Disaster Recovery White Papers

A Disaster Recovery Plan covers the data, hardware and software critical for a business to restart operations in the event of a natural or human-caused disaster. It should also include plans for coping with the unexpected or sudden loss of key personnel.
Results 1 - 25 of 374Sort Results By: Published Date | Title | Company Name
By: Symantec     Published Date: Nov 19, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage management, disaster recovery
    
By: Zerto     Published Date: Oct 22, 2014

A simpler approach to DR! Compare hypervisor-based replication to guest/OS-based and array-based replication. Read about Zerto’s easy integration with VMware.

Tags : zerto, vmware, virtualization, data center, virtual replication, replication, business continuity, disaster recovery
    
By: Symantec     Published Date: Oct 20, 2014

This paper examines the advantages that the integration of Red Hat Enterprise Virtualization and Symantec Cluster Server provides to address application high availability and disaster recovery for virtualized environments.

Tags : symantec, red hat, virtualization, disaster recovery, clustering, virtualized applications, network security, backup and recovery
    
By: Symantec     Published Date: Oct 20, 2014

In this report, we'll present the results of a 3rd party benchmark test that looks into how a few of the most respected solutions out there fared across five very real-world test scenarios to determine who really is the King of Scale. Read the benchmark report to learn more.

Tags : symantec, data protection, backup and recovery, disaster recovery, data center, network security, email security
    
By: Websense     Published Date: Oct 06, 2014

This paper provides the seven stages of advanced threats and helps in the understanding the cyber attack kill chain

Tags : apts, understanding apts, apt security strategy, stages of advanced threats, anti spam, anti spyware, anti virus, application security
    
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: NaviSite     Published Date: Sep 02, 2014

This paper defines seven steps - sequentially - that have been tested and refined, to help you develop a cloud security plan.

Tags : cloud security, developing a cloud security plan, cloud security steps, managed cloud services, application security, disaster recovery, high availability, internet security
    
By: HP     Published Date: Aug 29, 2014

This Business white paper acts as a guide to help SMBs choose the right Cloud Backup service for their business.

Tags : cloud backup, choosing cloud backup, comparing cloud backup vendors, a guide to choosing cloud backup, backup and recovery, disaster recovery, cloud computing, infrastructure
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper debunks 7 virtualization DR myths

Tags : virtualization myths, disaster recovery, back up, high availability, virtual servers, data protection, backup and recovery, clustering
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper will help you navigate the virtualization solutions available and explain how Hyper-V can benefit you.

Tags : backup, high availability, disaster recovery, virtualization software, hyper-v, backup and recovery, clustering, network attached storage
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper explores the market leading solutions available for data protection and recoverability.

Tags : data protection, data recovery, geocluster, data cluster. failover clustering, storage, backup and recovery, clustering, storage management
    
By: Vision Solutions     Published Date: Aug 26, 2014

This executive overview aims to detail how systems migrations are inevitable through upgrades, but business downtime isn't.

Tags : systems migrations, business downtime, system migration, business continuity, vision solutions, storage virtualization, disaster recovery, high availability
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper will lead you through 3 essential steps to help ensure business continuity and survival.

Tags : guide to recovery, business continuity, disaster recovery, downtime, business impact of downtime, system migration, system upgrading, vision solutions technology
    
By: Vision Solutions     Published Date: Aug 21, 2014

A report on research findings into the state of resilience and methods used companies to ensure their strength.

Tags : data management strategies, data protection, system migrations, data safeguarding, backup and recovery, clustering, business continuity, disaster recovery
    
By: XO Communications     Published Date: Jul 17, 2014

The cloud has gone mainstream, 75% of businesses are using or plan to use cloud based services. More Enterprises are adopting multi-cloud environments, 50% of IT leaders plan on using four or more cloud-based services.

Tags : cloud, network, software, backup, disaster recovery, security, network architecture, tcp/ip protocol
    
By: XO Communications     Published Date: Jul 17, 2014

Bank Administration Institute (BAI) is a financial services association that offers expertise in retail banking, payments and regulatory compliance.

Tags : bai, streamlines, data, backup, disaster, recovery, financial services, retail banking
    
By: HP     Published Date: Jun 27, 2014

Following a series of in-depth interviews with Senior IT professionals in various industries this video provides their findings and the direct and in-direct value derived from using HPs Backup, Recovery and Archiving solutions.

Tags : backup, recovery and archiving, hp solutions, storage, backup and recovery, storage area networks, storage management, storage virtualization
    
By: Symantec     Published Date: Apr 09, 2014

This IDC Executive Brief will discuss the evolution and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

Tags : symantec, unified data protection, data protection, virtualization security, virtual environment, backup, backup and recovery, storage virtualization
    
By: IBM     Published Date: Mar 07, 2014

2 Page Written Case Study on Consolidated Communications that discusses the challenges they were facing and how IBM's Predictive Insights capability helped them find problems in their network infrastructure before they actually occurred.

Tags : consolidated communications, ibm, predictive insights, infrastructure, problem solving, network, business continuity, disaster recovery
    
By: IBM     Published Date: Feb 27, 2014

Learn how to protect your organization from the most sophisticated attacks and make sure your implementing the right security measures for your business.

Tags : attacks, sophisticated attacks, security, security incident, data, network, corporate brand, ibm
    
By: McAfee     Published Date: Jan 28, 2014

SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.

Tags : siem, sans, endpoint, network, correlation, integration, anti spyware, anti virus
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: VMware, Inc     Published Date: Dec 05, 2013

Executive Summary: In November 2012, Vmware Commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying Vmware vCenter Site Recovery Manager (SRM). The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the VMware vCenter Site Recovery Manger on their organizations. Please download the white paper to learn more.

Tags : vmware, roi, return on investment enterprises, vmware vcenter site recovery manager, forrester consulting. srm, networking, it management, knowledge management
    
By: VMware, Inc     Published Date: Dec 05, 2013

PC life-cycle management (PCLM) solutions primarily focus on deploying or moving an application or an operating environment to a new user location. Functions include packaging, distributing, installing , and updating an application or an operating environment. These solutions provide a certain level of automation and are certainly more advanced than dealing strictly with scripts. However, they have complex workflows and do not provide the highest level of automation. In today's multidevice world, where the average user carries three or more devices, this paradigm alone is not agile enough for modern end users.

Tags : vmware, pc life-cycle management, pclm, operating environment, automation, layered desktop images, automatic synchronize, datacenter backup
    
By: VMware, Inc     Published Date: Dec 05, 2013

VMware® Horizon Mirage™ is a layered image management solution that separates a PC into logical layers that either IT or the user own and manage. IT-owned layers are typically OS and corporate applications while user-owned layers consist of their own files and applications. The Horizon Mirage solution enables: • Updates to individual IT-managed layers, such as core operating system files and common business applications, without disrupting other layers, all while maintaining user data and installed applications. • Simpler backup by taking snapshots of layered images, enabling desktop disaster recovery and helping to ensure continued end-user productivity.

Tags : vmware, horizon mirage, image management solutions, it-owned layers, corporate applications, it-manged layers, core operating system files, desktop disaster recovery
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.