Find White Papers
Home
About Us
List Your Papers
    
> Technology > Security > Disaster Recovery

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Disaster Recovery

A Disaster Recovery Plan covers the data, hardware and software critical for a business to restart operations in the event of a natural or human-caused disaster. It should also include plans for coping with the unexpected or sudden loss of key personnel.
Results 1 - 25 of 446Sort Results By:Published Date | Title | Company Name
White Paper Published By: Stream Data Centers     Published Date: Apr 13, 2018
Download the new Data Center Frontier Special Report to learn how to create complete resiliency and compliance in critical environments.
Tags : 
stream data centers, compliance, resiliency, mission critical environment, uptime
    
Stream Data Centers
White Paper Published By: NAVEX Global     Published Date: Aug 18, 2016
This Cyber Security Awareness Kit illustrates how to make your organisation more secure by neutralizing the leading cause of cyber security risk: your employees.
Tags : 
cyber attack, risk, cyber security, cyber criminals, cyber risks
    
NAVEX Global
White Paper Published By: HPE     Published Date: Jun 06, 2016
This white paper presents a comprehensive guide to improving data backup and recovery, and looks at 5 key considerations for small and midsized businesses when looking at the modernization of different aspects of their production.
Tags : 
data, data recovery, data backup, midsized business, disaster recovery
    
HPE
Case Study Published By: Zerto     Published Date: May 31, 2016
Download this case study today to learn more about how ARA was able to complete a datacenter migration in a compressed window, and how they continue to use ZVR to deliver aggressive service levels across their infrastructure with a product that is very easy to use.
Tags : 
zerto, virtual replication, medical imaging, datacenter, servers
    
Zerto
White Paper Published By: Riverbed     Published Date: May 19, 2016
Data protection, application performance, and business continuity are essential to staying competitive and profitable.
Tags : 
data, data protection, data centre, security, data security
    
Riverbed
White Paper Published By: Insight     Published Date: May 16, 2016
This paper shows how Insight’s cloud expertise, licensing knowledge and customer engagement remove disaster recovery and compliance headaches for leading online knowledge solutions company and enable 24-hour email access for its employees.
Tags : 
cloud, cloud computing, cloud-based solutions, disaster recovery, insight
    
Insight
White Paper Published By: Code42     Published Date: Apr 22, 2016
Data loss, theft or breach is inevitable, but backup assures recovery, continuity and rapid response. Endpoint data backup is at the core of an enterprise data security strategy. Modern endpoint backup goes well beyond backup and restore, delivering risk reduction across the enterprise and addressing perennial IT and business problems. Discover more by reading this whitepaper.
Tags : 
endpoint backups, data visability, code 42, data loss, data recovery
    
Code42
White Paper Published By: CloudEndure     Published Date: Mar 23, 2016
In January 2016, 141 professionals — directors, CIOs and managers of large, small and mid-sized companies — were surveyed for a comprehensive disaster recovery (DR) survey. The results of this survey reveal some important truths about DR, backup, availability goals, downtime costs, and responses. For instance, did you know the top risk to system availability continues to be human error? This benchmark survey report reviews the challenges and best practices of companies using or looking to implement DR solutions. Read this report to compare your DR experiences with those of your peers.
Tags : 
cloudendure, disaster recovery, best practices, disaster recovery survey, cloud computing
    
CloudEndure
White Paper Published By: CloudEndure     Published Date: Mar 23, 2016
While a public cloud provides an easy and scalable way to manage and deploy your app or website, you also need to have a contingency plan for business continuity and disaster recovery. Often overlooked on Amazon Web Services (AWS), an extremely effective cloud disaster recovery (DR) strategy is to spread the application stack across regions versus availability zones. This eBook provides a guide for planning and implementing a robust cross-region cloud disaster recovery (CDR) plan for business continuity and critical application uptime on AWS-based applications.
Tags : 
cloudendure, aws, cloud disaster recovery plan, disaster recovery, cloud
    
CloudEndure
White Paper Published By: Druva     Published Date: Jan 04, 2016
Endpoint backup has gone beyond simple backup/restore to a broader end-user data protection solution reducing various risks and increasing user productivity. This research helps I&O leaders evaluate enterprise endpoint backup solutions in two scenarios: cloud deployment and on-premises deployment.
Tags : 
enterprise, endpoints, backup, vendor comparison, cloud
    
Druva
White Paper Published By: Entrust Datacard     Published Date: Nov 24, 2015
Deciding on the right SSL management platform for your organisation can be daunting. This step-by-step guide will not only you help you along the path to finding the right service, but also ensure you execute a successful implementation.
Tags : 
ssl certificate management platforms, ssl management, ssl certificates, lifecycle management, certificate management platform
    
Entrust Datacard
White Paper Published By: Entrust Datacard     Published Date: Nov 24, 2015
Deciding on the right SSL management platform for your organisation can be daunting. This step-by-step guide will not only you help you along the path to finding the right service, but also ensure you execute a successful implementation.
Tags : 
ssl certificate management platforms, ssl management, ssl certificates, lifecycle management, certificate management platform
    
Entrust Datacard
White Paper Published By: Entrust Datacard     Published Date: Nov 24, 2015
This whitepaper reveals how tools available from Entrust offer one of the most cost-effective solutions to these problems.
Tags : 
entrust solutions, certificates, security, security application, authority
    
Entrust Datacard
White Paper Published By: Sophos     Published Date: Oct 07, 2015
This buyers guide provides independent research and test results to help you determine your endpoint security solution requirements and identify the vendor that best meets your needs.
Tags : 
endpoint buyers, vendors, endpoint security solution, antivirus, security solutions
    
Sophos
White Paper Published By: IBM     Published Date: Sep 16, 2015
Using published data, Edison compared a solution comprised of EMC® Isilon® against an IBM® Spectrum Scale™ solution.
Tags : 
ibm, isilon, storage, backup, disaster recovery
    
IBM
White Paper Published By: IBM     Published Date: Sep 16, 2015
Download this whitepaper to learn the 6 criteria for evaluating a high-performance cloud services provider.
Tags : 
ibm, high performance computing, hpc, sdi, software defined infrastructure
    
IBM
White Paper Published By: Venafi     Published Date: Aug 07, 2015
This paper reveals how not securing all of your keys and certificates enables cybercriminals to bypass controls like threat detection, data protection, firewalls, VPNs, DLP, privileged access, and authentication systems that you expect will mitigate threats.
Tags : 
security, protect keys, security controls, cyber-attacks, cybercriminals
    
Venafi
White Paper Published By: CDW     Published Date: Aug 07, 2015
VMware vCloud® Hybrid Service™ – Disaster Recovery introduces native cloud-based disaster recovery capabilities for VMware vSphere® virtual environments.
Tags : 
cloud, disaster recovery, hybrid, service, data protection
    
CDW
Case Study Published By: Venafi     Published Date: Jul 27, 2015
Learn how security professionals responded about the risk and impact to enterprises from attacks on keys and certificates.
Tags : 
cybersecurity, keys, certificates, cyber attacks, server certificate misuse
    
Venafi
White Paper Published By: Venafi     Published Date: Jul 27, 2015
See how APT 18 conducted its proof-of-concept attack, learn how attackers bypassed critical security controls and find out how you can eliminate blind spots, reduce risk, and respond and remediate faster.
Tags : 
security controls, key misuse, certificate misuse, security management, breach prevention
    
Venafi
Free Offer Published By: Venafi     Published Date: Jul 27, 2015
Read this important brief to learn how to maintain your cybersecurity and reduce risk.
Tags : 
sans, security controls, control requirements, cybersecurity, risk reduction
    
Venafi
Free Offer Published By: Venafi     Published Date: Jul 27, 2015
Read the solution brief to close SSH security gaps and protect your business.
Tags : 
ssh security gaps, business protection, cybersecurity, cryptographic security, data protection
    
Venafi
Free Offer Published By: Venafi     Published Date: Jul 27, 2015
Read this solution brief to learn how Security Operations teams can eliminate outages.
Tags : 
outages, expired digital certificates, security risk reduction, cybersecurity, cyberattacks
    
Venafi
White Paper Published By: IBM     Published Date: Jul 15, 2015
How IT leaders conduct vulnerability assessments, and implement proactive strategies to protect their data.
Tags : 
database vulnerability, proactive strategies, data protection, compliance, data breach
    
IBM
White Paper Published By: IBM     Published Date: Jul 15, 2015
How to create proactive big data security and privacy strategies
Tags : 
data security, compliance, data protection, data privacy, safeguarding information
    
IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search