disa

Results 351 - 375 of 761Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jan 09, 2014
IBM Power Systems provide a comprehensive approach designed to protect the continuity and availability of business-critical applications and services. Deploying integrated disaster recovery allows companies to deliver new services faster, with higher quality, and with superior economics. Downtime can be highly disruptive and expensive to an organization, with cost drivers including lost revenue, reduced employee productivity, reputational damage, and the cost of resources required to address and avoid outages. Most organizations in IDC surveys indicate that even one hour of downtime can have a severe business impact or greater and businesses are investing in highly available servers and systems. Hear from leading industry analysts as they share top resiliency trends and top practices. Also see how Power Systems can build a highly stable infrastructure
Tags : 
    
IBM
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: CA Technologies     Published Date: Jan 08, 2014
Today’s trends, including cloud, mobile, social media, and big data, are causing huge changes in the way that identities need to be managed. As a result, the previous notion of a network perimeter is disappearing. With the advent of cloud and mobility, identity has become the new perimeter. This trend will have profound impacts on the business and IT organizations. This paper describes an identity-centric approach to security that can help you grow your business while protecting your key assets from improper use.
Tags : 
ca technologies, identity, identity management, user provisioning, identity centric security, security, cloud
    
CA Technologies
Published By: Symantec     Published Date: Jan 02, 2014
Learn how your organization is losing money by not having a virtualized environment and how virtualization can provide better disaster recovery solutions for your company.
Tags : 
security, data protection, virtual protection, backup solution, data
    
Symantec
Published By: VMware, Inc     Published Date: Dec 05, 2013
VMware® Horizon Mirage™ is a layered image management solution that separates a PC into logical layers that either IT or the user own and manage. IT-owned layers are typically OS and corporate applications while user-owned layers consist of their own files and applications. The Horizon Mirage solution enables: • Updates to individual IT-managed layers, such as core operating system files and common business applications, without disrupting other layers, all while maintaining user data and installed applications. • Simpler backup by taking snapshots of layered images, enabling desktop disaster recovery and helping to ensure continued end-user productivity.
Tags : 
vmware, horizon mirage, image management solutions, it-owned layers, corporate applications, it-manged layers, core operating system files, desktop disaster recovery
    
VMware, Inc
Published By: Arcserve     Published Date: Nov 19, 2013
Learn how to handle the hidden complexities virtualization introduces to backup and recovery requirements and how to refine your disaster recovery process.
Tags : 
backup, recovery, virtualization, storage, public cloud, disaster recovery, ca arcserve backup, server virtualization
    
Arcserve
Published By: Arcserve     Published Date: Nov 19, 2013
Learn why certain current practices for data protection are costing your organization money and learn the best practices for how to make the most out of your limited budget.
Tags : 
budget, virtualization, it infrastructures, hidden costs, backup, backup storage, cloud storage, disaster recovery
    
Arcserve
Published By: Arcserve     Published Date: Nov 19, 2013
Learn how to properly select an IT solution for your organization in 5 easy steps in order to cut costs and improve productivity.
Tags : 
backup, backup storage, cloud storage, disaster recovery, infrastructure visualization, ca arcserve backup, server virtualization
    
Arcserve
Published By: Qualys     Published Date: Nov 05, 2013
Organizations today are reevaluating their security strategies as they move their data and applications to the cloud. This whitepaper by Bloor Research discusses the challenges of security in the cloud and how the use of cloud-based services will enable organizations of all sizes, from the very smallest to multinational enterprises, to put trust back into the security equation.
Tags : 
qualys, security, cloud, internet ecosystem, cloud computing, cloud based services, cloud solutions, cloud services
    
Qualys
Published By: Qualys     Published Date: Nov 05, 2013
Web applications have recently emerged as a top cybercriminal attack vector, and organizations that don’t take a proactive approach to app security may be setting themselves up for disaster. More than one-third of organizations still don’t have an application security program in place – what can you do to make sure you’re protected? Consult this informative survey today to discover your peers’ proven practices for app security success, and learn what you can do to stay protected – read on to get started.
Tags : 
qualys, sans, sans survery, application, application security, web applications, web applications security, cybercriminals
    
Qualys
Published By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn a four-pronged approach to create a disaster recovery plan for your hybrid IT environments to help ensure successful recoveries of your data and applications.
Tags : 
sungard, sungard availability service, disaster recovery, complex it environment, hybrid it environment, it environment, recovery time objective, rto
    
SunGard Availability Services
Published By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn 5 strategies to efficiently communicate Disaster Recovery to your C-Level Executives in order to protect your organization from data center interruptions.
Tags : 
sungard, sungard availability services, disaster recovery, it recovery, data loss protection, disaster recovery program, managed recovery program, risk mitigation
    
SunGard Availability Services
Published By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn the 10 strategies for selecting a disaster recovery service provider to ensure that your organization will be better protected should a natural disruption occur.
Tags : 
sungard, sungard availability services, disaster recovery, disaster recovery provider, disaster recovery service provider, dr plan, drsp, business impact analysis
    
SunGard Availability Services
Published By: SunGard Availability Services     Published Date: Oct 30, 2013
Learn how an East Coast University and a prominent healthcare provider were able to maintain their IT availability during Hurricane Sandy with a comprehensive Disaster Recovery Program.
Tags : 
sungard, sungard availability service, enterprise resilency, application recovery, disaster recovery, productivity, it management, recovery
    
SunGard Availability Services
Published By: Mimecast     Published Date: Oct 29, 2013
Don’t just store information. Use it. Mimecast makes your email archiving work harder for business advantage.
Tags : 
mimecast, email, interactive archive, email archiving, interaction platforms, email platforms, ediscovery, data loss prevention
    
Mimecast
Published By: Silver Peak     Published Date: Oct 28, 2013
Offsite data replication is key to ensuring ongoing business operations, but it can be complex and costly, especially when performed over long distances. Join this discussion to discover how you can apply fast, cost effective and reliable remote replication that can: • Meet Recovery Point Objectives (RPO) by reducing remote replication times by up to 20X • Reduce bandwidth costs and extend replication distances • Lower storage costs while increasing storage flexibility • Leverage emerging cloud and virtualization technologies for better offsite disaster recovery Hear from the experts and users at Dell Compellent, Silver Peak and AlaskaUSA discuss essential data replication strategies and technologies.
Tags : 
silver peak, data, data replication, remote, optimize, rpo, business operations
    
Silver Peak
Published By: Nimble Storage     Published Date: Oct 28, 2013
Improvements in scalability, availability, performance, and functionality of midrange storage systems have blurred the boundaries between network-attached, midrange, and high-end storage systems. This Magic Quadrant will help IT leaders understand storage vendors' strategies and market strengths.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
    
Nimble Storage
Published By: Nimble Storage     Published Date: Oct 28, 2013
Storage plays a critical role in the datacenter. To keep up with the performance, capacity, availability, and efficiency needs of today’s enterprise, storage is undergoing a transformation by leveraging flash, high-capacity disks, and integrated data management. This paper discusses how Nimble Storage’s flash-optimized architecture is engineered to accelerate applications, scale performance and capacity, protect data, and make IT more productive and empowered.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
    
Nimble Storage
Published By: Nimble Storage     Published Date: Oct 28, 2013
Storage is a critical factor when virtualizing your business-critical applications like Exchange, SharePoint, SQL Server, and Oracle databases. What features should you look for when selecting a storage vendor? Download this tech overview to learn how flash-optimized Nimble Storage accelerates performance, maximizes utilization, and cost-effectively protects your mission-critical data.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
    
Nimble Storage
Published By: Nimble Storage     Published Date: Oct 28, 2013
Collaboration and email applications such as Microsoft SQL Server, Exchange, and SharePoint are critical for business productivity. But care needs to be taken in selecting the right infrastructure for hosting these applications. Download this technical overview and learn how VMware, Cisco, and Nimble Storage have developed a pre-validated reference architecture that delivers industry-leading performance, data protection, and management simplicity.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
    
Nimble Storage
Published By: Nimble Storage     Published Date: Oct 28, 2013
Understanding the latest developments in storage technology is crucial when planning a virtual server storage architecture, and choosing the wrong storage architecture can dramatically impair your ability to provide application resources and recoverability. This best practices guide will show you how to lay the foundation for an efficient, easy-to-manage storage environment.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
    
Nimble Storage
Published By: Nimble Storage     Published Date: Oct 28, 2013
Nimble Storage’s patented Cache Accelerated Sequential Layout (CASL™) is the industry’s first flash-optimized storage designed from the ground up to maximize efficiency. In this product brief, you’ll learn how Nimble Storage customers run more workloads with less storage infrastructure, protect more data, and streamline data management so they can focus on higher-value projects.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
    
Nimble Storage
Published By: Nimble Storage     Published Date: Oct 28, 2013
It’s easy to underestimate the performance and capacity requirements for VDI storage, and missteps now can lead to expensive problems later. In “Risk-Free Storage for VDI,” you’ll learn how Nimble Storage delivers responsive performance to handle peak VDI workloads, integrated data protection, and instant backups and restores—all for dramatically less than you’re paying now.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
    
Nimble Storage
Published By: Nimble Storage     Published Date: Oct 28, 2013
Get this 36-page technical report and learn how to deploy 1,000 virtual desktops using VMware View 5.1 with VMware vSphere 5, Cisco UCS, and a single 3U Nimble Storage array. This validated solution provides efficient infrastructure, adaptive performance, rapid provisioning, linear scalability, and dramatically simplified management.
Tags : 
nimble storage, data storage, backup, disaster recovery, flash memory, data protection, ssd, hybrid storage
    
Nimble Storage
Start   Previous    8 9 10 11 12 13 14 15 16 17 18 19 20 21 22    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.