disa

Results 176 - 200 of 762Sort Results By: Published Date | Title | Company Name
Published By: Dell Storage     Published Date: Oct 17, 2011
This white paper take a look at multilayer data protection and disaster recovery approach for the virtualized data center and explains how and why Dell EqualLogic may be the best solution for your business.
Tags : 
technology, dell, data protection, data recovery, equallogic, disaster recovery
    
Dell Storage
Published By: Dell Storage     Published Date: Nov 02, 2011
This white paper take a look at multilayer data protection and disaster recovery approach for the virtualized data center and explains how and why Dell EqualLogic may be the best solution for your business.
Tags : 
technology, dell, data protection, data recovery, equallogic, disaster recovery
    
Dell Storage
Published By: Concentric     Published Date: Mar 27, 2009
Email, calendaring, collaboration, and mobility solutions are moving from corporate data centers to service provider networks. Service providers can realize far greater economies of scale than most businesses and deliver higher levels of service to more users at a lower cost; in fact, the fewer the users, the higher cost for each. Concentric Hosted Exchange is a fast, reliable and affordable solution for email, calendaring, collaboration, and mobility based on Microsoft® Exchange Server 2007 Service Pack 1 (SP1) and Microsoft Outlook® 2007. Concentric Hosted Exchange provides all of the benefits of Microsoft Exchange and Outlook 2007 without the up-front infrastructure costs or ongoing overhead.
Tags : 
concentric, hosted exchanged, email, calendaring, collaboration, mobility, corporate data centers, service provider networks, service providers, microsoft® exchange server 2007, sp1, microsoft outlook® 2007, total cost of ownership, tco, concentric hosted exchange, cli, command line interface, lower bandwidth cost, hmc, global address list
    
Concentric
Published By: Cisco     Published Date: Jun 04, 2015
Cisco and our partners can help agencies obtain secure networks, which help: • Reduce time between incident detection and response • Empower field personnel to make decisions based on all available information • Disseminate the right information to the right people at the right time
Tags : 
public safety, disaster response, networking
    
Cisco
Published By: Cisco     Published Date: Nov 18, 2015
According to the United Nations, on average, more than 200 million people were affected and more than 70,000 were killed by natural disasters annually. Given the fact that one of the primary responsibilities of government is to protect the public and minimize the effects of such calamities, citizens now demand that public-sector safety organizations be proactive, and respond promptly and effectively to all types of crisis situations, including catastrophes, terror events, and threats to critical infrastructure. To effectively respond to these challenges, public safety agencies must be able to rely on secure networks with integrated voice, video, and data capabilities. With these networks and their associated assets, agencies can obtain more timely and accurate information, enhancing situational awareness and improving response times.
Tags : 
cisco, public safety, disaster response, networking
    
Cisco
Published By: Symantec     Published Date: Jul 11, 2014
Today's datacenters face a gauntlet of challenges including protection of physical and virtual environments, fast recovery of data, reducing backup times and storage requirements, server consolidation, and disaster recovery. How are savvy CIO's conquering these types of challenges? Find out how in this white paper by Expert, David Davis.
Tags : 
data, protection, physical and virtual environment, recovery, storage, consolidation, cio's
    
Symantec
Published By: Ciena     Published Date: Nov 15, 2016
"In healthcare, as the trends supporting eHealth accelerate, the need for scalable, reliable, and secure network infrastructures will only grow. This white paper describes the key factors and technologies to consider when building a private network for healthcare sector enterprises, including: Transport Network Equipment Outside Fiber Plant Converged Platforms Reliability, Redundancy, and Protection Reconfigurable Networks Management Software Security Services, Operation, Program Management, and Maintenance Download our white paper to learn more."
Tags : 
packet networking, packet networking portfolio, packet optical hie network, packet-optical transport, patient data security, private and hybrid cloud, private optical network for healthcare, private optical network for hospitals, rapidly growing bandwidth, real-time telesurgery video and data, remote imaging and diagnosis, simplify healthcare network operations, telehealth and telemedicine, telesurgery and video diagnosis, transfer massive imaging files, transmitting full-body mri images, transmitting genome data, transport network equipment, value-based care models, wan and lan convergence reduces
    
Ciena
    
Ciena
Published By: XOsoft     Published Date: Aug 21, 2009
Achieve significant cost savings through consolidation of disaster recovery servers by combining the award-winning disaster protection of XOsoft's WANSync with the latest virtual server technologies from Microsoft and EMC. Consolidating disaster recovery servers on virtual machines can yield both reduced hardware costs and significantly lessened management burden.
Tags : 
disaster plan, disaster recovery, virtual machines, servers, network management, it management, data protection, xosoft
    
XOsoft
Published By: Neverfail Group     Published Date: Feb 10, 2012
It should come as no surprise that eliminating end user and application downtime, through the use of availability and disaster recovery technologies, comes in at the very top of many IT agendas. Find out more. Download now
Tags : 
database, microsoft, ms windows, windows, application security, cost control, it spending, application performance, high availability, sql server, exchange server, ms exchange, microsoft exchange, neverfail
    
Neverfail Group
Published By: XOsoft     Published Date: Aug 21, 2009
Traditional backup systems provide a critical layer of insurance, but they represent all-or-nothing strategies that do not cover the minute by minute daily data writes to the disk. Continuous data protection fills in this gap by capturing changes to data while users are working. In the event of a data interruption, administrators can automatically reconstitute the data in reverse order to a point before it was corrupted or lost.
Tags : 
disaster plan, disaster recovery, data protection, storage, backup and recovery, backup, recovery, prevent data loss, xosoft
    
XOsoft
Published By: HP VMware     Published Date: Mar 03, 2008
There are probably as many approaches to data protection and disaster recovery as there are types of disasters that might befall your datacenter. Figuring out which approach is best for your datacenter—from a technical, operational and financial outlook—is enough to keep a responsible manager like you up at night. Download this paper to learn about the proven, flexible solution that prepares your data to survive and recover from almost any calamity, from HP and VMware.
Tags : 
vmware, disaster recovery, sim, data protection, cdp, esx server, bladesystem, data replication, replication, hp vmware
    
HP VMware
Published By: NETIQ     Published Date: Sep 09, 2013
This Forrester Technology Adoption Profile (TAP) shows how growth in mission-critical applications is driving disaster recovery initiatives, enhanced disaster recovery capabilities shorten recovery objectives and the future of disaster recovery rests with advanced continuity tools. To learn more, download your copy of this informative Forrester TAP today.
Tags : 
netiq, disaster recovery, replication, recovery, forrester, technology adoption profile, mission critical, white paper, downtime, continuity plan, continuity tools
    
NETIQ
Published By: HireRight     Published Date: Jul 31, 2013
In reading this story, it is easy to understand why the cleaning company willingly settled this case. Companies who send their employees into customers’ homes or whose employees are responsible for vulnerable groups, including minors, the disabled, and the elderly, should conduct background checks.
Tags : 
hireright, human resources, criminal background check, employee criminal record
    
HireRight
Published By: VMware Dell     Published Date: Jun 05, 2008
Radiator Express Warehouse (1800Radiator), a fast-growing automotive parts distributor, found that it was running at maximum power and its racks were full. Using VMware virtualization technology, the company was able to take 31 physical servers out of production, resulting in a 25 percent reduction in power and cooling costs.
Tags : 
virtualization, vmware, virtual infrastructure, x86, server consolidation, server containment, business continuity, disaster recovery, energy savings, vmware infrastructure 3, vi3, vmware
    
VMware Dell
Published By: HP Enterprise Services     Published Date: Apr 02, 2014
A video explaining how high-end replication and fail over solutions used to be economical only for stock exchanges and other similar environments, but not anymore. Find out how HP can help you cut recovery time and data loss with a cloud-based disaster recovery solution that is less than you would think.
Tags : 
disaster recovery, business continuity, recovery services, resiliency services, recovery-as-a-service, cloud continuity
    
HP Enterprise Services
Published By: Code42     Published Date: Feb 28, 2018
Disaster Recovery Plan Roadmap Learn how automatic backup delivers guaranteed business data protection and recovery—no matter the threat. When ransomware hits, the average small business experiences two full days of downtime. One-third of businesses lose revenue and all experience brand and loyalty damage that’s harder to quantify. To stop the bleeding, most small businesses end up paying at least $2,500 to get their data back. But paying the ransom doesn’t guarantee anything. Plenty of businesses have fully complied with the ransom demands, only to have the ransomer increase the ransom request—or simply take off with the ransom and the data.
Tags : 
    
Code42
Published By: StorageCraft® Technology Corporation     Published Date: Jun 23, 2011
When it comes to data protection and recovery, many businesses are not as safe as they believe. Read on to find out what you should consider when creating your backup and disaster recovery plan.
Tags : 
storagecraft, recovery, backup, cloud, strategies, smb, protection, security, disaster, infrastructure, bdr
    
StorageCraft® Technology Corporation
Published By: EMC Corporation     Published Date: Dec 01, 2014
Data is changing the way organizations manage, consume, and deliver storage. Many legacy applications, however, are still in traditional storage silos, where data is tied to specific vendor storage and not easily configurable and monitored. EMC ViPR is the lightweight, software-only solution that centralizes, automates, and transforms storage into a simple, extensible and open platform.
Tags : 
data protection, availability, disaster recovery, easy configurable, vendor storage
    
EMC Corporation
Published By: Hitachi Vantara     Published Date: Mar 08, 2019
Finding the right data protection and recovery solution for complex enterprise infrastructures is a formidable challenge. Traditional backup and recovery solutions cannot keep up with or meet today’s business-critical requirements. Read this white paper to learn smarter approaches to data protection and recovery. See how to radically improve key performance metrics – including business continuity – as well as backup windows, operational recovery and disaster recovery.
Tags : 
    
Hitachi Vantara
Published By: Vision Solutions     Published Date: Dec 31, 2007
For AIX IT departments looking to take the next step in data protection strategies, CDP is an essential consideration. Analysts agree that businesses will be incorporating this strategy in the next few years as part of an integrated solution. CDP enables you to reverse data corruption in a fraction of the time and labor required for recovery from tape.
Tags : 
aix, data protection, continuous data protection, cdp, high availability, disaster recovery, disk backup, tape backup, recovery, backup, mimix, vision, vision solutions
    
Vision Solutions
Published By: Dell EMC     Published Date: May 09, 2019
Data security is a top priority and a daunting challenge for most organizations. Costly data breaches are incresing in number and sophiscation, and a growing list of regulations mandate that personal data be protected. At the same time, security technologies must not impede user productivity by creating obstacles or slowing performance, otherwise users might disable or circumvent them. A robust security strategy that includes authentication, encryption and advanced malware prevention enables an organization to keep data safe while enabling the way people work. Dell has conceived and executed an innovative securtiy strategy that provides date protection and threat prevention across an extensive line of products. Download this white paper from Dell and Intel® to learn more.
Tags : 
    
Dell EMC
Published By: IBM     Published Date: Oct 14, 2009
Discover the unique support for data warehousing and business intelligence offered by the IBM DB2 portfolio. This white paper shows how an IBM System z server, integrated with the IBM DB2 family of solutions, can help you meet requirements for data warehousing and business intelligence.
Tags : 
data warehousing, ibm, business intelligence, total cost of ownership, tco, integrated facility for linux, eal5, workload consolidation, scalability, disaster recovery, workload management, operational data stores
    
IBM
Published By: Aberdeen Group     Published Date: Jun 02, 2011
The focus of this document is to quantify the cost of IT-induced business downtime.
Tags : 
aberdeen, datacenter uptime, roi, disaster recovery, best-in-class, industry average, laggard, sla, service level agreement, business continuity, business interruptions, cost of downtime, data protection
    
Aberdeen Group
Published By: Datto Inc.     Published Date: May 08, 2013
TAG Computer Services shares why a golf course and real estate office need business continuity. This success story outlines what happens after two of their clients experienced server failure, yet TAG was able to minimize downtime and ensure business continuity.
Tags : 
datto, virus protection, msp, managed service provider, backup and recovery, disaster recovery, business continuity
    
Datto Inc.
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.