Disaster Recovery White Papers

A Disaster Recovery Plan covers the data, hardware and software critical for a business to restart operations in the event of a natural or human-caused disaster. It should also include plans for coping with the unexpected or sudden loss of key personnel.
Results 1 - 25 of 386Sort Results By: Published Date | Title | Company Name
By: Netapp EMEA     Published Date: Mar 24, 2015

This paper illustrates how Cloud computing can support great technological and business improvements.

Tags : private storage, netapp, cloud computing, cloud data, hybrid architectures, data, public cloud, backup and recovery
    
By: Netapp EMEA     Published Date: Mar 24, 2015

This document describes the architecture of the NetApp Private Storage for Microsoft Azure solution and provides procedures for deploying and testing the solution.

Tags : netapp private storage, microsoft azure, infrastructure, cloud computing, solution architecture, azure expressroute, hybrid, equinix cloud exchange
    
By: Workday     Published Date: Mar 23, 2015

This whitepaper will help technology and business managers and executives understand the requirements for SaaS.

Tags : cloud applications, saas, cloud computing, critial requirements for saas, cloud providers, workday, cloud applications deliver real value, clous
    
By: Kaseya     Published Date: Mar 12, 2015

TechValidate invited over 6,300 IT Professionals to participate in a survey and provide insight about the current Backup and Disaster Recovery landscape.

Tags : backup, disaster recovery, it challenges, it solutions, automated data management, virtualization, big data, backup and recovery
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This Guide will help companies to improve the effectiveness of their existing strategy or are looking to make their first move into the cloud.

Tags : virtualisation, cloud computing, softward defined datacentres, software define networking, hybrid cloud, hybrid, cloud, cloud solutions
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This white paper reveals a list of top 10 trends in cloud computing to help you take advantage of all the greatest new innovations in cloud technology.

Tags : virtualisation, cloud computing, softward defined datacentres, software define networking, hybrid cloud, hybrid, cloud computing trends, cloud security
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This guide will help you understand what a disaster recovery plan is and how to effectively implement one for your business.

Tags : disaster recovery, risk reduction, disaster recovery plan, drp, how to create an effective drp, application security, security management, business management
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This paper will help you to understand the importance of creating a DRP for your company. This is a critical step in preparing for disaster, improving employee response, reducing downtime, and quickly returning to normalcy.

Tags : disaster recovery, risk reduction, disaster recovery plan, drp, how to create an effective drp, write a drp, steps to write a formal drp, backup and recovery
    
By: Macquarie Telecom     Published Date: Mar 30, 2015

This paper illustrates the difference between the two and what each can do to prepare companies for disaster.

Tags : disaster recovery, risk reduction, causes of disasters, how to avoid disasters, protect your business from disasters, test and measurement, backup and recovery, security management
    
By: Dell     Published Date: Jan 21, 2015

Public cloud adoption has been more of a grassroots affair, with individual developers or small teams identifying a requirement and using a credit card to rent the resources they think they need.

Tags : dell, hybrid cloud, cloud computing, cloud strategy, private cloud infrastructure, infrastructure, storage virtualization, disaster recovery
    
By: CA Technologies     Published Date: Jan 09, 2015

This paper provides an overview of new APIs risks, and offers five simple solutions to counter the common threats. By adopting a secure API architecture from the beginning, organizations can pursue an API strategy more safely and securely — and reap the benefits of agile integration promised by this exciting new technology.

Tags : apis, risks of apis, apis can increase organization's risks, api security, access control, anti spam, application security, disaster recovery
    
By: Copper River IT     Published Date: Dec 16, 2014

This white paper takes a close look at the importance of moving to an agile, high-performance, next-generation data center network with three key areas that need to be addressed in order to do so: The Data Center Interconnect, Cloud Connectivity, and Building Cloud-Aware Networks.

Tags : copper river, copper river it, data center, sdn, software defined networking, wan, networking, dci
    
By: Symantec     Published Date: Nov 19, 2014

This IDC White Paper explores the increased use and adoption patterns of PBBAs, both integrated and targeted, and the utility these appliances provide to customers in their data protection processes. In addition, this White Paper illuminates the customer value that Symantec's Backup Exec and NetBackup appliances bring to the data protection and recovery process.

Tags : purpose built backup appliances, pbbas, backup performance, data protection, data security, backup and recovery, storage management, disaster recovery
    
By: Zerto     Published Date: Oct 22, 2014

A simpler approach to DR! Compare hypervisor-based replication to guest/OS-based and array-based replication. Read about Zerto’s easy integration with VMware.

Tags : zerto, vmware, virtualization, data center, virtual replication, replication, business continuity, disaster recovery
    
By: Symantec     Published Date: Oct 20, 2014

This paper examines the advantages that the integration of Red Hat Enterprise Virtualization and Symantec Cluster Server provides to address application high availability and disaster recovery for virtualized environments.

Tags : symantec, red hat, virtualization, disaster recovery, clustering, virtualized applications, network security, backup and recovery
    
By: Symantec     Published Date: Oct 20, 2014

In this report, we'll present the results of a 3rd party benchmark test that looks into how a few of the most respected solutions out there fared across five very real-world test scenarios to determine who really is the King of Scale. Read the benchmark report to learn more.

Tags : symantec, data protection, backup and recovery, disaster recovery, data center, network security, email security
    
By: Websense     Published Date: Oct 06, 2014

This paper provides the seven stages of advanced threats and helps in the understanding the cyber attack kill chain

Tags : apts, understanding apts, apt security strategy, stages of advanced threats, anti spam, anti spyware, anti virus, application security
    
By: Thawte     Published Date: Oct 06, 2014

In this fraud alert paper, we’ll highlight the current trends in today’s phishing schemes, with a particular focus on the latest threats emerging from China. Then we’ll offer some ideas and best practices for applying technology to protect both yourself and your customers.

Tags : access control, anti spam, anti spyware, anti virus, application security, auditing, authentication, biometrics
    
By: NaviSite     Published Date: Sep 02, 2014

This paper defines seven steps - sequentially - that have been tested and refined, to help you develop a cloud security plan.

Tags : cloud security, developing a cloud security plan, cloud security steps, managed cloud services, application security, disaster recovery, high availability, internet security
    
By: HP     Published Date: Aug 29, 2014

This Business white paper acts as a guide to help SMBs choose the right Cloud Backup service for their business.

Tags : cloud backup, choosing cloud backup, comparing cloud backup vendors, a guide to choosing cloud backup, backup and recovery, disaster recovery, cloud computing, infrastructure
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper debunks 7 virtualization DR myths

Tags : virtualization myths, disaster recovery, back up, high availability, virtual servers, data protection, backup and recovery, clustering
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper will help you navigate the virtualization solutions available and explain how Hyper-V can benefit you.

Tags : backup, high availability, disaster recovery, virtualization software, hyper-v, backup and recovery, clustering, network attached storage
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper explores the market leading solutions available for data protection and recoverability.

Tags : data protection, data recovery, geocluster, data cluster. failover clustering, storage, backup and recovery, clustering, storage management
    
By: Vision Solutions     Published Date: Aug 26, 2014

This executive overview aims to detail how systems migrations are inevitable through upgrades, but business downtime isn't.

Tags : systems migrations, business downtime, system migration, business continuity, vision solutions, storage virtualization, disaster recovery, high availability
    
By: Vision Solutions     Published Date: Aug 26, 2014

This paper will lead you through 3 essential steps to help ensure business continuity and survival.

Tags : guide to recovery, business continuity, disaster recovery, downtime, business impact of downtime, system migration, system upgrading, vision solutions technology
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.