business continuity

Results 201 - 225 of 343Sort Results By: Published Date | Title | Company Name
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
With horror stories in the news every week about lost or stolen laptops and backup tapes, the senior management team at Oregon Community Credit Union knew they had to do everything within their powers to protect their critical data as it traveled offsite to a third-party tape vaulting vendor. They were tasked with finding an affordable solution that would strike a balance between security, ease of use, and scalability.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
By redirecting traffic away from ISP outages and WAN link bottlenecks, Ecessa, with its PowerLink and ShieldLink family of affordable WAN Optimization Controllers help avoid critical WAN infrastructure problems. Ecessa optimizes WAN infrastructure as defined by 24/7 availability, high-performance, flexible scalability, and secure operations - while streamlining IT costs. PowerLink and ShieldLink simplify the management of network links, and optimize user access to datacenters and remote sites.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: Ecessa Corporation     Published Date: Mar 11, 2009
To achieve greater productivity, employees at headquarters, telecommuters, business partners and customers must all have unhindered access to critical applications. Any delay in delivering these applications can cause user productivity to suffer and adversely affect business profitability. WAN link controllers are an affordable solution for ensuring the optimum performance, reliable delivery and protection of applications. They optimize network bandwidth and ensure the delivery of critical applications. Download this white paper to learn how to achieve efficiencies and competitive advantages through the adoption of affordable, yet feature-rich WAN link controllers.
Tags : 
adsl load balancing, vpn load balancing and redundancy, bandwidth aggregation, qos, bandwidth control, bandwidth management, multi-homing, bgp multihoming, broadband bonding, broadband failover, disaster recovery, business continuity, wan load balancing, wan failover, dsl failover, dsl load balancing, disaster recovery solutions, dual wan router, wan failover, isp failover
    
Ecessa Corporation
Published By: IBM     Published Date: Feb 08, 2008
Unexpected disasters threaten organizations across the globe daily. Surprisingly, many businesses are not prepared for such disasters. They lack business continuity plans which can provide both proactive and reactive strategies to minimize the impact of unforeseen setbacks.
Tags : 
disaster recovery, business continuity, natural disaster, infrastructure, ibm
    
IBM
Published By: HP - Enterprise     Published Date: Jun 05, 2013
Storage infrastructure performance monitoring and management is the key to business continuity and availability solutions. To ensure application performance, storage managers must manage the performance of the array and the SAN based on the array. HP Storage Essentials software delivers a solution for these scenarios. This solution brief addresses how current performance management challenges can be resolved with HP Storage Essentials software.
Tags : 
performance management, hp storage essentials, software, san, infrastructure
    
HP - Enterprise
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Given Payformance’s longstanding commitment to protecting the privacy of its clients’ information, the company has decided to investigate data encryption solutions for its primary hard drive storage and secondary backup tape storage. With its multi-vendor interoperability, NeoScale’s CryptoStor storage security appliances emerge as the obvious choice.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Fiberlink     Published Date: Feb 08, 2007
This white paper looks at some of the key issues facing enterprises that might need to turn office workers into mobile workers, rapidly and in large numbers.
Tags : 
business continuity, mobile workers, mobile computing, disaster planning, pandemics, fiberlink, disaster plan, it management, wireless
    
Fiberlink
Published By: HP     Published Date: Apr 13, 2014
Deliver game-changing uptime. Read how Playtech, the world’s largest publicly-traded online gaming software supplier, achieves 99.999% uptime and detects and fixes issues in minutes versus hours with comprehensive IT monitoring tools.
Tags : 
bpm, bsm, business process monitor, business service management, hp it performance suite, it case study, it infrastructure, omi, operations manager i, playtech, sha, service health analyzer, business continuity, online gaming, visibility, it management, enterprise applications
    
HP
Published By: Eaton     Published Date: Jun 01, 2012
Server virtualization empowers businesses to lower hardware spending, simplify administration and boost availability. For IT and facilities managers, however, it introduces challenges and opportunities.
Tags : 
power management, server virtualization, business continuity, data center, virtual machines, server utilization, business technology
    
Eaton
Published By: Riverbed     Published Date: Apr 27, 2011
The goal of this paper is to highlight these challenges and provide some "practical advice" for streamlining a BC/DR environment.
Tags : 
riverbed, business continuity, disaster recovery solutions, bob laliberte, bc/dr environment, data center consolidation, bandwidth, cloud storage, wan optimization, network optimization
    
Riverbed
Published By: EMC     Published Date: Apr 18, 2013
The RSA business continuity white paper, BCM Regulatory Soup, will help you address: Which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.
Tags : 
rsa, business continuity, disaster recovery, bcm, regulatory, compliance
    
EMC
Published By: RSA Security     Published Date: Nov 06, 2013
This business continuity white paper will help you address which sources to comply with and why, how to handle conflicts between the sources, how to prioritize your efforts.
Tags : 
grc, risk, compliance, technology, best practices, archer, rsa, security, it management
    
RSA Security
Published By: Shunra     Published Date: Nov 27, 2007
Effective IT disaster recovery and business continuity planning is essential for every business. All businesses depend on their IT services for moment-to-moment operations. It is vital to ensure that those services are not disrupted due to any disaster. Pre-test your plans in a simulated network.
Tags : 
testing, disaster recovery, security testing, business continuity, preparedness, natural disaster, shunra, ppi, it management
    
Shunra
Published By: HP     Published Date: Mar 31, 2015
No business is immune to the threat of IT downtime caused by natural and manmade disasters. Natural disasters—such as earthquakes, tsunamis, hurricanes, fires, and floods—can happen with little to no advanced warning. But the bigger risk is often human-induced events—from simple IT configuration errors to significant data center problems. If you lack a rock-solid disaster recovery (DR) plan, any of these unpredictable events—natural or manmade—could bring your business and its revenue streams to a halt. Yet many organizations are not well prepared for the unknown. The randomness of such events lulls people into a sense of false security—“That’s not likely to happen here.” While you can hope to avoid events that threaten the continuity of your business, the reality remains unchanged: Disasters happen—so you need to prepare for them. Are you prepared? Please download this eBook to find out!
Tags : 
disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness, security, it management, data management
    
HP
Published By: CA WA 2     Published Date: Oct 01, 2008
Virtualization and clustering can bring many benefits to your business—better IT asset utilization, improved business continuity and improved operational efficiency. At the same time, virtualization can create a new level of complexity for IT. This white paper describes some of the technical challenges inherent in managing these complex environments and recommends strategies for successful deployment that will maximize the value of virtualization technology in your organization.
Tags : 
virtual, virtual machine, virtual storage, virtual server, virtualization, ca wa, ca wa 2
    
CA WA 2
Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
cloud, mobility, social business, big data, external threats, business risks, business continuity, financial stability, brand reputation, protecting reputation, prevent theft, organizational defenses, global analytics, broad data, real time data, security risks, prevent risks, security
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
The growth of cloud, mobility, social business and big data mean that botnets, credit card theft, cyber criminals and other external threats pose increasing risk to business continuity, financial stability and brand reputation. Read the white paper, “Preventing security risks in real time,” to learn how this new reality is forcing the evolution of organizations’ defenses to become more intelligent—using global analytics to scale visibility across broad data sets, both diverse and complementary, in real time.
Tags : 
ibm, cloud, mobility, social business, data, big dta, theft, cyber theft, cyber criminals, security, security risks, global analytics, visibility, data sets, protection, external threats, risk, risk management, finanical stability, it management
    
IBM
Published By: Zerto     Published Date: Nov 02, 2012
When organizations are considering a business continuity/disaster recovery solution, they look for solution that protects and recovers the data and application. Read this white paper to learn more about protecting Tier-1 applications with Zerto.
Tags : 
zerto, application security, data security, data recovery, application recovery, data solution, security, data management, business technology, data center
    
Zerto
Published By: Hewlett-Packard Company     Published Date: May 15, 2014
HP ProLiant Gen8 servers support automated management and proactive monitoring— and HP is offering financial terms for purchase or lease to SMBs deploying them. For these reasons, HP ProLiant Gen8 servers can play an important role in supporting business continuity and can serve as a key element of business protection programs that are designed to reduce operational costs in today's midsize and large businesses.
Tags : 
proliant gen8, business continuity, networking, storage, data management
    
Hewlett-Packard Company
Published By: Akamai     Published Date: Mar 10, 2012
This whitepaper gives a broad overview of the ways in which Akamai can help organizations bolster the security of their Web-based assets, with capabilities ranging across the application, network, and DNS layers, as well as solutions focused on Distributed Denial of Service (DDoS) mitigation and business continuity.
Tags : 
security, internet security, website security, online security, cloud based security, computer security, distributed denial of service, ddos, ddos security, sql injection security, malware, malware protection, malware security, anti phishing, botnets, web application firewall, firewall, compliance, hacker, hacktivism
    
Akamai
Published By: Neoscale Systems, Inc.     Published Date: Sep 14, 2007
Qsent needed to shore up its disaster recovery strategy. This meant sending backup tapes – each with more than 2.5 terabytes of data – between data centers and storing them offsite. To keep all its data safe and secure, Qsent chose NeoScale’s CryptoStor wire-speed tape security appliance to encrypt and decrypt data.
Tags : 
storage security, storage security encryption, enterprise storage security, disk encryption, encryption technology, tape encryption, encryption key management, enterprise key management, key management for enterprise, effective encryption key management, key management system, information security, protecting offsite tape storage, disaster recovery, data privacy regulations, backup tapes, security appliance, data security, secure key management, wire-speed encryption
    
Neoscale Systems, Inc.
Published By: Datto Inc.     Published Date: Mar 07, 2013
Why deliver just backup, when data recovery and business continuity are the real keys? Learn how one Datto partner delivers business continuity to their clients.
Tags : 
ibc, bdr, intelligent business continuity, backup and recovery, diaster recovery
    
Datto Inc.
Published By: Mimecast     Published Date: Aug 22, 2017
Although many organizations are switching email accounts to Microsoft Office 365, they may well be exposing themselves to a wide range of security risks, data loss, and business continuity issues. This white paper explores how to use Microsoft Office 365 while protecting organizations from various security risks. Discover: • What to look for in third-party solutions • How to protect archived data • How to ensure business continuity
Tags : 
office 365, security, email security, archived data
    
Mimecast
Published By: IBM     Published Date: Jun 26, 2013
How security and business continuity can shape the reputation and value of your company.
Tags : 
risk, banking, business continuity, security
    
IBM
Published By: IBM     Published Date: Aug 06, 2014
Download to learn how security and business continuity can shape the reputation and value of your company.
Tags : 
    
IBM
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.