disa

Results 326 - 350 of 755Sort Results By: Published Date | Title | Company Name
Published By: HP Enterprise Services     Published Date: Mar 24, 2014
HP created and implemented a disaster recovery plan for BAT Italia, across data and desktop, to comply with the Group’s global standards. Read how the HP approach consolidated the existing server infrastructure and planned a new disaster recovery site. And ongoing, flexible support provides a quarterly review of processes and application and hardware refreshes, thus ensuring business continuity, for the first time, across the entire business.
Tags : 
disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity
    
HP Enterprise Services
Published By: HP Enterprise Services     Published Date: Mar 24, 2014
An infographic showing how HP provides continuity for and from the cloud to keep your business running and your data safe whatever the scenario.
Tags : 
disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity
    
HP Enterprise Services
Published By: HP Enterprise Services     Published Date: Mar 24, 2014
Today’s complex, rapidly changing IT environments require dynamic continuity programs. Your peers are reassessing both the service provider model and the internal alternative for business continuity. It’s time to learn the ins and outs of enterprise-class cloud-based continuity. Examine how traditional IT operations can be recovered to the cloud. Explore the requirements of the disaster-recovery-as-a-service model. Understand the key issues to evaluate when considering a cloud-oriented approach to disaster recovery.
Tags : 
disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity
    
HP Enterprise Services
Published By: EVault     Published Date: Mar 21, 2014
Learn the top five advantages of cloud-connected™ disaster recovery.
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business
    
EVault
Published By: EVault     Published Date: Mar 21, 2014
Il ya des millions de façons de sauvegarder vos données - Il est donc bon de savoir qu’il existe 12 meilleures pratiques qui les couvrent tous. Passez quelques minutes avec ce court livre blanc afin de: •Déterminer si votre système de sauvegarde et de restauration est limite •Identifier les différentes étapes spécifiques pour mettre en avant les améliorations •Etre moteur en terme d'efficacité, de fiabilité et de rentabilité Inscrivez-vous pour télécharger.
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business
    
EVault
Published By: EVault     Published Date: Mar 21, 2014
4 mythes persistent sur la sauvegarde et récupération dans le Cloud : 1. Il est impossible de maintenir la confidentialité des données dans le Cloud. 2. Il est impossible de contrôler les accès aux données dans le Cloud. 3. Cloud et conformité ne vont pas ensemble. 4. La sauvegarde Cloud ne permet pas une récupération rapide des données. Apprenez la réalité et découvrez pourquoi le Cloud reste non seulement une option viable pour la sauvegarde mais aussi la meilleure. Laissez-nous vos coordonnées à droite, et nous vous enverrons instantanément votre Livre Blanc.
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business
    
EVault
Published By: EVault     Published Date: Mar 21, 2014
Learn the top five advantages of cloud-connected™ disaster recovery.
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business
    
EVault
Published By: EVault     Published Date: Mar 21, 2014
Learn the truth and find out why the cloud remains not only a viable option for backup but also the best one.
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business
    
EVault
Published By: EVault     Published Date: Mar 21, 2014
This simple, practical white paper will prove invaluable whether you’re starting fresh or looking to upgrade your current data protection system.
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business
    
EVault
Published By: EVault     Published Date: Mar 21, 2014
Er zijn heel veel manieren om uw data te back-uppen – dan is het goed om te weten dat 12 Best Practices ze allemaal beslaan. Als u dit compacte whitepaper leest, kunt u in een paar minuten: •Bepalen of uw back-up en recovery systeem voldoet •Specifieke stappen bepalen om verbeteringen aan te brengen •Efficiëntie, betrouwbaarheid en kosten-effectiviteit verhogen Vul uw gegevens in en download
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business
    
EVault
Published By: EVault     Published Date: Mar 21, 2014
Heeft u uw bedrijfsdata nog beschikbaar als de serverruimte met uw back-up server onder water komt te staan of als de bliksem inslaat? Lees in dit whitepaper waarom de cloud beter is wanneer het noodlot toeslaat.
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business
    
EVault
Published By: EVault     Published Date: Mar 21, 2014
Hier volgen vier populaire mythes rondom cloud back-up en recovery : 1. Het is onmogelijk om de privacy van data in de cloud te waarborgen. 2. Het is onmogelijk om controle te houden over wie toegang heeft tot data in de cloud. 3. De cloud gaat niet samen met compliance. 4. Met back-up in de cloud is geen snelle recovery mogelijk. Ontdek de waarheid en lees waarom de cloud nog steeds een geschikte optie is voor back-up, en tevens de beste. Laat hier uw gegevens achter en ontvang zo spoedig mogelijk uw white paper.
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business
    
EVault
Published By: EVault     Published Date: Mar 21, 2014
Il ya des millions de façons de sauvegarder vos données - Il est donc bon de savoir qu’il existe 12 meilleures pratiques qui les couvrent tous. Passez quelques minutes avec ce court livre blanc afin de: •Déterminer si votre système de sauvegarde et de restauration est limite •Identifier les différentes étapes spécifiques pour mettre en avant les améliorations •Etre moteur en terme d'efficacité, de fiabilité et de rentabilité Inscrivez-vous pour télécharger.
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business
    
EVault
Published By: EVault     Published Date: Mar 21, 2014
Learn the top five advantages of cloud-connected™ disaster recovery.
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business
    
EVault
Published By: EVault     Published Date: Mar 21, 2014
Hier sind die vier bekanntesten Mythen zum Thema Cloud Backup und Recovery : 1. Es ist unmöglich die Datensicherheit in der Cloud zu gewährleisten. 2. Es lässt sich unmöglich kontrollieren, wer Zugriff auf die Cloud-Daten hat. 3. Cloud und Compliance-Themen sind nicht vereinbar. 4. Cloud Backup erlaubt keine schnelle Datenwiederherstellung. Erfahren Sie mehr zu diesen Themen und warum die Cloud nicht nur eine praktikable Option, sondern vielleicht sogar die beste ist. Füllen Sie einfach das Formular auf der rechten Seite aus und Ihr Whitepaper ist sofort auf dem Weg zu Ihnen.
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business
    
EVault
Published By: IBM     Published Date: Feb 27, 2014
Learn about the pitfalls of an outdated disaster recovery plan and see how your organization can avoid a potential loss of information and data.
Tags : 
disaster recovery, disaster recovery plans, pitfalls, ibm, technology
    
IBM
Published By: Logicalis     Published Date: Feb 07, 2014
Know the top trends in disaster recovery as a service (DRaaS) and avoid the most common pitfalls.
Tags : 
logicalis, draas, disaster recovery as a service
    
Logicalis
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 15, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud, network provisioning
    
CA Technologies
Published By: IBM     Published Date: Jan 09, 2014
IBM Power Systems provide a comprehensive approach designed to protect the continuity and availability of business-critical applications and services. Deploying integrated disaster recovery allows companies to deliver new services faster, with higher quality, and with superior economics. Downtime can be highly disruptive and expensive to an organization, with cost drivers including lost revenue, reduced employee productivity, reputational damage, and the cost of resources required to address and avoid outages. Most organizations in IDC surveys indicate that even one hour of downtime can have a severe business impact or greater and businesses are investing in highly available servers and systems. Hear from leading industry analysts as they share top resiliency trends and top practices. Also see how Power Systems can build a highly stable infrastructure
Tags : 
    
IBM
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: Symantec     Published Date: Jan 02, 2014
Learn how your organization is losing money by not having a virtualized environment and how virtualization can provide better disaster recovery solutions for your company.
Tags : 
security, data protection, virtual protection, backup solution, data
    
Symantec
Published By: VMware, Inc     Published Date: Dec 05, 2013
VMware® Horizon Mirage™ is a layered image management solution that separates a PC into logical layers that either IT or the user own and manage. IT-owned layers are typically OS and corporate applications while user-owned layers consist of their own files and applications. The Horizon Mirage solution enables: • Updates to individual IT-managed layers, such as core operating system files and common business applications, without disrupting other layers, all while maintaining user data and installed applications. • Simpler backup by taking snapshots of layered images, enabling desktop disaster recovery and helping to ensure continued end-user productivity.
Tags : 
vmware, horizon mirage, image management solutions, it-owned layers, corporate applications, it-manged layers, core operating system files, desktop disaster recovery
    
VMware, Inc
Start   Previous    7 8 9 10 11 12 13 14 15 16 17 18 19 20 21    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.