Disaster Recovery

RSS
Disaster recovery and business continuity news, strategy and best practices, and solutions for IT professionals
  • White Paper

    5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain

    Posted July 25, 2014 - 4:45 pm

    This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
  • White Paper

    Comprehensive Advanced Threat Defense

    Posted July 23, 2014 - 3:45 pm

    The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-­based approach to Advanced Threat Defense.
  • White Paper

    Advanced Threat Defense: A Comprehensive Approach

    Posted July 23, 2014 - 3:45 pm

    In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive approach to network advanced threat defense.
  • White Paper

    Case Study: Extending DR Protection for Apps W/O Fixed Costs/Fees

    Posted July 18, 2014 - 9:00 am

    Find out how the city of Asheville, NC won the Global City on a Cloud Grand Prize from Amazon AWS for Best Practices by deploying CloudVelox for automated pilot light DR.
  • White Paper

    Pilot Light DR for Amazon Web Services

    Posted July 18, 2014 - 9:00 am

    Pilot light disaster recovery is a perfect use case for the cloud; CloudVelox offers Pilot Light DR for AWS--automated cloud-based disaster recovery for multi-tier, physical and virtual production apps.
  • White Paper

    6TB Oracle Ecommerce Stack Deployed on AWS in 7 Days

    Posted July 18, 2014 - 9:00 am

    A Fortune 1000 company was told that it would take more than 6 months to deploy their ecommerce stack on AWS. CloudVelocity deployed the stack in under 7 days. Use cases included agile DR and agile DevTest on IaaS.
  • White Paper

    When Disaster Strikes, Can the Cloud Save Your Business?

    Posted July 16, 2014 - 2:32 pm

    Find out why the survivors of Hurricane Sandy and other recent calamities say they wish they'd had cloud-based business VoIP communications, rather than "the vulnerability and limitations of the premises-based communications we had in place."
  • White Paper

    Email Security Checklist: Eight Steps for Healthcare Organizations

    Posted July 16, 2014 - 2:30 pm

    Don't let fear of violating Healthcare Insurance Portability and Accountability Act (HIPAA) codes prevent you from using email to communicate sensitive information.
  • White Paper

    Who's Spying on You?

    Posted July 14, 2014 - 5:00 pm

    You're aware of the threats of malware to your business but what about the ever-changing ground rules? Cybercriminals today are launching attacks against businesses by copying sophisticated malware and techniques used to target governments
  • White Paper

    The Importance of Reputation

    Posted July 14, 2014 - 11:45 am

    Proactive enterprise security involves turning data into actionable information--that's where reputation comes in.
  • White Paper

    SBIC: Transforming Information Security

    Posted July 11, 2014 - 4:15 pm

    This report combines perspectives on technologies with experience in strategy to help security teams navigate complex decisions regarding technology deployments while maximizing investments.
  • White Paper

    Rethinking Backup and Recovery

    Posted July 11, 2014 - 1:00 pm

    As enterprises continue to transform their data centers, and virtualization plays an increasing role in their IT infrastructures, the way data is backed up and recovered must change too.
  • White Paper

    Protecting Your Mid-Size Business from Today's Security Threats

    Posted July 10, 2014 - 5:31 pm

    Think you're too small to get hacked? Think again.
  • White Paper

    CSO QuickPulse IT Security: Midsize Businesses Face Enterprise

    Posted July 10, 2014 - 5:31 pm

    This survey finds that midsize firms lack understanding of vulnerabilities, and need comprehensive security tools.
  • White Paper

    10 Ways to Build a Better Big Data Security Strategy

    Posted July 10, 2014 - 5:31 pm

    This IT Manager's Journal will discuss 10 best practices you can employ in your journey down the path of securing Big Data and show how Big Data can be both a problem and a solution.
  • White Paper

    eBook: Security for a faster world

    Posted July 10, 2014 - 5:31 pm

    Business today is driven by a global economy that generates an unprecedented volume and variety of data with alarming velocity. The information in this dossier can help your security team adapt to a world that's evolving faster than ever before
  • White Paper

    When Disaster Tests Your Business, Cloud Communications Can Save It

    Posted July 1, 2014 - 2:02 pm

    Find out why the survivors of Hurricane Sandy and other recent calamities say they wish they'd had cloud-based business VoIP communications, rather than "the vulnerability and limitations of the premises-based communications we had in place."
  • White Paper

    Surviving the Business Equivalent of the Zombie Apocalypse

    Posted July 1, 2014 - 2:02 pm

    More than 43% of businesses that close following a natural disaster never reopen, and an additional 29% of businesses close down permanently within two years of the event.
  • White Paper

    The Top 5 Security Threats

    Posted July 1, 2014 - 10:00 am

    In Top 5 Security Threats, Wisegate polled its network of senior IT professionals and executives to uncover their post-Snowden vulnerability concerns. Sleep better by learning what keeps this experienced group up at night..
  • White Paper

    Simplify VMware Backup & Recovery

    Posted June 27, 2014 - 7:15 pm

    Simplify storage for your VMware environment. This backup & recovery best practices guide will assist IT professionals responsible for the design, deployment and DR of VMs deployed in environments using VMware vSphere.
  • White Paper

    Best practices for facing today's log management challenges

    Posted June 16, 2014 - 11:31 am

    This whitepaper discusses key best practices to consider when evaluating automated log management solutions.
  • White Paper

    Defense throughout the Vulnerability Life Cycle with Alert Logic Threat and Log Manager

    Posted June 16, 2014 - 10:15 am

    New security threats are emerging all the time, from new forms of malware and web application exploits that target code vulnerabilities to attacks that rely on social engineering.
  • White Paper

    Top 5 Reasons for Cloud-Based Disaster Recovery

    Posted June 4, 2014 - 1:15 pm

    There is no question that every business wants to protect their operations from downtime and loss of data. But many companies don't have the internal expertise or budget to implement the disaster recovery plan they need.
  • White Paper

    Modern Backup and Recovery: Pain Points and Business Issues

    Posted May 15, 2014 - 10:01 am

    Read this executive summary to get advice from Microsoft and Dell IT experts on how to create a manageable backup and recovery strategy that meets your budget, risk tolerance and legal requirements.
  • White Paper

    The Top 5 Reasons You Need Backup for SaaS Applications

    Posted May 12, 2014 - 4:46 pm

    This eBook will help you understand the most common threats to your business in the cloud, as well as how to protect your company from non-compliance and data loss.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Join today!

See more content
Ask a Question