continuity

Results 401 - 425 of 431Sort Results By: Published Date | Title | Company Name
Published By: Hewlett-Packard     Published Date: May 13, 2008
Describes the growing need for data backup and recovery solutions, the advantages of disk-based systems, and the software required to manage these systems. The paper also looks at the role of Hewlett Packard's Data Protector software in this strategically important market.
Tags : 
hp data protection, data protection, idc, analyst, backup, storage, recovery, storage virtualization, virtual storage, vtl
    
Hewlett-Packard
Published By: IBM     Published Date: May 12, 2008
In today's rapidly changing business environment, it's important to be ready to respond to every risk or opportunity. In this white paper, you'll learn how to determine risks, calculate impact, evaluate your current structure’s response and test overall resilience. Then you'll see how IBM can help you combine several risk management strategies into a single integrated one, so you’re better able to respond to the threat of disaster and stay ahead of the competition.
Tags : 
disaster recovery, d/r, business continuity, risk management, ibm, ibm g&rm, ibm grm, global services
    
IBM
Published By: Vision Solutions     Published Date: Apr 11, 2008
If you need more than tape backup to protect your critical applications running on AIX operating environments, download this white paper and learn your options and strategies, including how new technologies have significantly improved the recovery time and data recovery points for AIX.
Tags : 
data management, disaster recovery, business continuity, ibm aix, backup, recovery, vision, vision solutions
    
Vision Solutions
Published By: Quocirca     Published Date: Mar 13, 2008
The Average Inc. could do quite a lot to improve the ways it uses technology in order to reduce risk, ensuring business continuity, and to cut unnecessary cost. If Average Inc. needs to improve its use and management of its ICT infrastructure, then that means most real companies do as well.
Tags : 
ict, quocirca, communications, infrastructure, business continuity
    
Quocirca
Published By: HP VMware     Published Date: Mar 03, 2008
Why have the majority of large enterprises embraced virtualization technology and why are midsize businesses the fastest growing market segment for new virtualization initiatives? This white paper will explore this important question, examine common virtualization deployment scenarios, and explain how virtualization solutions from HP and VMware can help midsize businesses achieve a wide variety of business continuity, performance, and efficiency goals.
Tags : 
vmware, virtual machine, virtual, virtual server, virtual storage, hp vmware, continuity
    
HP VMware
Published By: IBM     Published Date: Feb 25, 2008
In preparation for disasters, it’s critical to have a backup site that can be used if your primary location goes down. Does your business have the right procedures and equipment to recover after a disaster? Get answers. Download this article about a new enterprise data center and learn more about protecting your IT infrastructure.
Tags : 
disaster recovery, business continuity, preparedness, natural disaster, redundancy, hurricane, backup, recovery, data management, ibm, ibm opt it, opt it, hurricane fay
    
IBM
Published By: Stratus Technologies     Published Date: Feb 12, 2008
Application vulnerabilities and risks must be weighed to identify resources, performance requirements and service level objectives to ensure business continuity. Using real-world case studies, this white paper examines Information Lifecycle Management (ILM) best practices for disaster preparedness.
Tags : 
risk management, vulnerability, info management, information management, best practices, disaster recovery, stratus, stratus technologies
    
Stratus Technologies
Published By: IBM     Published Date: Feb 08, 2008
Unexpected disasters threaten organizations across the globe daily. Surprisingly, many businesses are not prepared for such disasters. They lack business continuity plans which can provide both proactive and reactive strategies to minimize the impact of unforeseen setbacks.
Tags : 
disaster recovery, business continuity, natural disaster, infrastructure, ibm
    
IBM
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
Williams Lea is a leading global provider of customized corporate information solutions. The company needed to reliably, easily and securely transfer sensitive files and implement a system to share files and ensure a business continuity/disaster recovery plan.  Today, Williams Lea uses the GlobalSCAPE’s Enhanced File Transfer (EFT) solution to provide secure protocol support and encryption to protect data in transit and at rest.
Tags : 
eft, enhanced file transfer, managed file transfer, mft, disaster recovery, business continuity, data protection, globalscape
    
GlobalSCAPE
Published By: Vision Solutions     Published Date: Dec 31, 2007
This white paper provides a basic understanding of the building blocks of IT and business continuity—from understanding the concepts of disaster recovery and information availability to calculating the business impact of downtime and selecting the right software solution.
Tags : 
disaster recovery, business continuity, disk backup, tape backup, data backup, data replication, disaster, high availability, uptime, maximizing uptime, downtime, minimizing downtime, vision, vision solutions
    
Vision Solutions
Published By: Vision Solutions     Published Date: Dec 31, 2007
This paper presents an overview of iSeries high availability to companies that are beginning to explore this powerful business continuity technology. The critical components of high availability solutions are detailed in this paper, including data replication engines, system monitors, role swap capabilities, and the importance of autonomic processes.
Tags : 
disaster recovery, business continuity, disk backup, tape backup, data backup, data replication, disaster, high availability, uptime, maximizing uptime, downtime, minimizing downtime, vision, vision solutions, journaling
    
Vision Solutions
Published By: Astrocom     Published Date: Dec 13, 2007
Enterprises with mission critical applications are exploring the benefits of disaster recovery sites for their data centers to ensure business continuity. Special network technology is needed to ensure that site failover and failback occurs reliably and predictably. An ideal solution should provide reliable network connections, manage inbound and outbound traffic over multiple WAN links, failover to a secondary data center if all links at the primary data center are down, and eliminate deployment barriers and costs of multi-homing with BGP (Border Gateway Protocol).
Tags : 
data center, datacenter, data centers, business continuity, disaster recovery, backup, recovery, failover, redundancy, high availability, astrocom
    
Astrocom
Published By: Shunra     Published Date: Nov 27, 2007
Effective IT disaster recovery and business continuity planning is essential for every business. All businesses depend on their IT services for moment-to-moment operations. It is vital to ensure that those services are not disrupted due to any disaster. Pre-test your plans in a simulated network.
Tags : 
testing, disaster recovery, security testing, business continuity, preparedness, natural disaster, shunra, ppi
    
Shunra
Published By: Stratus Technologies     Published Date: Sep 19, 2007
For mission-critical IT, service outages and data loss pose serious consequences.  This white paper examines how availability management, disaster recovery and business continuity support one another and offers insight to find success at all of them.
Tags : 
business continuity, disaster recovery, high availability, stratus, stratus technologies
    
Stratus Technologies
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
CCU sought to encrypt its backup tapes for keeping customer data secure in transit and in storage at the offsite tape-vault vendor’s facility. As a financial institution, CCU was subject to stringent government regulations. With nearly 60 gigabytes of data to encrypt each night, CCU knew that a software solution was out of the question.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Given Payformance’s longstanding commitment to protecting the privacy of its clients’ information, the company has decided to investigate data encryption solutions for its primary hard drive storage and secondary backup tape storage. With its multi-vendor interoperability, NeoScale’s CryptoStor storage security appliances emerge as the obvious choice.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Chartered in 1973, San Francisco-based Spectrum Federal Credit Union serves over 12,000 members. When the issue arose on how to protect their members’ personal data residing on backup tapes, Spectrum FCU took no chances – they and their Techical Advisory Board made the decision to encrypt this important information with the help of NeoScale Systems, an undisputed leader in this emerging market.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
The HSC network services group supports more than 2000 desktops, servers and backend systems such as e-mail, file, networking, application and storage services for general administration, dental and medical schools. HSC wanted to manage and reduce HIPAA compliance costs and processes associated with protecting PHI data within its storage infrastructure – a legacy SAN environment with evolving applications.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Qsent needed to shore up its disaster recovery strategy. This meant sending backup tapes – each with more than 2.5 terabytes of data – between data centers and storing them offsite. To keep all its data safe and secure, Qsent chose NeoScale’s CryptoStor wire-speed tape security appliance to encrypt and decrypt data.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
With horror stories in the news every week about lost or stolen laptops and backup tapes, the senior management team at Oregon Community Credit Union knew they had to do everything within their powers to protect their critical data as it traveled offsite to a third-party tape vaulting vendor. They were tasked with finding an affordable solution that would strike a balance between security, ease of use, and scalability.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
As more states pass regulations governing the security, confidentiality, and integrity of customer data, a leading national bank has recognized its need to ensure the safety and security of personal data for its thousands of customers. To ensure compliance and maintain the security of this information, the bank has deployed NeoScale’s CryptoStor Tape appliances to help accomplish its objectives.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Baystate Health / Baystate Medical Center     Published Date: Jul 16, 2007
Get this free white paper to read why mass casualty and other public health emergencies create a demand for information within hospitals, between hospitals, between hospitals and local incident command centers, and between local, statewide and multi-state incident command centers and agencies.
Tags : 
hospital, healthcare, health care, medical records, fema, disaster, natural disaster, business continuity, hurricane, preparedness, disaster recovery, emergency, hipaa, gis, geographic information systems, baystate, bay state
    
Baystate Health / Baystate Medical Center
Published By: CCSS     Published Date: Jul 05, 2007
Is a lack of availability costing your business thousands or even hundreds of thousands of dollars? Assessing the true financial impact of unplanned downtime may surprise you. Placing a dollar amount on this issue is often the first step and biggest motivator to meeting your ongoing availability requirements.
Tags : 
availability, high availability, business continuity, network monitoring, server monitoring, down time, ccss, availability monitoring, monitoring, profitability
    
CCSS
Published By: Xiotech     Published Date: Apr 13, 2007
Disruption to your production environment is costly, and any loss of information can be disastrous. Consequences may include loss of revenue and company reputation, lower shareholder confidence, potential exposure to business continuity risk, or sanctions and fines for noncompliance with regulatory requirements. Organizations need an effective and reliable way to safeguard corporate information in the wake of an unforeseen downtime event.
Tags : 
data protection, data recovery, information management, regulatory compliance, compliance, storage compliance, high availability, storage, data replication, xiotech
    
Xiotech
Published By: Palm, Inc.     Published Date: Mar 15, 2007
Smartphones and other handheld devices support government continuity of operations (COOP) by enabling its central tenets: decentralization and redundancy. Read this white paper to learn all benefits of using smart phones when an emergency strikes.
Tags : 
government, disaster recovery, disaster, terrorism, terrorist attacks, smartphone, smart phone, pda, handheld, wireless, mobile computing, palm
    
Palm, Inc.
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search Resource Library