continuity

Results 251 - 275 of 425Sort Results By: Published Date | Title | Company Name
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Given Payformance’s longstanding commitment to protecting the privacy of its clients’ information, the company has decided to investigate data encryption solutions for its primary hard drive storage and secondary backup tape storage. With its multi-vendor interoperability, NeoScale’s CryptoStor storage security appliances emerge as the obvious choice.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Fiberlink     Published Date: Feb 08, 2007
This white paper looks at some of the key issues facing enterprises that might need to turn office workers into mobile workers, rapidly and in large numbers.
Tags : 
business continuity, mobile workers, mobile computing, disaster planning, pandemics, fiberlink, disaster plan
    
Fiberlink
Published By: Mimecast     Published Date: Apr 18, 2017
"Learn Office 365™ Migration Risks and How to Avoid a SaaS Monoculture. When considering a move to Office 365, organizations must be aware of several significant risks to their email infrastructure. The cloud may seem like a simple, cost-effective alternative to on-premises email, but continuity and security issues cannot be overlooked. Download the E-book to learn more about how to avoid cloud email headaches."
Tags : 
office 365, email security, cloud, cloud security, email infrastructure
    
Mimecast
Published By: HP     Published Date: Apr 13, 2014
Deliver game-changing uptime. Read how Playtech, the world’s largest publicly-traded online gaming software supplier, achieves 99.999% uptime and detects and fixes issues in minutes versus hours with comprehensive IT monitoring tools.
Tags : 
bpm, bsm, business process monitor, business service management, hp it performance suite, it case study, it infrastructure, omi
    
HP
Published By: Eaton     Published Date: Jun 01, 2012
Server virtualization empowers businesses to lower hardware spending, simplify administration and boost availability. For IT and facilities managers, however, it introduces challenges and opportunities.
Tags : 
power management, server virtualization, business continuity, data center, virtual machines, server utilization
    
Eaton
Published By: Riverbed     Published Date: Apr 27, 2011
The goal of this paper is to highlight these challenges and provide some "practical advice" for streamlining a BC/DR environment.
Tags : 
riverbed, business continuity, disaster recovery solutions, bob laliberte, bc/dr environment, data center consolidation, bandwidth, cloud storage
    
Riverbed
Published By: EMC     Published Date: Apr 18, 2013
The RSA business continuity white paper, BCM Regulatory Soup, will help you address: Which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.
Tags : 
rsa, business continuity, disaster recovery, bcm, regulatory, compliance
    
EMC
Published By: RSA Security     Published Date: Nov 06, 2013
This business continuity white paper will help you address which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security
    
RSA Security
Published By: Shunra     Published Date: Nov 27, 2007
Effective IT disaster recovery and business continuity planning is essential for every business. All businesses depend on their IT services for moment-to-moment operations. It is vital to ensure that those services are not disrupted due to any disaster. Pre-test your plans in a simulated network.
Tags : 
testing, disaster recovery, security testing, business continuity, preparedness, natural disaster, shunra, ppi
    
Shunra
Published By: HP     Published Date: Mar 31, 2015
No business is immune to the threat of IT downtime caused by natural and manmade disasters. Natural disasters—such as earthquakes, tsunamis, hurricanes, fires, and floods—can happen with little to no advanced warning. But the bigger risk is often human-induced events—from simple IT configuration errors to significant data center problems. If you lack a rock-solid disaster recovery (DR) plan, any of these unpredictable events—natural or manmade—could bring your business and its revenue streams to a halt. Yet many organizations are not well prepared for the unknown. The randomness of such events lulls people into a sense of false security—“That’s not likely to happen here.” While you can hope to avoid events that threaten the continuity of your business, the reality remains unchanged: Disasters happen—so you need to prepare for them. Are you prepared? Please download this eBook to find out!
Tags : 
disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness
    
HP
Published By: CA WA 2     Published Date: Oct 01, 2008
Virtualization and clustering can bring many benefits to your business—better IT asset utilization, improved business continuity and improved operational efficiency. At the same time, virtualization can create a new level of complexity for IT. This white paper describes some of the technical challenges inherent in managing these complex environments and recommends strategies for successful deployment that will maximize the value of virtualization technology in your organization.
Tags : 
virtual, virtual machine, virtual storage, virtual server, virtualization, ca wa, ca wa 2
    
CA WA 2
Published By: DataCore     Published Date: Jun 06, 2019
Nothing in Business Continuity circles ranks higher in importance than risk reduction. Yet the risk of major disruptions to business continuity practices looms ever larger today, mostly due to the troubling dependencies on the location, topology and suppliers of data storage. Get insights on how to avoid spending time and money reinventing BC/DR plans every time your storage infrastructure changes.
Tags : 
business continuity, disaster recovery, data protection, software defined storage, virtualization, storage, downtime, high availability
    
DataCore
Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
cloud, mobility, social business, big data, external threats, business risks, business continuity, financial stability
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
ibm, cloud, mobility, social business, data, big dta, theft, cyber theft
    
IBM
Published By: Zerto     Published Date: Nov 02, 2012
When organizations are considering a business continuity/disaster recovery solution, they look for solution that protects and recovers the data and application. Read this white paper to learn more about protecting Tier-1 applications with Zerto.
Tags : 
zerto, application security, data security, data recovery, application recovery, data solution
    
Zerto
Published By: CDW     Published Date: Apr 04, 2016
Hewlett Packard Enterprise is helping protect organizations by building security and resiliency into the fabric of their enterprise, proactively detecting and responding to threats, and safeguarding continuity and compliance to effectively mitigate risk.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications
    
CDW
Published By: CDW-HPE Servers     Published Date: Apr 07, 2016
Hewlett Packard Enterprise is helping protect organizations by building security and resiliency into the fabric of their enterprise, proactively detecting and responding to threats, and safeguarding continuity and compliance to effectively mitigate risk.
Tags : 
security, business metrics, best practices, business intelligence, enterprise applications
    
CDW-HPE Servers
Published By: Code42     Published Date: Apr 22, 2016
Today, in the age of information, people are paid for their ideas: to create original knowledge products or add value to existing products. Given their self-reliance, it is not surprising that workers take pride in their outputs—up to half of employees take a portfolio of files with them when they leave. When employees move on, many feel entitled to the work they’ve created.They presume it is acceptable to transfer work documents to personal computers, removable media, tablets, smartphones or online file sharing apps. Some pilfered data is innocuous and already in the public realm. But some of it is classified. Read this paper to find out how to collect and secure data to protect operations, reputation and continuity when employees leave.
Tags : 
data protection, code 42, data security, intellectual property
    
Code42
Published By: HPE     Published Date: Dec 05, 2014
Data is the lifeblood of your business. To compete in today’s global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limit—demanding more storage and bandwidth, greater security and agility, and higher availability than ever before.
Tags : 
platform, technology, lync, server, sql, flex-bundles, proliant, processors
    
HPE
Published By: Hewlett-Packard Company     Published Date: May 15, 2014
HP ProLiant Gen8 servers support automated management and proactive monitoring— and HP is offering financial terms for purchase or lease to SMBs deploying them. For these reasons, HP ProLiant Gen8 servers can play an important role in supporting business continuity and can serve as a key element of business protection programs that are designed to reduce operational costs in today's midsize and large businesses.
Tags : 
proliant gen8, business continuity
    
Hewlett-Packard Company
Published By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos
    
Akamai
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Qsent needed to shore up its disaster recovery strategy. This meant sending backup tapes – each with more than 2.5 terabytes of data – between data centers and storing them offsite. To keep all its data safe and secure, Qsent chose NeoScale’s CryptoStor wire-speed tape security appliance to encrypt and decrypt data.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management
    
Neoscale Systems, Inc.
Published By: Datto Inc.     Published Date: Mar 07, 2013
Why deliver just backup, when data recovery and business continuity are the real keys? Learn how one Datto partner delivers business continuity to their clients.
Tags : 
ibc, bdr, intelligent business continuity, backup and recovery, diaster recovery
    
Datto Inc.
Published By: Mimecast     Published Date: Aug 22, 2017
Although many organizations are switching email accounts to Microsoft Office 365, they may well be exposing themselves to a wide range of security risks, data loss, and business continuity issues. This white paper explores how to use Microsoft Office 365 while protecting organizations from various security risks. Discover: • What to look for in third-party solutions • How to protect archived data • How to ensure business continuity
Tags : 
office 365, security, email security, archived data
    
Mimecast
Published By: KPMG     Published Date: Jun 06, 2019
As businesses start to experiment with true artificial intelligence, safe delivery of AI demands a new risk and control framework. This report, designed for anyone tasked with the safe delivery of AI, proposes an effective solution. Read the report to find out: • the risks associated with AI and the challenge of managing them • a 17-category Risk & Controls framework for AI • in-depth details for key categories, including security management, business continuity and knowledge management • an essential glossary of AI terms.
Tags : 
    
KPMG
Start   Previous    3 4 5 6 7 8 9 10 11 12 13 14 15 16 17    Next    End
Search Resource Library