disa

Results 426 - 450 of 762Sort Results By: Published Date | Title | Company Name
Published By: Arcserve     Published Date: Nov 19, 2013
Learn how to handle the hidden complexities virtualization introduces to backup and recovery requirements and how to refine your disaster recovery process.
Tags : 
backup, recovery, virtualization, storage, public cloud, disaster recovery, ca arcserve backup, server virtualization
    
Arcserve
Published By: Symantec     Published Date: Jan 02, 2014
Learn how your organization is losing money by not having a virtualized environment and how virtualization can provide better disaster recovery solutions for your company.
Tags : 
security, data protection, virtual protection, backup solution, data
    
Symantec
Published By: Carbonite     Published Date: Feb 22, 2017
Discover the many benefits of a multi-faceted backup plan, and how you can combine the recovery speed of local backup with the security of a comprehensive cloud-based solution.
Tags : 
backup and recovery, business backup, computer backup, cloud backup, cloud recovery, data backup, data recovery, data protection
    
Carbonite
Published By: Arcserve     Published Date: Nov 19, 2013
Learn why certain current practices for data protection are costing your organization money and learn the best practices for how to make the most out of your limited budget.
Tags : 
budget, virtualization, it infrastructures, hidden costs, backup, backup storage, cloud storage, disaster recovery
    
Arcserve
Published By: Darktrace     Published Date: Jun 21, 2019
Cyber security is today an unavoidable concern for law firms and the legal sector at large, which oversees disproportionately large volumes of sensitive data and which is therefore an attractive target for sophisticated threat actors. From confidential information about mergers and acquisitions to disclosures made under attorney-client privilege, today’s law firms are inundated with data that would be disastrous if leaked, both for the results of individual cases and for these firm’s long-term reputations. Indeed, this reputational damage diminishes the very trust upon which the legal profession is predicated, jeopardizing client relationships and hindering customer acquisition. Legal organizations lose 5% of their clients following a data breach, while significant or high-profile breaches can even prompt a firm’s eventual collapse, as was the case for Mossack Fonseca in the infamous Panama Papers breach. In today’s increasingly digital business world, even the most private legal docum
Tags : 
    
Darktrace
Published By: Unitrends     Published Date: Feb 10, 2017
Businesses are producing exponentially more data and using more technology, and it all needs to be backed up and stored. While IT manages the explosive growth on the digital front, there’s pressure on departments to stabilize or even cut spending. Learn how to protect your business at a time when your data is growing 33 times faster than your IT staff. Download now!
Tags : 
unitrends, backup, continuity defense, digital front, disaster recovery, digital assets
    
Unitrends
Published By: CloudEndure     Published Date: Oct 12, 2018
Maintaining business continuity is your highest priority. In today’s commercial landscape, business continuity depends on the efficient, uninterrupted flow of data across the organization – from operations to sales to fulfillment. Even a brief lapse in workload continuity can mean thousands of lost sales opportunities, disruption to production, and compromised customer trust. The causes of those lapses can range from natural disasters to mechanical failure or human error. You need a data platform and a proactive disaster recovery (DR) strategy that will help you stay up and running in the event that your physical infrastructure is unavailable for any length of time. BUSINESS CONTINUITY Fulfilling orders, providing a high level of customer service, and keeping consumers engaged all depend on the efficient, uninterrupted flow of data throughout your organization. CUSTOMER TRUST Above all, protecting customer data—especially personally identifiable information (PII) —is critical
Tags : 
    
CloudEndure
Published By: EMC Corporation     Published Date: Mar 08, 2012
Data deduplication is not just altering how backup targets are used; it dramatically affects operating efficiencies, simplifies remote office data protection, and makes disaster recovery significantly more affordable and realistic. Read on.
Tags : 
leveraging, emc, deduplication, solutions, backup, recover, long-term information, retention
    
EMC Corporation
Published By: Trading Concepts     Published Date: Feb 24, 2009
Virtualization is a revolutionary technology that has emerged as one of the hottest trends in the IT segment. If you are not already leveraging the server virtualization wave as a means to deploy cost effective Disaster Recovery, then use this paper as a catalyst to transform your business today: virtualization enables greater efficiencies, faster application and data recovery, and overall cost savings.
Tags : 
inmage, dr scout, server virtualization, disaster recovery, continuous data protection, cdp, recovery point objectives, rpo
    
Trading Concepts
Published By: Druva     Published Date: Mar 30, 2016
Why the public cloud has become the state-of-the-art target for backup, archiving, and disaster recovery
Tags : 
druva, public cloud, enterprise data protection, backup, archiving, disaster recovery, cloud
    
Druva
Published By: VMware Dell     Published Date: Sep 29, 2008
LifeLink Foundation needed to provide business continuity and DR of critical transplant related information to multiple locations and needed to manage DR planning and implementation in a hurricane zone. Learn how VMware & Dell EqualLogic worked together to implement two remote sites providing consolidated virtual storage, snapshot-based backup and recovery.
Tags : 
vmware, dell, lifelink, healthcare, windows, server, sql server, microsoft
    
VMware Dell
Published By: F5 Networks Inc     Published Date: Jan 31, 2017
Organizations considering moving enterprise applications to the public cloud should ensure that they also move the application delivery services their applications rely on in the data center. In addition, cloud migration presents an opportunity to organize and rationalize security and access, gain visibility into cloud-based application traffic, and architect a strong disaster recovery plan. Download to read the 5 rules to follow when lifting and shifting apps to the the cloud.
Tags : 
apps, cloud, enterprise applications, public cloud
    
F5 Networks Inc
Published By: Determine (Selectica)     Published Date: Jun 29, 2017
As our unpredictable world becomes more complex, interdependent and dangerous, it’s becoming harder to manage third-party risk. Traditional financial and operational risks seem like the good old days. Now procurement has to manage, mitigate and avoid risks as disparate as conflict minerals, cybercrime, natural disasters, resource depletion and many others.
Tags : 
    
Determine (Selectica)
Published By: PC Mall     Published Date: Mar 02, 2011
Download this HP white paper to learn how to reduce the financial impact and maintain acceptable levels of productivity during an unplanned disaster.
Tags : 
pc mall, disaster recovery, it risks, business continuity, outage, risk management
    
PC Mall
Published By: PC Mall     Published Date: Mar 21, 2011
For some companies, even a few hours of downtime can become a business disaster. IT risks must be considered as serious as any other significant business risk. When was the last time you assessed your business risks? Download this HP white paper to learn how to reduce the financial impact and maintain acceptable levels of productivity during an unplanned disaster.
Tags : 
disaster recovery, it risks, business continuity, outage, risk management
    
PC Mall
Published By: InMage     Published Date: Feb 24, 2009
Utah State University is nationally and internationally recognized for its intellectual and technological leadership in land, water, space and life enhancement. Providing education for more than 23,000 undergraduate and graduate students, Utah State relies on technology to support its innovative initiatives including campus-wide wireless networking, a recent partnership with Google, and a unified email system.
Tags : 
inmage, data recovery, disaster recovery, business continuity, dr scout
    
InMage
Published By: IBM     Published Date: Feb 25, 2008
In preparation for disasters, it’s critical to have a backup site that can be used if your primary location goes down. Does your business have the right procedures and equipment to recover after a disaster? Get answers. Download this article about a new enterprise data center and learn more about protecting your IT infrastructure.
Tags : 
disaster recovery, business continuity, preparedness, natural disaster, redundancy, hurricane, backup, recovery
    
IBM
Published By: Baystate Health / Baystate Medical Center     Published Date: Jul 16, 2007
Get this free white paper to read why mass casualty and other public health emergencies create a demand for information within hospitals, between hospitals, between hospitals and local incident command centers, and between local, statewide and multi-state incident command centers and agencies.
Tags : 
hospital, healthcare, health care, medical records, fema, disaster, natural disaster, business continuity
    
Baystate Health / Baystate Medical Center
Published By: VMware Dell     Published Date: Sep 29, 2008
Business operations that are heavily dependent on information systems may be significantly impacted even by a brief application outage. Impact of a data loss is even more drastic. IDC estimates that in a disaster situation, the average loss is $3 million per incident and $81,000 per hour.
Tags : 
vmware, dell, disaster recovery, storage area network
    
VMware Dell
Published By: Aveksa     Published Date: Feb 04, 2008
User access-related business risk comprises a broad array of potentially damaging events that may be caused or made possible by inadequate governance of access to an enterprise’s information assets. Such events range from relatively minor policy and compliance violations to disastrous business losses.  The stakes involved in access-related risk have risen dramatically in recent years as organizations have become thoroughly operationalized by technology.
Tags : 
access control, user access, access, permissions, risk, risk management, compliance, governance
    
Aveksa
Published By: ESET, LLC.     Published Date: Apr 27, 2011
Global Threat Trends is a monthly report created by ESET that includes a review of the current events in the world of information security and the top ten threats of the month.
Tags : 
eset, blackhat japanning, global threat report, david harley, urbanschrott, disaster scam, malware reporting, inf/autorun
    
ESET, LLC.
Published By: Cisco     Published Date: Jul 11, 2016
Massachusetts is well-known as the landing place of the Mayflower and home to the oldest institution of higher learning in the United States. But this is one state that hasn’t stood still in time. Today, Massachusetts has the challenging task of accommodating the needs of its various state agencies. In particular, those needs include IT support surrounding disaster recovery and data management.
Tags : 
    
Cisco
Published By: FM Global     Published Date: Jun 10, 2019
From wildfires to hurricanes, nobody is immune to natural disasters. Our latest report, "Master the Disaster," is an in-depth look at the often unexpected high costs that come from a wide range of catastrophes. The first step toward resilience is understanding your risk, so download our full report today.
Tags : 
    
FM Global
Published By: Echopass     Published Date: Sep 07, 2007
Not all companies that have adopted multi-sourcing have realized the expected levels of savings.  A single over-arching problem is often the cause when multi-sourcing delivers disappointing results in service and/or savings.
Tags : 
multi-sourcing, call center outsourcing, remote agents, disaster prevention, ip call center, ip contact center, contact center solutions, contact center software
    
Echopass
Published By: VMware Dell     Published Date: Dec 07, 2011
This white paper outlines the ways virtualization can address the challenges of traditional disaster recovery and create a viable recovery plan.
Tags : 
disaster recovery, disaster, security, risk, plan, continuity, architecture, dell
    
VMware Dell
Start   Previous    11 12 13 14 15 16 17 18 19 20 21 22 23 24 25    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.