Business Continuity White Papers

Business Continuity Planning (BCP) is a methodology used to create a plan for how an organization will resume partially or completely interrupted critical function(s) within a predetermined time after a disaster or disruption. BCP may be a part of a larger organizational effort to reduce operational risk associated with poor information security controls, and thus has a number of overlaps with the practice of risk management.
Results 1 - 25 of 272Sort Results By: Published Date | Title | Company Name
By: Zerto     Published Date: Oct 22, 2014

A simpler approach to DR! Compare hypervisor-based replication to guest/OS-based and array-based replication. Read about Zerto’s easy integration with VMware.

Tags : zerto, vmware, virtualization, data center, virtual replication, replication, business continuity, disaster recovery
    
By: Comcast     Published Date: Apr 26, 2013

Learn how to select the most optimal business Ethernet service in this 9 step guide that will show you how to meet your many application needs while reducing costs.

Tags : ethernet, wan, wide area network, productivity, business continuity, network, customer satisfaction, bandwidth management
    
By: Websense     Published Date: Oct 06, 2014

This paper provides the seven stages of advanced threats and helps in the understanding the cyber attack kill chain

Tags : apts, understanding apts, apt security strategy, stages of advanced threats, anti spam, anti spyware, anti virus, application security
    
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper debunks 7 virtualization DR myths

Tags : virtualization myths, disaster recovery, back up, high availability, virtual servers, data protection, backup and recovery, clustering
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper will help you navigate the virtualization solutions available and explain how Hyper-V can benefit you.

Tags : backup, high availability, disaster recovery, virtualization software, hyper-v, backup and recovery, clustering, network attached storage
    
By: Vision Solutions     Published Date: Aug 26, 2014

This executive overview aims to detail how systems migrations are inevitable through upgrades, but business downtime isn't.

Tags : systems migrations, business downtime, system migration, business continuity, vision solutions, storage virtualization, disaster recovery, high availability
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper will lead you through 3 essential steps to help ensure business continuity and survival.

Tags : guide to recovery, business continuity, disaster recovery, downtime, business impact of downtime, system migration, system upgrading, vision solutions technology
    
By: Vision Solutions     Published Date: Aug 21, 2014

A report on research findings into the state of resilience and methods used companies to ensure their strength.

Tags : data management strategies, data protection, system migrations, data safeguarding, backup and recovery, clustering, business continuity, disaster recovery
    
By: Lancope     Published Date: Jun 21, 2014

Join us on June 25th at 2PM BST to find out how to detect sophisticated cyber attacks using network logging technologies and learn how you can use these technologies to create an audit trail of network activity.

Tags : lancope, cyberattack, cyber criminals, network security, hackers, audit trail, cyber audit, network intelligence
    
By: Cisco     Published Date: Jun 16, 2014

A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth

Tags : cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, business continuity
    
By: Cisco     Published Date: Jun 16, 2014

A customer case study on MacArthur Corporation and how they Secured Internet Use in Cloud to Relieve Network Congestion without Adding Bandwidth.

Tags : cisco isr g2, cisco cloud web security, network performance, reducing outages, internet access, network security, integrated services routers, application security
    
By: Kaspersky     Published Date: May 20, 2014

You want to maximize the potential offered by new technologies and establish an advantage over your competitors, but you know the latest IT developments can also bring new security challenges. This practical guide helps you align essential IT security with your core business objectives

Tags : kaspersky, security, business security, hackers, antispam, malware, network security, mobile security
    
By: Mimecast     Published Date: May 15, 2014

Best practices for the safe and secure use of file sharing services for organisations.

Tags : file sharing security, file sharing services, best practices, storage services, backup and recovery, storage management, business continuity, email security
    
By: Mimecast     Published Date: May 15, 2014

This report aims to provide a fair and balanced analysis of Microsoft Office 365, its advantages, disadvantages and limitations that can be managed through third party services.

Tags : limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control, access control
    
By: Mimecast     Published Date: May 15, 2014

A report into the downtime in email systems, its impacts and the relevant solutions.

Tags : email continuity, microsoft office 365, mimecast, continuity plans, email downtime, business continuity, email security, email archiving
    
By: Mimecast     Published Date: May 15, 2014

A Forrester total economic impact study of Mimecast's UEM solution.

Tags : unified email management, uem, mimecast, microsoft office 365, email providers, email security, archiving, continuity
    
By: IBM     Published Date: Mar 07, 2014

2 Page Written Case Study on Consolidated Communications that discusses the challenges they were facing and how IBM's Predictive Insights capability helped them find problems in their network infrastructure before they actually occurred.

Tags : consolidated communications, ibm, predictive insights, infrastructure, problem solving, network, business continuity, disaster recovery
    
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab has created an eBook to help you calculate the true cost of protecting your business infrastructure, intelligence, and reputation. Download "IT Security by the Numbers: Calculating the Total Cost of Protection".

Tags : business protection, data protection, business security, it security, business continuity, database security, secure content management
    
By: IBM     Published Date: Jan 02, 2014

Business users need a simple but powerful way to navigate through data and find the insights to make timely, critical business decisions. Unfortunately, many users have become frustrated at their inability to quickly access and analyze the information they require. This data typically includes a combination of personal and corporate data locked in various enterprise systems. It exists in different formats and can be hard to analyze, change or share — making it difficult for people to get fast answers to business questions.

Tags : ibm, cognos insight guide, navigating data, interactivity, analytic functionality, enterprise analytics, personal analytics, customer service
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: VMware, Inc     Published Date: Dec 05, 2013

PC life-cycle management (PCLM) solutions primarily focus on deploying or moving an application or an operating environment to a new user location. Functions include packaging, distributing, installing , and updating an application or an operating environment. These solutions provide a certain level of automation and are certainly more advanced than dealing strictly with scripts. However, they have complex workflows and do not provide the highest level of automation. In today's multidevice world, where the average user carries three or more devices, this paradigm alone is not agile enough for modern end users.

Tags : vmware, pc life-cycle management, pclm, operating environment, automation, layered desktop images, automatic synchronize, datacenter backup
    
By: SunGard Availability Services     Published Date: Oct 30, 2013

Learn a four-pronged approach to create a disaster recovery plan for your hybrid IT environments to help ensure successful recoveries of your data and applications.

Tags : sungard, sungard availability service, disaster recovery, complex it environment, hybrid it environment, it environment, recovery time objective, rto
    
By: Mimecast     Published Date: Oct 17, 2013

This white paper discusses the important issues related to email and Office 365 continuity and offers recommendations for decision makers to consider as they develop their continuity plans. The paper also provides a brief overview of Mimecast, the sponsor of this paper, as well as their relevant solutions.

Tags : mimecast, unified email management, osterman research, business continuity, office 265 environments, email reliability, email downtime prevention, growth of office 365
    
By: IBM     Published Date: Oct 10, 2013

Will your disaster recovery plan work when the time comes? It's a hard determination for any organization to make. But in IBM's experience, the answer is often "no." Disaster recovery plans often fail because organization have based their recovery strategies on outdated assumptions. Read this white paper to learn seven common misconceptions about disaster recovery. You'll also discover how new technologies can help modernize disaster recovery efforts.

Tags : avoid pitfalls, business pitfalls, disaster recovery, recovery plans, business recovery, evolving business, business expectations, business threats
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11    Next    End