Disaster Recovery

RSS
Disaster recovery and business continuity news, strategy and best practices, and solutions for IT professionals
  • White Paper

    The 2014 Next Generation Firewall Challenge

    Posted September 12, 2014 - 7:32 pm

    The Target security breach and discovery of the "Heartbleed" vulnerability in web encryption software taught us some important lessons about enterprise security.
  • White Paper

    Improve Your Security in 30 Days

    Posted September 12, 2014 - 7:31 pm

    This (slightly tongue-in-cheek) white paper shows how you can use HP TippingPoint to materially improve your security posture in 30 days.
  • White Paper

    Why You Need a Next-Generation Firewall

    Posted September 12, 2014 - 7:31 pm

    To stay ahead of the threats, it's time for IT to embrace next-generation firewalls
  • Webcast

    Building Your Backup and Recovery Checklist

    Posted September 11, 2014 - 8:03 pm

    Join Greg Shields, Senior Partner at Concentrated Technology, and Ward Wolfram, Technical Marketing Engineer with Dell Data Protection, as they discuss reimagining the requirements checklist for data protection.
  • White Paper

    Gartner Positions RSA in Leaders Quadrant for Business Continuity Management

    Posted September 11, 2014 - 8:01 pm

    RSA, the security division of EMC, was positioned by Gartner in the Leader's quadrant of the 2013 Magic Quadrant for Business Continuity Management Platforms based on completeness of vision and ability to execute.
  • Webcast

    Get end-to-end data protection with Dell AppAssure

    Posted September 11, 2014 - 8:00 pm

    Dell AppAssure provides end-to-end protection to ensure both data security and access. With inline deduplication and incremental backups, AppAssure targets new and changed data to reduce backup times and disk space needs.
  • Disaster recovery done right

    Posted September 11, 2014 - 11:27 am

    This comprehensive guide walks you through every step you'll need to take to preserve your data before disaster strikes
  • White Paper

    Backup and Recovery Best Practices with Tintri VMstore

    Posted September 9, 2014 - 4:17 pm

    This Tintri Best Practice Guide for Backup and Recovery will assist individuals who are responsible for the design, deployment, and DR of VMs deployed on Tintri VMstore systems.
  • White Paper

    Hybrid IT: The Best of All Worlds

    Posted September 8, 2014 - 5:17 pm

    Due to the demand for IT agility and 100% availability, most organizations will transition to a hybrid mix of outsourced services over the next 5 years.
  • White Paper

    Making Disaster Recovery Affordable and Achievable

    Posted September 8, 2014 - 5:15 pm

    This paper describes best practices and implementation steps for a cloud-based DR strategy.
  • White Paper

    Disk Backup Appliances: The Next Generation

    Posted September 4, 2014 - 7:00 pm

    Discover how to save time on deployment, simplify your daily management, shrink your backup windows, minimize network traffic and significantly reduce your backup storage footprint in this informative report about disk-backup appliances.
  • White Paper

    Backup and Recovery: Considerations and Options

    Posted September 4, 2014 - 7:00 pm

    Learn about four key elements that should be part of any data protection strategy - and how Dell Software solutions help ensure your critical data is fully protected.
  • White Paper

    Unified Backup: Virtual and Physical 

    Posted September 4, 2014 - 7:00 pm

    Find out how the latest release of Dell AppAssure unifies virtualized stand-alone backup, replication and recovery processes - without compromising data protection.
  • White Paper

    Protect your Oracle Databases with Hypervisor-based Replication

    Posted September 4, 2014 - 2:00 pm

    Read this data sheet for a detailed explanation of how Zerto Virtual Replication can protect your Oracle Databases
  • White Paper

    What is Hypervisor-based Replication?

    Posted September 4, 2014 - 2:00 pm

    A simpler approach to DR! Compare hypervisor-based replication to guest/OS-based and array-based replication. Read about Zerto's easy integration with VMware.
  • In earthquakes, alerts may turn machines into action heroes

    Posted September 2, 2014 - 1:56 pm

    Earthquake early warning systems integrated into schools, offices and other buildings could save lives and give rise to a whole new industry.
  • White Paper

    The Future of IT: From Chaos to Service Automation

    Posted August 26, 2014 - 6:45 pm

  • Webcast

    When Downtime Is Not an Option

    Posted August 26, 2014 - 1:01 pm

    According to a recent survey, one in three companies has declared a disaster in the past five years because a critical component of their infrastructure failed. Learn what it takes to be an always-on, always-available enterprise.
  • White Paper

    Infographic: Anatomy of a Data Breach

    Posted August 25, 2014 - 8:00 pm

    Unexpected data breaches can put your identity at risk no matter how careful you are. And yet, despite national media coverage on high-profile data breaches like these, some Americans still aren't sure exactly what they are.
  • White Paper

    What Makes a Cloud Solution Truly Enterprise-Grade?

    Posted August 21, 2014 - 1:16 pm

    Future enterprise cloud capabilities will evolve from five core elements...
  • IT outages are an ongoing problem for the U.S government

    Posted August 19, 2014 - 8:28 pm

    Fully 70% of federal agencies experienced downtime of 30 minutes or more in a recent one-month period.
  • White Paper

    State of Cloud Security Report

    Posted August 18, 2014 - 11:02 am

    In a relatively short time, cloud computing, specifically Infrastructure-as a-Service, has shifted from a new but unproven approach to an accepted, even inevitable, model.
  • Webcast

    Establish Cyber Resiliency: Developing a Continuous Response Architecture

    Posted August 15, 2014 - 3:31 pm

    Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or use scans or signatures to detect, respond or prevent advanced threats in your environment.
  • White Paper

    The Evolution of Corporate Cyberthreats

    Posted August 15, 2014 - 2:16 pm

    Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted to IT security, established businesses like yours are vulnerable to a wider array of attacks.
  • White Paper

    3 Questions to Ask Your DNS Host about Lowering DDoS Risks

    Posted August 13, 2014 - 5:16 pm

    Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.

Disaster RecoveryWhite Papers & Webcasts

See more White Papers | Webcasts

Join today!

See more content
Ask a Question
randomness