continuity

Results 226 - 250 of 425Sort Results By: Published Date | Title | Company Name
Published By: HP VMware     Published Date: Mar 03, 2008
Why have the majority of large enterprises embraced virtualization technology and why are midsize businesses the fastest growing market segment for new virtualization initiatives? This white paper will explore this important question, examine common virtualization deployment scenarios, and explain how virtualization solutions from HP and VMware can help midsize businesses achieve a wide variety of business continuity, performance, and efficiency goals.
Tags : 
vmware, virtual machine, virtual, virtual server, virtual storage, hp vmware, continuity
    
HP VMware
Published By: Cisco     Published Date: Jan 28, 2009
Many small and medium-sized businesses do not have adequate network security. Here's how to make sure you do. Now more than ever, you depend on your network for your most important business operations, such as communication, inventory, billing, sales, and trading with partners. Yet up to now, you might have held off on protecting your network, for several reasons.
Tags : 
cisco, network security, business continuity issues, acceptable use policy, e-mail and communications technology, antivirus policy, password policy, identity policy
    
Cisco
Published By: Cisco     Published Date: Jan 29, 2009
For small and medium-sized businesses (SMBs), the impacts of a disaster can result in loss of or lack of access to data, applications, and work facilities. Those with disaster recovery plans in place fared much better than those without such contingency plans.
Tags : 
cisco, disaster preparedness, medium-sized businesses, smb, contingency plans, business continuity, recovery management, data protection
    
Cisco
Published By: Tripwire, Inc     Published Date: Mar 10, 2010
Unlike others, Tripwire solutions identify the events that matter most-those that pose the real security risks or take you out of compliance. And they help you discover those events immediately, while you can still contain the damage.
Tags : 
tripwire, pci compliance, business continuity, log, event management, it security, compliance automation, log center
    
Tripwire, Inc
Published By: Citrix Online     Published Date: Jun 09, 2010
This new Forrester white paper explores the critical role that the help desk should play in your organization's business continuity planning.
Tags : 
citrix online, help desk, disaster recovery, business continuity, service desk
    
Citrix Online
Published By: ScriptLogic     Published Date: Aug 30, 2010
Managing the security and uptime of a Windows network requires you to master your Active Directory, the brain and heart of the network, with maximum efficiency. Active Administrator makes it simpler and faster than native Windows tools to exceed compliance regulations, tighten security, increase productivity, and improve business continuity.
Tags : 
scriptlogic, active administrator, active directory, security, productivity, security management, auditing, backup and restore
    
ScriptLogic
Published By: Lumension     Published Date: Jan 22, 2013
Join this webcast to learn the practical steps to guide you in the deployment of devices control and encryption technology as we dive into a technical discussion of what the critical items to address.
Tags : 
best practices, devices control, encryption, security, business continuity
    
Lumension
Published By: EMC Corporation     Published Date: Jun 14, 2013
The City of Denton, Texas encompasses nearly 95 square miles and has a population of more than 113,000 residents. Denton is one of the fastest-growing communities and eleventh largest city of the Dallas-Fort Worth (DFW) Metroplex. In this document we will explore the business challenges the city faced, how EMC helped come to a solution and drive results.
Tags : 
it infrastructure, system performance, unified storage, technology, security, applications
    
EMC Corporation
Published By: Liaison Technologies     Published Date: Feb 07, 2014
Data integration and management can pave the way for quick realization of M&A success and time-to-value for every transaction. Have you looked into M&A?
Tags : 
liaison, data integration, data management, it resources, business continuity, systems and processes, autonomous acquisitions, information segregation
    
Liaison Technologies
Published By: Liaison Technologies     Published Date: Feb 07, 2014
Big Data holds the promise of a virtually unlimited ability to gain insight – and foresight – to sharpen strategies and improve tactical execution but only if it can be harnessed and managed. Through this whitepaper, you can learn how.
Tags : 
liaison, data integration, data management, it resources, business continuity, systems and processes, autonomous acquisitions, information segregation
    
Liaison Technologies
Published By: StorageCraft® Technology Corporation     Published Date: Jun 23, 2011
StorageCraft® ShadowProtect® provides superior disaster recovery, data protection and migration services. In this whitepaper find out what else StorageCraft® to help you protect your customers.
Tags : 
storagecraft, shadowprotect, backup, recovery, networks, msp, continuity, infrastructure
    
StorageCraft® Technology Corporation
Published By: CenturyLink     Published Date: Nov 18, 2011
Only companies with a disaster-ready infrastructure and solid business continuity plan can come through such events with minimal downtime and cost.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
    
CenturyLink
Published By: CenturyLink     Published Date: Nov 18, 2011
There are more people on earth than total IPv4 addresses, and they're expected to run out by the end of 2011. Preparing for the transition now can help you maintain business continuity during the changeover while taking advantage of immediate business benefits.
Tags : 
centurylink, qwest, high speed internet, phone, mobile, tv services, offers, bundles
    
CenturyLink
Published By: IBM     Published Date: Oct 01, 2012
IBM Power Systems provide a comprehensive approach designed to protect the continuity and availability of business-critical applications and services. Deploying integrated disaster recovery allows companies to deliver new services faster, with higher
Tags : 
disaster recovery, backup and recovery, ibm power systems, automated virtualization management, virtualization, downtime, mission-critical applications
    
IBM
Published By: CDW     Published Date: Apr 04, 2016
Hewlett Packard Enterprise is helping protect organizations by building security and resiliency into the fabric of their enterprise, proactively detecting and responding to threats, and safeguarding continuity and compliance to effectively mitigate risk.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications
    
CDW
Published By: CDW     Published Date: Aug 04, 2016
Watch this video to learn how Microsoft Azure, along with CDW Canada, can offer enterprise grade continuity and disaster recovery solutions.
Tags : 
microsoft, technology, best practices, productivity, data, competitive advantage
    
CDW
Published By: Kaseya     Published Date: Mar 13, 2013
A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.
Tags : 
kaseya, it security, security threats, scott crawford, enterprise management associates, ema, disaster recovery, data protection
    
Kaseya
Published By: Kaseya     Published Date: Apr 04, 2013
A complete and holistic solution can help organizations create system snapshots that can be restored quickly and efficiently, getting users back up and productive immediately.
Tags : 
disaster recovery, backup, business continuity, virtualization, security, rto, rpo, sla
    
Kaseya
Published By: VMTurbo     Published Date: Mar 25, 2015
Intelligent N+X Redundancy, Placement Affinities, & Future Proofing in the Virtualized Data Center Virtualization brought about the ability to simplify business continuity management in IT. Workload portability and data replication capabilities mean that physical infrastructure failures no longer need impact application services, and they can rapidly be recovered even in the event of complete site failure. However, Enterprises and Service Providers face new challenges ensuring they have enough compute capacity in their virtualized data centers to support their business continuity requirements, while at the same time not over provisioning infrastructure capacity resulting in unnecessary capital expenditure.
Tags : 
continuity requirements, vmturbo, virtualization, workload portability, data replication
    
VMTurbo
Published By: Intel Security     Published Date: Jan 20, 2015
Enterprises worldwide rely on network high availability for business continuity. Find out how the capabilities that are part of your next-generation firewall can help ensure that your network is up and running all day, every day.
Tags : 
network ha, high availability, network high availability, network security, next generation firewall, ngfw, uptime, network uptime
    
Intel Security
Published By: CDW-Trend Micro     Published Date: Jul 17, 2015
Security in the cloud is a shared responsibility. That means customers and cloud service providers must work together to protect applications and data, meet compliance regulations, and ensure business continuity. Watch this video to learn more about cloud security through Trend Micro Deep Security. Webinar Brought To You By CDW-Trend Micro
Tags : 
    
CDW-Trend Micro
Published By: CloudEndure     Published Date: Oct 12, 2018
Maintaining business continuity is your highest priority. In today’s commercial landscape, business continuity depends on the efficient, uninterrupted flow of data across the organization – from operations to sales to fulfillment. Even a brief lapse in workload continuity can mean thousands of lost sales opportunities, disruption to production, and compromised customer trust. The causes of those lapses can range from natural disasters to mechanical failure or human error. You need a data platform and a proactive disaster recovery (DR) strategy that will help you stay up and running in the event that your physical infrastructure is unavailable for any length of time. BUSINESS CONTINUITY Fulfilling orders, providing a high level of customer service, and keeping consumers engaged all depend on the efficient, uninterrupted flow of data throughout your organization. CUSTOMER TRUST Above all, protecting customer data—especially personally identifiable information (PII) —is critical
Tags : 
    
CloudEndure
Published By: CDW-HPE Servers     Published Date: Apr 07, 2016
Hewlett Packard Enterprise is helping protect organizations by building security and resiliency into the fabric of their enterprise, proactively detecting and responding to threats, and safeguarding continuity and compliance to effectively mitigate risk.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications
    
CDW-HPE Servers
Published By: Avaya     Published Date: Jan 04, 2017
To succeed in a tough marketplace, small businesses must be accessible, without significant interruption, even in the most adverse situations. This kind of ongoing accessibility is an important aspect of business continuity - a critical success strategy that doesn't just happen, but requires proactive planning. Although there are several aspects to a business continuity plan, a major component of any plan should be the SME's communications capabilities, not just its equipment or data. This paper will explore how different kinds of interruptions can adversely affect an SME's business continuity and illustrate how, through advanced features such as resiliency and mobility, Avaya's IP Office can help SMEs overcome interruptions and maintain business continuity.
Tags : 
avaya, communications, avaya ip office, unified communications, contact center, collaboration, midsize business solutions
    
Avaya
Published By: Qualys     Published Date: Nov 05, 2013
Automated Vulnerability Management (VM) solutions help you discover devices running in your network, determine whether they are vulnerable to attack, find fixes to the underlying problems, and protect yourself while those fixes are being implemented. This checklist of best practices will save you time and help you understand what to look for when selecting a VM, whether you have a dozen systems or a million.
Tags : 
vulnerability management solution, best practices, architecture, scanning, automation, continuity, reporting, cyber security
    
Qualys
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Resource Library