Services     Published Date: Oct 30, 2013

Learn a four-pronged approach to create a disaster recovery plan for your hybrid IT environments to help ensure successful recoveries of your data and applications.

Tags : sungard, sungard availability service, disaster recovery, complex it environment, hybrid it environment, it environment, recovery time objective, rto
    
By: Mimecast     Published Date: Oct 17, 2013

This white paper discusses the important issues related to email and Office 365 continuity and offers recommendations for decision makers to consider as they develop their continuity plans. The paper also provides a brief overview of Mimecast, the sponsor of this paper, as well as their relevant solutions.

Tags : mimecast, unified email management, osterman research, business continuity, office 265 environments, email reliability, email downtime prevention, growth of office 365
    
By: IBM     Published Date: Oct 10, 2013

Will your disaster recovery plan work when the time comes? It's a hard determination for any organization to make. But in IBM's experience, the answer is often "no." Disaster recovery plans often fail because organization have based their recovery strategies on outdated assumptions. Read this white paper to learn seven common misconceptions about disaster recovery. You'll also discover how new technologies can help modernize disaster recovery efforts.

Tags : avoid pitfalls, business pitfalls, disaster recovery, recovery plans, business recovery, evolving business, business expectations, business threats
    
By: IBM     Published Date: Oct 10, 2013

The IBM Business Continuity Index rates the performance and maturity of business continuity programs. Organizations all over the world completed the survey. In this white paper, learn statistics about the global state of business continuity and where your business may sit on a scale from exposed to mature.

Tags : ibm, business continuity, business exposure, business maturity, exposure and maturity, global state, global exposure, business activity monitoring
    
By: Blue Coat Systems     Published Date: Aug 12, 2013

There is no question that security attacks targeting your organization will continue to grow and evolve. The question is, how can you respond to malware and other risks without unnecessarily constraining your workforce? How can you get beyond the fear and anxiety that leads to excessive prohibition, prevention, blocking, and excluding – so that you can use security technology to both protect and empower people? The answer is with a multi-layered defense – one that uses advanced security technologies and sophisticated operational practices in combination to cover the full spectrum of threat vectors. This solution brief explores the growing importance of multi-layered defense in today’s fast-changing web environment, and key considerations in implementing an effective multi-layered defense strategy.

Tags : av defense, blue coat, web environment, application security, business continuity, email security, ssl
    
By: Rapid7     Published Date: Jul 24, 2013

The Payment Card Industry (PCI) Data Security Standard (DSS) was created to confront the rising threat to credit cardholder personal information. This compliance guide will provide readers with an overview of the requirements as well as suggested steps in achieving PCI compliance.

Tags : rapid7, pci compliance, dss compliance, pci dss compliance, secure transactions, online payment security, security, payment processing
    
By: Box     Published Date: Jul 15, 2013

In this Forrester's Wave File Sync and Share Platforms Q3 2013 report, the global research and advisory firm evaluates 16 file sync and share vendors: Accellion, Acronis, AirWatch, Alfresco, Box, Citrix, Dropbox, Egnyte, EMC, Google, Hightail (formerly YouSendIt,) IBM, Microsoft, Novell, Salesforce.com and WatchDox.

Tags : best practices, file sync, file share, content management, remote access, business continuity, data protection, content management system
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End