Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Disaster Recovery

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Disaster Recovery

A Disaster Recovery Plan covers the data, hardware and software critical for a business to restart operations in the event of a natural or human-caused disaster. It should also include plans for coping with the unexpected or sudden loss of key personnel.
Results 351 - 375 of 445Sort Results By: Published Date | Title | Company Name
White Paper Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention
    
Mimecast
White Paper Published By: Arbor Networks     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches.
Tags : 
cyber threats, security, ddos, data breaches, atlas
    
Arbor Networks
Case Study Published By: Websense     Published Date: Feb 26, 2013
Miercom conducted an independent third-party validation of the Websense TRITON Web Security Gateway Anywhere (WSGA) version 7.7.3, with comparisons to several major competitive products evaluated in this review.
Tags : 
security, appliance, detection, blocking, malware
    
Websense
White Paper Published By: IBM     Published Date: Jan 25, 2013
At the beginning of 2012, IBM asked a group of executives from leading companies to share how they were approaching reputational risk management. View this infographic to see the surprising results.
Tags : 
risk management, reputational management, enterprise, threat prevention, access control
    
IBM
White Paper Published By: IBM     Published Date: Jan 25, 2013
IBM has written this paper to enable discussion around the new security challenges that the cloud introduces.
Tags : 
security, cloud, ibm, access management, identity management
    
IBM
White Paper Published By: IBM     Published Date: Jan 23, 2013
How security, business continuity, and technical support can shape the reputation and value of your company
Tags : 
reputational risk, business continuity, risk management, cloud, social media
    
IBM
White Paper Published By: IBM     Published Date: Jan 23, 2013
The paper examines key factors you should consider when planning for the transition to cloud-based business resilience and in selecting your cloud partner.
Tags : 
disaster recovery, cloud computing, cloud, virtualization, data protection
    
IBM
White Paper Published By: EMC Corporation     Published Date: Mar 08, 2012
This white paper highlights several new features within EMC ®Avamar ® 6.0 that specifically target and greatly advance the capabilities and performance of VMware data protection.
Tags : 
leveraging, emc, deduplication, solutions, backup
    
EMC Corporation
White Paper Published By: Lumension     Published Date: Jan 11, 2012
The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com­plexity. Find out more!
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss
    
Lumension
White Paper Published By: Symantec     Published Date: Jan 04, 2012
Read this white paper and learn how the proper IT security policies can actually drive more sales.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Symantec     Published Date: Jan 04, 2012
This paper highlights how attackers distribute malwale and how cybercriminals have developed attack techniques.
Tags : 
ssl, ssl certificates, internet infrastructure services, trust services, extended validation
    
Symantec
White Paper Published By: Blue Coat Systems UK     Published Date: Nov 03, 2011
Blue Coat WebFilter helps you easily manage web content by categorizing it into a discrete number of categories. Read about some of the new additions.
Tags : 
blue coat, webfilter, filter, categories, benefits
    
Blue Coat Systems UK
White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Take a look at this techincal overview to see how Blue Coat's defense systems, powered by WebPulse helps businesses get in front of malware networks
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
IT and business leaders must ensure they have the right security strategies to protect against the rapid evolution of social networking threats
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter is best-in-class for web threat protection, but content filtering databases have another key role to play: control of Internet use
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter helps you easily manage web content by categorizing it into a discrete number of categories. Read about some of the new additions.
Tags : 
blue coat, webfilter, filter, categories, benefits
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Oct 24, 2011
View this paper now to explore the top 4 security risks businesses face when using social networks and ways to protect against and mitigate the risks.
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems
White Paper Published By: Blue Coat Systems     Published Date: Oct 24, 2011
This report examines the interactions of malware ecosystems, including user behavior and hosting sites and offers effective defensive strategies
Tags : 
blue coat, wan optimization, secure web gateway, malware, defenses
    
Blue Coat Systems
White Paper Published By: VeriSign Authentication Services, now a part of Symantec Corp.     Published Date: Oct 13, 2011
In this must read white paper, you will learn about cloud computing, new opportunities, new security challenges and how to ensure your data is safe.
Tags : 
cloud, hosting company, security, ssl certificate, verisign inc.
    
VeriSign Authentication Services, now a part of Symantec Corp.
White Paper Published By: Citrix Systems     Published Date: Sep 08, 2011
Build a Cloud computing infrastructure with maximum availability, performance and security. Free guide shows you how -- compliments of Citrix.
Tags : 
citrix, cloud computing, netscaler, scale app delivery, load balancing technology
    
Citrix Systems
White Paper Published By: HP and Intel® Xeon® processors     Published Date: Sep 06, 2011
Read this whitepaper to see how your organization can simplify, optimize, and save in your VMware environment with HP Storage solutions.
Tags : 
hp storage solutions, vmware, virtualization, roi, infrastructure
    
HP and Intel® Xeon® processors
Webinar Published By: GoToMeeting     Published Date: Jul 29, 2011
Attend our Webinar to hear James Ware and Charles Grantham, creators of the Future of Work program, discuss how the nature of work has changed to include mobile and remote employees, the challenges this creates for managers and tactics to effectively manage people you can't see.
Tags : 
gotomeeting, citrix, meetings, online meetings, collaboration
    
GoToMeeting
White Paper Published By: Liaison Technologies     Published Date: Jun 03, 2011
This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices.
Tags : 
liaison, nubridges, data protection, encryption, key management
    
Liaison Technologies
White Paper Published By: EMC Corporation     Published Date: May 27, 2011
This Buyer Case Study by IDC details the EMC IT mission to transform its backup and recovery operations, with data deduplication technology at the core of this transformation.
Tags : 
emc, backup and recovery, data deduplication, availability, network bandwidth
    
EMC Corporation
White Paper Published By: EMC Corporation     Published Date: May 27, 2011
Read this IDC case study to learn how Emerson Electric Co. transformed its IT infrastructure.
Tags : 
emc, idc case study, emerson, it infrastructure, deduplication
    
EMC Corporation
Start   Previous    4 5 6 7 8 9 10 11 12 13 14 15 16 17 18    Next    End
Search