Disaster Recovery

RSS
Disaster recovery and business continuity news, strategy and best practices, and solutions for IT professionals
  • White Paper

    The Future of IT: From Chaos to Service Automation

    Posted August 26, 2014 - 6:45 pm

  • White Paper

    Infographic: Anatomy of a Data Breach

    Posted August 25, 2014 - 8:00 pm

    Unexpected data breaches can put your identity at risk no matter how careful you are. And yet, despite national media coverage on high-profile data breaches like these, some Americans still aren't sure exactly what they are.
  • White Paper

    What Makes a Cloud Solution Truly Enterprise-Grade?

    Posted August 21, 2014 - 1:16 pm

    Future enterprise cloud capabilities will evolve from five core elements...
  • White Paper

    State of Cloud Security Report

    Posted August 18, 2014 - 11:02 am

    In a relatively short time, cloud computing, specifically Infrastructure-as a-Service, has shifted from a new but unproven approach to an accepted, even inevitable, model.
  • White Paper

    The Evolution of Corporate Cyberthreats

    Posted August 15, 2014 - 2:16 pm

    Cybercriminals are creating and deploying new threats every day that are more destructive than ever before. While you may have more people devoted to IT security, established businesses like yours are vulnerable to a wider array of attacks.
  • White Paper

    3 Questions to Ask Your DNS Host about Lowering DDoS Risks

    Posted August 13, 2014 - 5:16 pm

    Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
  • White Paper

    The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

    Posted August 13, 2014 - 5:16 pm

    This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers
  • White Paper

    Three Ways Your DNS Can Impact DDoS Attacks

    Posted August 13, 2014 - 5:16 pm

    Domain Name System (DNS) plays a big role in consumers' day-to-day Internet usage and is a critical factor when it comes to distributed denial-of-service (DDoS) attacks. Learn three ways your DNS can have an impact on DDoS attacks.
  • White Paper

    Three Ways Your DNS Can Impact DDoS Attacks

    Posted August 13, 2014 - 5:15 pm

    Domain Name System (DNS) plays a big role in consumers' day-to-day Internet usage and is a critical factor when it comes to distributed denial-of-service (DDoS) attacks. Learn three ways your DNS can have an impact on DDoS attacks.
  • White Paper

    DDoS Infographic: How Are Attacks Evolving?

    Posted August 13, 2014 - 5:15 pm

    For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger? What new tactics are criminals employing? See this infographic for clues.
  • White Paper

    The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

    Posted August 13, 2014 - 3:01 pm

    This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers
  • White Paper

    3 Questions to Ask Your DNS Host about Lowering DDoS Risks

    Posted August 13, 2014 - 3:01 pm

    Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
  • White Paper

    Protect Your Company, Read the "Internet Threats Trend Report"

    Posted August 11, 2014 - 5:15 pm

    Empower your company to defend its critical information assets with CYREN's Internet Threats Trend Report, which includes actionable data about new threat activity.
  • White Paper

    Combating Identity Theft in a Mobile, Social World

    Posted August 8, 2014 - 5:30 pm

    Offering identity theft protection and remediation allows businesses to give their workforce the confidence to efficiently engage while bringing financial reward to the company at large.
  • White Paper

    After a Breach: Managing Identity Theft Effectively

    Posted August 8, 2014 - 5:30 pm

    This white paper from LifeLock Business Solutions notes that FIs in addition to managing fraud should strive to turn a negative event for customers into a positive, relationship-building experience.
  • White Paper

    Combating Identity Fraud in a Virtual World

    Posted August 8, 2014 - 5:30 pm

    This slide presentation reveals findings from the Javelin Strategy & Research 2012 Identity Fraud Report about mobile and social trends, the real risks of identity fraud and what individuals and businesses can do to keep personal information safe.
  • White Paper

    3 Questions to Ask Your DNS Host about Lowering DDoS Risks

    Posted August 8, 2014 - 4:16 pm

    Neustar has had wide-ranging conversations with clients wanting to know how they can optimize protection as DDoS attacks increase in frequency and size.
  • White Paper

    The Danger Deepens: 2014 Neustar Annual DDoS Attacks and Impact Report

    Posted August 8, 2014 - 4:16 pm

    This report compares DDoS findings from 2013 to 2012, based on a survey of 440 North American companies, including 139 businesses delivering technology products and/or services such as software, SaaS, IaaS as well as hardware manufacturers
  • White Paper

    DDoS Infographic: How Are Attacks Evolving?

    Posted August 8, 2014 - 4:16 pm

    For the third consecutive year, Neustar surveyed businesses across major industries to track the evolution of DDoS attacks. Are they more frequent? Larger? What new tactics are criminals employing? See this infographic for clues.
  • White Paper

    Three Ways Your DNS Can Impact DDoS Attacks

    Posted August 8, 2014 - 4:16 pm

    Domain Name System (DNS) plays a big role in consumers' day-to-day Internet usage and is a critical factor when it comes to distributed denial-of-service (DDoS) attacks. Learn three ways your DNS can have an impact on DDoS attacks.
  • White Paper

    Gartner Critical Capabilities for Enterprise Endpoint Backup

    Posted July 31, 2014 - 11:31 am

  • White Paper

    5 Tips to Secure Small Business Backdoors in the Enterprise Supply Chain

    Posted July 25, 2014 - 4:45 pm

    This paper examines the insecurity of the small businesses in the supply chain and offers tips to close those backdoors into the enterprise.
  • White Paper

    Comprehensive Advanced Threat Defense

    Posted July 23, 2014 - 3:45 pm

    The hot topic in the information security industry these days is "Advanced Threat Defense" (ATD). This paper describes a comprehensive, network-­based approach to Advanced Threat Defense.
  • White Paper

    Advanced Threat Defense: A Comprehensive Approach

    Posted July 23, 2014 - 3:45 pm

    In this interview, Peter George, president, General Dynamics Fidelis Cybersecurity Solutions, explains why we need more than anti-malware, and what constitutes a comprehensive approach to network advanced threat defense.
  • White Paper

    Case Study: Extending DR Protection for Apps W/O Fixed Costs/Fees

    Posted July 18, 2014 - 9:00 am

    Find out how the city of Asheville, NC won the Global City on a Cloud Grand Prize from Amazon AWS for Best Practices by deploying CloudVelox for automated pilot light DR.
Join us:
Facebook

Twitter

Pinterest

Tumblr

LinkedIn

Google+

Disaster RecoveryWhite Papers & Webcasts

See more White Papers | Webcasts

Join today!

See more content
Ask a Question
randomness