Search the Library
 
Home >

Security

>

Disaster Recovery

A Disaster Recovery Plan covers the data, hardware and software critical for a business to restart operations in the event of a natural or human-caused disaster. It should also include plans for coping with the unexpected or sudden loss of key personnel.

Results 1 - 25 of 110 matches Sort Results By : Published Date | Title | Company name
Free Whitepaper: Should Your E-Mail Live in the Cloud?
By : Dell. Published Date: Jan 05, 2009
Download this free whitepaper from Dell for a complete discussion of the important issues surrounding cloud-based e-mail. Learn more today!

Download Now
Dell.
Free Whitepaper: The Case of Lost Laptops
By : Dell. Published Date: Aug 25, 2008
What would employees at your business do if they lost their laptops or other portable data-bearing devices? What steps would they take after learning about the loss or theft? What have they done to protect or backup the information they carry? All these questions and more are answered in this free download. Learn more today!

Download Now
Dell.
Free Trial Download: Acronis Backup & Recovery 10 Server for Windows
By : Acronis Inc. Published Date: Jul 13, 2009
Acronis® Backup & Recovery™ 10 Server for Windows is the next-generation disaster recovery product, designed to back up and protect stand-alone Windows Servers. Download this demo software to learn how Acronis Backup & Recovery™ 10 Server for Windows can help you recover the operating system, applications and all data in minutes after any unforeseen event.
Download Now
Acronis Inc.
Free Trial Download: Acronis Backup & Recovery 10 Advanced Server
By : Acronis Inc. Published Date: Jul 13, 2009
"Engineered for enterprises of all sizes, Acronis Backup & Recovery 10 Advanced Server scales to thousands of machines. It provides organizations with advanced data backup and system recovery capabilities such as: data deduplication, enhanced security, operations dashboard, policy-based management, among others. Download this demo software to learn how Acronis Backup & Recovery 10 Advanced Server can help you simplify and automate backup and restore processes across Windows and Linux environments"
Download Now
Acronis Inc.
Server Virtualization & Cloud Computing: Four Hidden Impacts on Uptime & Availability
By : Stratus Technologies Published Date: May 29, 2009
Cloud computing allows companies to use IT resources as a service, taking advantage of shared applications, processing and storage managed within the cloud - either inside a private cloud at an internal data center, or in an external cloud at a service provider. Greater robustness of the virtualized servers supporting this new IT model will ensure a resilient cloud infrastructure capable of delivering "on-demand" access to users.
Download Now
Stratus Technologies
Understanding the HP Data Deduplication Strategy
By : HP Published Date: May 21, 2009
Data deduplication technology represents one of the most significant storage enhancements in recent years, promising to reshape future data protection and disaster recovery solutions. Data deduplication offers the ability to store more on a given amount of storage and replicate data using lower bandwidth links at a significantly reduced cost. This white paper explains how deduplication technologies work in practice, the pros and cons of each approach, and when to choose a particular type.
Download Now
HP
The Human Factor in Laptop Encryption
By : Absolute Software Published Date: May 05, 2009
This Ponemon Institute whitepaper examines the behavior of non-IT employees when it comes to encryption policy. It shows that many employees may not be taking the most basic precautions to secure their company laptop.
Download Now
Absolute Software
Success Story: IT Asset Tracking at Grant Thornton LLP
By : Absolute Software Published Date: May 05, 2009
Grant Thornton needed to streamline IT asset management and reduce asset drift across 49 offices. The company used Computrace by Absolute Software to recover and wipe data from laptops before end-of-lease. With Computrace, the company has reduced costs by increasing asset visibility to 100%.
Download Now
Absolute Software
Success Story: Data Breach Defense at Allina Hospitals
By : Absolute Software Published Date: May 05, 2009
With an electronic health record system spanning 11 hospitals, Allina required a way to protect 2,700 laptops. Using Computrace, Allina has improved tracking from 30% to over 95% of computers outside facilities, and has averted several possible data breaches.
Download Now
Absolute Software
Webinar: Managing Laptops Outside the Office
By : Absolute Software Published Date: May 02, 2009
In this webinar, learn how you can track mobile computers to improve inventory management, software license compliance and data security. Featuring the IT asset management specialist of a major insurance group, this webinar discusses the business value of internet-based tracking.
Download Now
Absolute Software
Secure Mobility with Absolute Software
By : Absolute Software Published Date: Apr 24, 2009
This overview shows how Absolute Software helps you centrally manage computers and mobile devices through a single web-based interface. Learn how you can simplify inventory management, identify computers that are lost or stolen and protect data with anti-theft capabilities.
Download Now
Absolute Software
HP StorageWorks Tape and Disk-to-Disk Data Protection
By : HP Published Date: Apr 22, 2009
This guide provides a comprehensive look at a complete data protection and recovery solution, with valuable information to help you choose the solution that best fits your business requirements and budget, and get the assurance you need - knowing your assets are protected. Learn more today!

Download Now
HP
Next-Generation AIX and i5/OS Disaster Recovery and Availability Technologies
By : Vision Solutions Published Date: Mar 25, 2009
This information packed 29-page report reviews the technology spectrum of resilience and recovery solutions available for AIX and i5/OS (including OS/400 and IBM i) operating environments, including the latest, next-generation solutions. The goal of the paper is to help prepare IT professionals to better evaluate and adopt those technologies and methodologies most effective and appropriate for their organization given constraints around recovery time, data currency, IT staffing, and budget.
Download Now
Vision Solutions
Stratus Avance: An IT Administrator's View
By : Stratus Technologies Published Date: Mar 10, 2009
Haitham Al-Beik, Product Development Engineer, highlights the key product attributes of Avance that deliver ease of use and other elements designed to improve an IT Administrator's world.
Download Now
Stratus Technologies
The Benefits of AIX Data Replication in HACMP Clusters
By : Vision Solutions Published Date: Feb 16, 2009
For IT departments looking to bring their AIX environments up to the next step in data protection, IBM’s PowerHA (HACMP) connects multiple servers to shared storage via clustering. This offers automatic recovery of applications and system resources if a failure occurs with the primary server. But clustering only makes the server resilient, not the data storage. That is where real-time replication of the data store is essential. Learn all about how AIX data replication works and how it benefits HACMP clusters.
Download Now
Vision Solutions
HP Simply Business Protection
By : HP Published Date: Jan 27, 2009
Data is the backbone of every organization. No matter the business, industry, or size, reliable data access is essential to operations. Should a "worst-case scenario" occur, being prepared with an appropriate disaster recovery strategy is essential. Given the potential high cost associated with data loss, reliable data protection is no longer an option; rather, it is an obligation. This white paper discusses a data protection strategy that takes into consideration the business environment, offering sophisticated features while maintaining simplicity, affordability, and reliability.
Download Now
HP
5 Steps Toward Disaster Preparedness
By : Cisco Published Date: Sep 22, 2008
For small and medium-sized businesses (SMBs), the impacts of a disaster can result in loss of or lack of access to data, applications, and work facilities. Those with disaster recovery plans in place fared much better than those without such contingency plans.
Download Now
Cisco
5 Reasons Why Smaller Organizations Should Consider System i (iSeries) High Availability
By : Vision Solutions Published Date: Feb 27, 2008
This white paper will provide a review of the core causes and costs of both planned and unplanned downtime and will then provide a detailed discussion of current options for High Availability and Disaster Recovery solutions, including System i (iSeries) high availability solutions. Most importantly, as you read you will learn why true HA  and DR protection are now within reach of even the smallest of businesses.
Download Now
Vision Solutions
Achieving Rapid Data Recovery for IBM AIX Environments
By : Vision Solutions Published Date: Feb 12, 2008
Planning for recovery is a requirement in businesses of all sizes. In implementing an operational plan that ensures that both data and applications can be recovered, IT personnel are generally confronted with several challenges. Do you have a plan that meets your recovery requirements to your satisfaction? Read this paper to learn more about the ideal plan for IBM AIX Environments, and whether your plan is complete.
Download Now
Vision Solutions
An Introduction to System i (AS/400) High Availability
By : Vision Solutions Published Date: Dec 11, 2007
This paper presents an overview of iSeries high availability to companies that are beginning to explore this powerful business continuity technology. The critical components of high availability solutions are detailed in this paper, including data replication engines, system monitors, role swap capabilities, and the importance of autonomic processes.
Download Now
Vision Solutions
The Benefits of Continuous Data Protection (CDP) for IBM i5/OS and AIX Environments
By : Vision Solutions Published Date: Nov 16, 2007
Downtime and data loss pose intolerable risks to every business today. From IT departments to the Board Room, managers have seen the importance of business uptime and data protection to continued success, productivity and profitability. This white paper will provide a road map to the most effective strategies and technologies to protect data and provide fast recovery should data be lost or corrupted due to accident or malicious action.
Download Now
Vision Solutions
The Essential Guide to Disaster Recovery in i5/OS (AS/400) and AIX Environments
By : Vision Solutions Published Date: Aug 23, 2007
This white paper provides a basic understanding of the building blocks of IT and business continuity—from understanding the concepts of disaster recovery and information availability to calculating the business impact of downtime and selecting the right software solution. Readers will be able to quickly match their specific optimum uptime objectives with the easiest and most cost-effective IT.
Download Now
Vision Solutions
Data Recovery for IBM AIX Environments
By : Vision Solutions Published Date: Jul 26, 2007
For AIX IT departments looking to take the next step in data protection strategies, CDP is an essential consideration. Analysts agree that businesses will be incorporating this strategy in the next few years as part of an integrated solution. CDP enables you to reverse data corruption in a fraction of the time and labor required for recovery from tape.
Download Now
Vision Solutions
All Data Is Not Equal
By : Stratus Technologies Published Date: Jul 19, 2007
Application vulnerabilities and risks must be weighed to identify resources, performance requirements and service level objectives to ensure business continuity. Using real-world case studies, this white paper examines Information Lifecycle Management (ILM) best practices for disaster preparedness.
Download Now
Stratus Technologies
High Availability: Is it Sufficient for Disaster Recovery and Business Continuity?
By : Stratus Technologies Published Date: Jun 07, 2007
For mission-critical IT, service outages and data loss pose serious consequences.  This white paper examines how availability management, disaster recovery and business continuity support one another and offers insight to find success at all of them.
Download Now
Stratus Technologies
 
Results 1 - 25 of 110 matches Sort Results By : Published Date | Title | Company name
Home >

Security

>

Disaster Recovery

<< Start < Previous 1 2 3 4 5 Next > End >>

More Security Topics

Access Control

,

Anti Spam

,

Anti Spyware

,

Anti Virus

,

Application Security

,

Auditing

,

Authentication

,

Biometrics

,

Business Continuity

,

Compliance

,

DDoS

,

Disaster Recovery

,

Email Security

,

Encryption

,

Firewalls

,

Hacker Detection

,

High Availability

,

Identity Management

,

Internet Security

,

Intrusion Detection

,

Intrusion Prevention

,

IPSec

,

Network Security Appliance

,

Password Management

,

Patch Management

,

Phishing

,

PKI

,

Policy Based Management

,

Security Management

,

Security Policies

,

Single Sign On

,

SSL

,

Secure Instant Messaging

,

Web Service Security

,

Vulnerability Management

SUBSCRIBE FORM
Receive an email alert whenever new research is added into:
Disaster Recovery
Enter your email below:

RELATED TOPICS
Application Security
74 Documents
Backup And Recovery
102 Documents
Best Practices
206 Documents
Business Continuity
84 Documents
Data Protection
236 Documents
Desktop Management
38 Documents
Email Security
114 Documents
Enterprise Software
102 Documents
Hacker Detection
65 Documents
High Availability
80 Documents
IT Management
372 Documents
Internet Security
143 Documents
Network Security
168 Documents
Security
474 Documents
Security Management
216 Documents
Storage Management
154 Documents
Wide Area Networks
51 Documents
Windows Server
67 Documents

Search the Library
White Papers powered by
   Disaster Recovery White Papers
   Learn about White Paper Lead Generation opportunities
Quick Links
Ziff Davis Media