Disaster Recovery

RSS
Disaster recovery and business continuity news, strategy and best practices, and solutions for IT professionals
  • White Paper

    The Future of IT: From Chaos to Service Automation

    Posted August 26, 2014 - 6:45 pm

  • Webcast

    When Downtime Is Not an Option

    Posted August 26, 2014 - 1:01 pm

    According to a recent survey, one in three companies has declared a disaster in the past five years because a critical component of their infrastructure failed. Learn what it takes to be an always-on, always-available enterprise.
  • White Paper

    Infographic: Anatomy of a Data Breach

    Posted August 25, 2014 - 8:00 pm

    Unexpected data breaches can put your identity at risk no matter how careful you are. And yet, despite national media coverage on high-profile data breaches like these, some Americans still aren't sure exactly what they are.
  • White Paper

    What Makes a Cloud Solution Truly Enterprise-Grade?

    Posted August 21, 2014 - 1:16 pm

    Future enterprise cloud capabilities will evolve from five core elements...
  • IT outages are an ongoing problem for the U.S government

    Posted August 19, 2014 - 8:28 pm

    Fully 70% of federal agencies experienced downtime of 30 minutes or more in a recent one-month period.
  • White Paper

    State of Cloud Security Report

    Posted August 18, 2014 - 11:02 am

    In a relatively short time, cloud computing, specifically Infrastructure-as a-Service, has shifted from a new but unproven approach to an accepted, even inevitable, model.
  • Webcast

    Establish Cyber Resiliency: Developing a Continuous Response Architecture

    Posted August 15, 2014 - 3:31 pm

    Many enterprises fail to proactively prepare the battlefield for a data breach by only leveraging outdated techniques that focus on the perimeter or use scans or signatures to detect, respond or prevent advanced threats in your environment.
  • White Paper

    The Evolution of Corporate Cyberthreats

    Posted August 15, 2014 - 2:16 pm

    Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted to IT security, established businesses like yours are vulnerable to a wider array of attacks.
  • White Paper

    3 Questions to Ask Your DNS Host about Lowering DDoS Risks

    Posted August 13, 2014 - 5:16 pm

    Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
  • White Paper

    The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

    Posted August 13, 2014 - 5:16 pm

    This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers
  • White Paper

    Three Ways Your DNS Can Impact DDoS Attacks

    Posted August 13, 2014 - 5:16 pm

    Domain Name System (DNS) plays a big role in consumers' day-to-day Internet usage and is a critical factor when it comes to distributed denial-of-service (DDoS) attacks. Learn three ways your DNS can have an impact on DDoS attacks.
  • White Paper

    Three Ways Your DNS Can Impact DDoS Attacks

    Posted August 13, 2014 - 5:15 pm

    Domain Name System (DNS) plays a big role in consumers' day-to-day Internet usage and is a critical factor when it comes to distributed denial-of-service (DDoS) attacks. Learn three ways your DNS can have an impact on DDoS attacks.
  • White Paper

    DDoS Infographic: How Are Attacks Evolving?

    Posted August 13, 2014 - 5:15 pm

    For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger? What new tactics are criminals employing? See this infographic for clues.
  • White Paper

    The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

    Posted August 13, 2014 - 3:01 pm

    This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers
  • White Paper

    3 Questions to Ask Your DNS Host about Lowering DDoS Risks

    Posted August 13, 2014 - 3:01 pm

    Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
  • IBM opening two state-of-the-art disaster recovery/resiliency centers

    Posted August 12, 2014 - 12:01 pm

    IBM is about to cut the ribbon officially opening two new state-of-the-art data centers intended to provide disaster recovery and resiliency services, one in the Raleigh, N.C. area and other in Mumbai, India.
  • White Paper

    Protect Your Company, Read the "Internet Threats Trend Report"

    Posted August 11, 2014 - 5:15 pm

    Empower your company to defend its critical information assets with CYREN's Internet Threats Trend Report, which includes actionable data about new threat activity.
  • White Paper

    Combating Identity Theft in a Mobile, Social World

    Posted August 8, 2014 - 5:30 pm

    Offering identity theft protection and remediation allows businesses to give their workforce the confidence to efficiently engage while bringing financial reward to the company at large.
  • White Paper

    After a Breach: Managing Identity Theft Effectively

    Posted August 8, 2014 - 5:30 pm

    This white paper from LifeLock Business Solutions notes that FIs in addition to managing fraud should strive to turn a negative event for customers into a positive, relationship-building experience.
  • White Paper

    Combating Identity Fraud in a Virtual World

    Posted August 8, 2014 - 5:30 pm

    This slide presentation reveals findings from the Javelin Strategy & Research 2012 Identity Fraud Report about mobile and social trends, the real risks of identity fraud and what individuals and businesses can do to keep personal information safe.
  • White Paper

    3 Questions to Ask Your DNS Host about Lowering DDoS Risks

    Posted August 8, 2014 - 4:16 pm

    Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
  • White Paper

    The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

    Posted August 8, 2014 - 4:16 pm

    This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers
  • White Paper

    DDoS Infographic: How Are Attacks Evolving?

    Posted August 8, 2014 - 4:16 pm

    For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger? What new tactics are criminals employing? See this infographic for clues.
  • White Paper

    Three Ways Your DNS Can Impact DDoS Attacks

    Posted August 8, 2014 - 4:16 pm

    Domain Name System (DNS) plays a big role in consumers' day-to-day Internet usage and is a critical factor when it comes to distributed denial-of-service (DDoS) attacks. Learn three ways your DNS can have an impact on DDoS attacks.
  • No, there isn’t an app for that [CARTOON]

    Posted August 8, 2014 - 6:00 am

    It seems like there’s an app for everything these days, except when there isn’t
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Disaster RecoveryWhite Papers & Webcasts

See more White Papers | Webcasts

Join today!

See more content
Ask a Question