Home >
> Disaster Recovery |
|
|
A Disaster Recovery Plan covers the data, hardware and software critical for a business to restart operations in the event of a natural or human-caused disaster. It should also include plans for coping with the unexpected or sudden loss of key personnel. |
|
|
Results 1 - 25 of 110 matches |
Sort Results By : Published Date | Title | Company name |
|
|
Free Whitepaper: The Case of Lost Laptops |
By : Dell. |
Published Date: Aug 25, 2008 |
|
What would employees at your business do if they lost their laptops or other portable data-bearing devices? What steps would they take after learning about the loss or theft? What have they done to protect or backup the information they carry? All these questions and more are answered in this free download. Learn more today!
Download Now
|
|
|
|
Free Trial Download: Acronis Backup & Recovery 10 Server for Windows |
|
Acronis® Backup & Recovery™ 10 Server for Windows is the next-generation disaster recovery product, designed to back up and protect stand-alone Windows Servers. Download this demo software to learn how Acronis Backup & Recovery™ 10 Server for Windows can help you recover the operating system, applications and all data in minutes after any unforeseen event.
Download Now
|
|
|
|
Free Trial Download: Acronis Backup & Recovery 10 Advanced Server |
|
"Engineered for enterprises of all sizes, Acronis Backup & Recovery 10 Advanced Server scales to thousands of machines. It provides organizations with advanced data backup and system recovery capabilities such as: data deduplication, enhanced security, operations dashboard, policy-based management, among others. Download this demo software to learn how Acronis Backup & Recovery 10 Advanced Server can help you simplify and automate backup and restore processes across Windows and Linux environments"
Download Now
|
|
|
|
Server Virtualization & Cloud Computing: Four Hidden Impacts on Uptime & Availability |
|
Cloud computing allows companies to use IT resources as a service, taking advantage of shared applications, processing and storage managed within the cloud - either inside a private cloud at an internal data center, or in an external cloud at a service provider. Greater robustness of the virtualized servers supporting this new IT model will ensure a resilient cloud infrastructure capable of delivering "on-demand" access to users.
Download Now
|
|
|
|
Understanding the HP Data Deduplication Strategy |
By : HP |
Published Date: May 21, 2009 |
|
Data deduplication technology represents one of the most significant storage enhancements in recent years, promising to reshape future data protection and disaster recovery solutions. Data deduplication offers the ability to store more on a given amount of storage and replicate data using lower bandwidth links at a significantly reduced cost. This white paper explains how deduplication technologies work in practice, the pros and cons of each approach, and when to choose a particular type.
Download Now
|
|
|
|
The Human Factor in Laptop Encryption |
|
This Ponemon Institute whitepaper examines the behavior of non-IT employees when it comes to encryption policy. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Download Now
|
|
|
|
Success Story: IT Asset Tracking at Grant Thornton LLP |
|
Grant Thornton needed to streamline IT asset management and reduce asset drift across 49 offices. The company used Computrace by Absolute Software to recover and wipe data from laptops before end-of-lease. With Computrace, the company has reduced costs by increasing asset visibility to 100%.
Download Now
|
|
|
|
|
Webinar: Managing Laptops Outside the Office |
|
In this webinar, learn how you can track mobile computers to improve inventory management, software license compliance and data security. Featuring the IT asset management specialist of a major insurance group, this webinar discusses the business value of internet-based tracking.
Download Now
|
|
|
|
Secure Mobility with Absolute Software |
|
This overview shows how Absolute Software helps you centrally manage computers and mobile devices through a single web-based interface. Learn how you can simplify inventory management, identify computers that are lost or stolen and protect data with anti-theft capabilities.
Download Now
|
|
|
|
HP StorageWorks Tape and Disk-to-Disk Data Protection |
By : HP |
Published Date: Apr 22, 2009 |
|
This guide provides a comprehensive look at a complete data protection and recovery solution, with valuable information to help you choose the solution that best fits your business requirements and budget, and get the assurance you need - knowing your assets are protected. Learn more today!
Download Now
|
|
|
|
Next-Generation AIX and i5/OS Disaster Recovery and Availability Technologies |
|
This information packed 29-page report reviews the technology spectrum of resilience and recovery solutions available for AIX and i5/OS (including OS/400 and IBM i) operating environments, including the latest, next-generation solutions. The goal of the paper is to help prepare IT professionals to better evaluate and adopt those technologies and methodologies most effective and appropriate for their organization given constraints around recovery time, data currency, IT staffing, and budget.
Download Now
|
|
|
|
|
The Benefits of AIX Data Replication in HACMP Clusters |
|
For IT departments looking to bring their AIX environments up to the next step in data protection, IBM’s PowerHA (HACMP) connects multiple servers to shared storage via clustering. This offers automatic recovery of applications and system resources if a failure occurs with the primary server. But clustering only makes the server resilient, not the data storage. That is where real-time replication of the data store is essential. Learn all about how AIX data replication works and how it benefits HACMP clusters.
Download Now
|
|
|
|
HP Simply Business Protection |
By : HP |
Published Date: Jan 27, 2009 |
|
Data is the backbone of every organization. No matter the business, industry, or size, reliable data access is essential to operations. Should a "worst-case scenario" occur, being prepared with an appropriate disaster recovery strategy is essential. Given the potential high cost associated with data loss, reliable data protection is no longer an option; rather, it is an obligation. This white paper discusses a data protection strategy that takes into consideration the business environment, offering sophisticated features while maintaining simplicity, affordability, and reliability.
Download Now
|
|
|
|
5 Steps Toward Disaster Preparedness |
By : Cisco |
Published Date: Sep 22, 2008 |
|
For small and medium-sized businesses (SMBs), the impacts of a disaster can result in loss of or lack of access to data, applications, and work facilities. Those with disaster recovery plans in place fared much better than those without such contingency plans.
Download Now
|
|
|
|
5 Reasons Why Smaller Organizations Should Consider System i (iSeries) High Availability |
|
This white paper will provide a review of the core causes and costs of both planned and unplanned downtime and will then provide a detailed discussion of current options for High Availability and Disaster Recovery solutions, including System i (iSeries) high availability solutions. Most importantly, as you read you will learn why true HA and DR protection are now within reach of even the smallest of businesses.
Download Now
|
|
|
|
Achieving Rapid Data Recovery for IBM AIX Environments |
|
Planning for recovery is a requirement in businesses of all sizes. In implementing an operational plan that ensures that both data and applications can be recovered, IT personnel are generally confronted with several challenges. Do you have a plan that meets your recovery requirements to your satisfaction? Read this paper to learn more about the ideal plan for IBM AIX Environments, and whether your plan is complete.
Download Now
|
|
|
|
An Introduction to System i (AS/400) High Availability |
|
This paper presents an overview of iSeries high availability to companies that are beginning to explore this powerful business continuity technology. The critical components of high availability solutions are detailed in this paper, including data replication engines, system monitors, role swap capabilities, and the importance of autonomic processes.
Download Now
|
|
|
|
The Benefits of Continuous Data Protection (CDP) for IBM i5/OS and AIX Environments |
|
Downtime and data loss pose intolerable risks to every business today. From IT departments to the Board Room, managers have seen the importance of business uptime and data protection to continued success, productivity and profitability. This white paper will provide a road map to the most effective strategies and technologies to protect data and provide fast recovery should data be lost or corrupted due to accident or malicious action.
Download Now
|
|
|
|
The Essential Guide to Disaster Recovery in i5/OS (AS/400) and AIX Environments |
|
This white paper provides a basic understanding of the building blocks of IT and business continuity—from understanding the concepts of disaster recovery and information availability to calculating the business impact of downtime and selecting the right software solution. Readers will be able to quickly match their specific optimum uptime objectives with the easiest and most cost-effective IT.
Download Now
|
|
|
|
Data Recovery for IBM AIX Environments |
|
For AIX IT departments looking to take the next step in data protection strategies, CDP is an essential consideration. Analysts agree that businesses will be incorporating this strategy in the next few years as part of an integrated solution. CDP enables you to reverse data corruption in a fraction of the time and labor required for recovery from tape.
Download Now
|
|
|
|
All Data Is Not Equal |
|
Application vulnerabilities and risks must be weighed to identify resources, performance requirements and service level objectives to ensure business continuity. Using real-world case studies, this white paper examines Information Lifecycle Management (ILM) best practices for disaster preparedness.
Download Now
|
|
|
|
|
|
|
|
|
Results 1 - 25 of 110 matches |
Sort Results By : Published Date | Title | Company name |
Home >
> Disaster Recovery |
|
<< Start < Previous 1 2 3 4 5 Next > End >>
|
More Security Topics |
Access Control, Anti Spam, Anti Spyware, Anti Virus, Application Security, Auditing, Authentication, Biometrics, Business Continuity, Compliance, DDoS, Disaster Recovery, Email Security, Encryption, Firewalls, Hacker Detection, High Availability, Identity Management, Internet Security, Intrusion Detection, Intrusion Prevention, IPSec, Network Security Appliance, Password Management, Patch Management, Phishing, PKI, Policy Based Management, Security Management, Security Policies, Single Sign On, SSL, Secure Instant Messaging, Web Service Security, Vulnerability Management |
|
|
|