Disaster Recovery White Papers

A Disaster Recovery Plan covers the data, hardware and software critical for a business to restart operations in the event of a natural or human-caused disaster. It should also include plans for coping with the unexpected or sudden loss of key personnel.
Results 1 - 25 of 359Sort Results By: Published Date | Title | Company Name
By: Kaspersky     Published Date: Feb 14, 2014

Kaspersky Lab's latest whitepaper, "Cutting Complexity – Simplifying Security" looks at how the latest IT Systems Management solutions can simplify and automate a vast range of routine IT management tasks.

Tags : security, network security, kaspersky, hackers, firewall, disaster recovery, hacker detection, internet security
    
By: IBM     Published Date: Mar 07, 2014

2 Page Written Case Study on Consolidated Communications that discusses the challenges they were facing and how IBM's Predictive Insights capability helped them find problems in their network infrastructure before they actually occurred.

Tags : consolidated communications, ibm, predictive insights, infrastructure, problem solving, network, business continuity, disaster recovery
    
By: IBM     Published Date: Feb 27, 2014

Learn how to protect your organization from the most sophisticated attacks and make sure your implementing the right security measures for your business.

Tags : attacks, sophisticated attacks, security, security incident, data, network, corporate brand, ibm
    
By: McAfee     Published Date: Jan 28, 2014

SANS Institute looks at how network attacks can be avoided by utilizing a SIEM platform that combines historical data with real-time data from network sources and security policies for better, more accurate reporting.

Tags : siem, sans, endpoint, network, correlation, integration, anti spyware, anti virus
    
By: ADP AdvancedMD     Published Date: Jan 02, 2014

One natural disaster could devastate a small private practice. Due to limited resources, physicians must design and implement a comprehensive, effective disaster recovery plan (DRP). Identifying potential areas of risk, creating contingency plans, and testing DRPs is the only way to protect a practice in the event of a disaster. Additionally, investing in the right technology is critical for small businesses when regaining operations after an unexpected downtime.

Tags : disaster recovery, disaster recovery planning, cloud advancedmd, security, data recovery plan, information technology, practice management
    
By: Thawte     Published Date: Dec 20, 2013

Learn how you can build customer confidence around Internet security. This guide will explain the various ways in which your business can benefit if you secure your MSIIS server with a Thawte digital certificate.

Tags : security, ms iis, access control, anti spam, anti spyware, anti virus, application security, auditing
    
By: VMware, Inc     Published Date: Dec 05, 2013

Executive Summary: In November 2012, Vmware Commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) enterprises may realize by deploying Vmware vCenter Site Recovery Manager (SRM). The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the VMware vCenter Site Recovery Manger on their organizations. Please download the white paper to learn more.

Tags : vmware, roi, return on investment enterprises, vmware vcenter site recovery manager, forrester consulting. srm, networking, it management, knowledge management
    
By: VMware, Inc     Published Date: Dec 05, 2013

PC life-cycle management (PCLM) solutions primarily focus on deploying or moving an application or an operating environment to a new user location. Functions include packaging, distributing, installing , and updating an application or an operating environment. These solutions provide a certain level of automation and are certainly more advanced than dealing strictly with scripts. However, they have complex workflows and do not provide the highest level of automation. In today's multidevice world, where the average user carries three or more devices, this paradigm alone is not agile enough for modern end users.

Tags : vmware, pc life-cycle management, pclm, operating environment, automation, layered desktop images, automatic synchronize, datacenter backup
    
By: VMware, Inc     Published Date: Dec 05, 2013

VMware® Horizon Mirage™ is a layered image management solution that separates a PC into logical layers that either IT or the user own and manage. IT-owned layers are typically OS and corporate applications while user-owned layers consist of their own files and applications. The Horizon Mirage solution enables: • Updates to individual IT-managed layers, such as core operating system files and common business applications, without disrupting other layers, all while maintaining user data and installed applications. • Simpler backup by taking snapshots of layered images, enabling desktop disaster recovery and helping to ensure continued end-user productivity.

Tags : vmware, horizon mirage, image management solutions, it-owned layers, corporate applications, it-manged layers, core operating system files, desktop disaster recovery
    
By: CA Technologies     Published Date: Nov 19, 2013

Learn how to handle the hidden complexities virtualization introduces to backup and recovery requirements and how to refine your disaster recovery process.

Tags : backup, recovery, virtualization, storage, public cloud, disaster recovery, ca arcserve backup, server virtualization
    
By: CA Technologies     Published Date: Nov 19, 2013

Learn how to properly select an IT solution for your organization in 5 easy steps in order to cut costs and improve productivity.

Tags : backup, backup storage, cloud storage, disaster recovery, infrastructure visualization, ca arcserve backup, server virtualization, storage virtualization
    
By: Qualys     Published Date: Nov 05, 2013

Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.

Tags : qualys, security, cloud, internet ecosystem, cloud computing, cloud based services, cloud solutions, cloud services
    
By: SunGard Availability Services     Published Date: Oct 30, 2013

Learn a four-pronged approach to create a disaster recovery plan for your hybrid IT environments to help ensure successful recoveries of your data and applications.

Tags : sungard, sungard availability service, disaster recovery, complex it environment, hybrid it environment, it environment, recovery time objective, rto
    
By: SunGard Availability Services     Published Date: Oct 30, 2013

Learn 5 strategies to efficiently communicate Disaster Recovery to your C-Level Executives in order to protect your organization from data center interruptions.

Tags : sungard, sungard availability services, disaster recovery, it recovery, data loss protection, disaster recovery program, managed recovery program, risk mitigation
    
By: SunGard Availability Services     Published Date: Oct 30, 2013

Learn the 10 strategies for selecting a disaster recovery service provider to ensure that your organization will be better protected should a natural disruption occur.

Tags : sungard, sungard availability services, disaster recovery, disaster recovery provider, disaster recovery service provider, dr plan, drsp, business impact analysis
    
By: SunGard Availability Services     Published Date: Oct 30, 2013

Learn how an East Coast University and a prominent healthcare provider were able to maintain their IT availability during Hurricane Sandy with a comprehensive Disaster Recovery Program.

Tags : sungard, sungard availability service, enterprise resilency, application recovery, disaster recovery, productivity, it management, recovery
    
By: Silver Peak     Published Date: Oct 28, 2013

Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication that can: • Meet Recovery Point Objectives (RPO) by reducing remote replication times by up to 20X • Reduce bandwidth costs and extend replication distances • Lower storage costs while increasing storage flexibility • Leverage emerging cloud and virtualization technologies for better offsite disaster recovery Hear from the experts and users at Dell Compellent, Silver Peak and AlaskaUSA discuss essential data replication strategies and technologies.

Tags : silver peak, data, data replication, remote, optimize, rpo, business operations, disaster recovery
    
By: IBM     Published Date: Oct 10, 2013

Will your disaster recovery plan work when the time comes? It's a hard determination for any organization to make. But in IBM's experience, the answer is often "no." Disaster recovery plans often fail because organization have based their recovery strategies on outdated assumptions. Read this white paper to learn seven common misconceptions about disaster recovery. You'll also discover how new technologies can help modernize disaster recovery efforts.

Tags : avoid pitfalls, business pitfalls, disaster recovery, recovery plans, business recovery, evolving business, business expectations, business threats
    
By: IBM     Published Date: Oct 10, 2013

Many IT executive view cloud computing as an attractive platform for data backup. They know cloud can help protect business-critical data and provide near-ubiquitous information access. But while having a cloud-based solution is valuable, developing one in-house is tricky. That's why many organizations want to contract with a third-party cloud provider for cloud-based data backup. Read this buyer's guide to learn how to choose a provider to suit your business needs.

Tags : cloud based, data backup, cloud based data, buyers guide, third-party provider, business development, cloud computing, information access
    
By: IBM     Published Date: Oct 10, 2013

The necessity of building a disaster recovery model to ensure that services can be delivered nonstop with minimal data loss is not easy or inexpensive. Read this research report to learn how the cloud offers companies an alternative, allowing for rapid recovery and minimal data loss, and without the high costs.

Tags : forrester, analyst report, cloud-based, disaster recovery, barriers and drivers, recovery barriers, recovery drivers, enterprise
    
By: IBM     Published Date: Oct 10, 2013

Service engagement guide for the Virtualization Efficiency Study.

Tags : virtualization, it infrastructure, ves, service engagement, ibm, virtualization efficiency, disaster recovery, cloud computing
    
By: IBM     Published Date: Oct 10, 2013

Disaster recovery has become a necessary component of organizations' IT plans, but that flat IT budget makes it harder and harder to protect critical business applications. Read this white paper to learn how cloud-based business resilience can provide cost-effective alternatives to traditional disaster recovery.

Tags : disaster recovery, cloud computing, ibm, backup, smartcloud virtualized server recovery, vulnerability management, virtualization, data loss prevention
    
By: Dell Software     Published Date: May 28, 2013

If your IT isn’t 100% virtualized, you’re stuck managing backups both for virtual and physical. So how do you balance ease-of-use with staying ahead of the curve? We drew upon the best research to help you find the optimal solution for your organization: Vendor Landscape: Virtual Backup Software.

Tags : dell quest, data backup, virtual backup, backup software, vendor landscape, infrastructure, disaster recovery, quality assurance
    
By: EMC     Published Date: Apr 18, 2013

The RSA business continuity white paper, BCM Regulatory Soup, will help you address: Which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.

Tags : rsa, business continuity, disaster recovery, bcm, regulatory, compliance, anti spam, anti spyware
    
By: EMC     Published Date: Apr 18, 2013

See for yourself how easy it is to implement RSA Archer Business Continuity Management & Operations right out of the box. Try it free for 30 days, then take advantage of the special purchase offer through 7/31/13.

Tags : business continuity, disaster recovery, encryption, hacker detection, high availability, identity management, internet security, intrusion detection
    
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End

Related IT Whitepaper Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.