Disaster Recovery

Keep your business data safe with the right backup and recovery tools. Our white papers, case studies and webcasts bring you the latest information from industry experts.

  • White Papers // Mar 2015

    Data Sheet : Symantec Endpoint Encryption - Get you facts right

    In an era where cyber-attacks are growing and becoming increasingly sophisticated, it's not surprising to find that the number of data breaches has also grown exponentially. Regulatory requirements make encryption a necessity for many. Companies that need to comply with regulations such as PCIDSS or HIPAA must have an auditable...

    Sponsored By Symantec

  • White Papers // Mar 2015

    Data Sheet : Symantec Endpoint Security - Get you facts right

    Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that cannot be stopped by antivirus alone. It’s time to move beyond antivirus. Download this report to learn how you can focus on your business without compromising security or performance with Symantec™ Endpoint Protection providing:...

    Sponsored By Symantec

  • White Papers // Mar 2015

    Unitrends 7 Deadly Sins

    Business systems have evolved into critical elements of conducting normal, day-to-day business. Backup and recovery systems for an organization should not only be flexible and robust enough to restore user data quickly and accurately, but also entire systems and applications to prevent minimal downtime. Read more..

    Sponsored By Unitrends

  • White Papers // Mar 2015

    Infrastructure Matters: Disaster Recovery Overview

    This solution overview guide demonstrates how our services can help to give your users the level of data availability they have come to expect everywhere else. Read More..

    Sponsored By Fujitsu

  • White Papers // Feb 2015

    Protect Applications, Not Just Data – BC/DR for Virtualised Applications

    When organisations are considering a disaster recovery strategy, they look for a solution that not only protects and recovers data, but also provides application consistency. Learn how Zerto enables automated replication and recovery with application awareness to align with the business’ needs – application protection and availability. Download this resource...

    Sponsored By Zerto

  • White Papers // Feb 2015

    A comparison of Hypervisor-based Replication vs. Current and Legacy BC/DR Technologies

    Zerto’s innovative, hypervisor-based replication is a new technology developed to provide a true enterprise-class, yet fully virtual-aware BC/DR solution to protect virtualised, mission-critical applications. This document outlines the fundamental differences between Zerto’s hypervisor-based replication and other current and legacy technologies.

    Sponsored By Zerto

  • White Papers // Feb 2015

    Mission-Critical Disaster Recovery in the Virtual World

    Enterprise App virtualisation is no longer an emerging technology. Enterprises of all sizes are deploying applications on virtualised IT infrastructures and clouds, and reaping the benefits of ease of management, simplicity, mobility, and cost-effectiveness. But there’s a speed bump on the virtualisation highway. Traditional replication and DR solutions were not...

    Sponsored By Zerto

  • White Papers // Jan 2015

    Why HP 3PAR StoreServ Storage for Client Virtualization and best practices

    The rising demands on infrastructure, coupled with diminishing IT budget has caused major concerns for IT administrators such as infrastructure and maintenance complexity, mobile and remote access needs, security and disaster recovery, cost containment directives, and user productivity requirements. This technical report explores a storage solution with client virtualisation that...

    Sponsored By HP

  • Case Studies // Jan 2015

    Avoiding the pitfalls of outdated DR plans: Expectations and threats may require new approaches.

    Will your disaster recovery plan work when the time comes? It's a hard determination for any organization to make. But in IBM's experience, the answer is often "no." Disaster recovery plans often fail because organization have based their recovery strategies on outdated assumptions. Read this white paper to learn seven...

    Sponsored By IBM

  • Case Studies // Jan 2015

    Forrester Report : The Risks Of DIY Disaster Recovery

    Did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks of ‘Do It Yourself’ Disaster Recovery” to learn the critical components that make a disaster...

    Sponsored By IBM

  • Case Studies // Jan 2015

    Five Myths of Do-It-Yourself: Disaster Recovery

    Learn about the most common faulty disaster recovery assumptions—from insufficient employee work arrangements to the inadequacy of annual or biannual disaster recovery testing.

    Sponsored By IBM

  • White Papers // Jan 2015

    The State Of Business Technology Resiliency 2014-2015

    The demand for always-on, always-available services has never been stronger. But flat budgets for business continuity and disaster recovery (BC/DR) may be making it difficult for you to meet these high standards. Forrester Research, in a joint survey with Disaster Recovery Journal, has identified several current trends in business resiliency....

    Sponsored By IBM

  • Case Studies // Jan 2015

    Case Study - Simplify your backup and recovery with a trusted solution

    ICT professionals have casted their votes and chosen Symantec Backup Exec™ 2014 as the solution to deal with today’s growing data volumes and complex virtual environments. Winning the Computerworld Readers Choice Award 2014 for backup system, this powerful, flexible and easy-to-use solution helps your organisation achieve better backup and recovery...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Towards a Cyber Resilience Partnership

    In this report, Towards a Cyber Resilience Partnership details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it, and recognises that security needs to go beyond systems, software...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Improving the cost and management of mirroring data with a Stretched Cluster Solution

    In today’s world, storage and performance requirements are growing faster than ever before and the costs of managing this growth are eating up more and more of the typical IT budget. With the Software Defined Data Centre (SDDC) four core elements of IT Infrastructure – networking, CPU, storage and security–...

    Sponsored By Tectrade

  • White Papers // Nov 2014

    Ease your mind. Find out how to Preserve the Sanctity of Your Data

    Highly complex data protection requirements, server virtualization and exponential data growth are placing tremendous strain on outdated backup infrastructures. What can organizations do to solve this? Read the latest ESG report as it talks about how Symantec Backup Exec 2014 not only backs up data, but also protects against tampering...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Datasheet: Symantec Backup Exec™ 2014

    Backup Exec 2014 delivers powerful, flexible and easy-to-use backup and recovery across your data centre, whether it’s built on virtual or physical environments - or a hybrid of both. So you can recover what you need, when you need it. At the same time storing less with efficient deduplication and...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Forrester Research: Rethinking Data Discovery & Data Classification

    Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.

    Sponsored By IBM

  • White Papers // Sep 2014

    Workforce Mobility Comparison Guide

    Are you challenged to find a mobile solution that enables employees to safely create and share content without compromising your enterprise’s security? With the rise of BYOD in the workplace, IT decision makers are faced with finding ways to securely deliver file synchronizations capabilities. The limitations of traditional file...

    Sponsored By Hitachi

  • Analyst Briefings // Jun 2014

    The Economics of IT Risk and Reputation: What Business Continuity and IT Security Really Mean to Your Organization

    "For one of the largest global studies ever conducted of more than 2,000 business continuity and IT security professionals, IBM teamed up with the Ponemon institute to dig deeper into the true economic impact of business continuity and security failures. The groundbreaking study revealed key findings that you’ll want to...

    Sponsored By IBM

  • White Papers // Jun 2014

    7 Essentials Whitepaper

    Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. Understand which practices can be followed to successfully protect your organization’s business operations and reputation...

    Sponsored By IBM

  • White Papers // Jun 2014

    2014 Ponemon Cost of Data Breach Study

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in United States

    Sponsored By IBM

  • White Papers // Jun 2014

    The Challenge of Protecting Critical Data

    Protection of the most valuable data should be a central, clearly defined and constant component in an overall security strategy, read this report to understand how senior executives can identify their “crown jewels” in a mountain of sensitive enterprise data.

    Sponsored By IBM

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Sponsored By Symantec

  • White Papers // Apr 2014

    How IBM is Enhancing BCM to Help Address Changing Business Realities (Fondly referred to as the IBM story)

    When an organization’s business strategy undergoes significant changes, new risks can arise. Taking a smarter approach to your business continuity program so that it connects business resiliency directly to your business strategy helps address these risks before they can affect your business. IBM did just that with its own business...

    Sponsored By IBM

  • Analyst Briefings // Apr 2014

    The Risks Of DIY Disaster Recovery (Forrester)

    Are you considering in-house disaster recovery management? In the last five years, many companies have. But did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks...

    Sponsored By IBM

  • Case Studies // Apr 2014

    A Broadband Company Streamlines its Recovery Processes with IBM Cloud

    Read the case study “A broadband company streamlines its recovery processes with IBM Cloud” to learn how IBM service teams used cloud-based technology to help the company develop an innovative and proven cloud computing solution for its backup and recovery environment. IBM’s turnkey solution helped the company improve protection, recovery,...

    Sponsored By IBM

  • White Papers // Apr 2014

    IBM Is A Leader Among Traditional Disaster Recovery Service Providers

    In a recent Forrester Wave report, IBM is identified as a “top dog” among traditional disaster recovery service providers, with a strong product offering and global presence. Read this specially commissioned IBM executive brief of the Wave report to find out how IBM’s disaster recovery services can help you meet...

    Sponsored By IBM

  • White Papers // Jan 2014

    Avoiding the Pitfalls of Outdated Disaster Recovery Plans: Evolving Business Expectations and Threats May Require New Disaster Recovery Approaches

    Why do so many disaster recovery plans fail? Too often, organizations base their entire recovery strategies on outdated assumptions. Read "Avoiding the Pitfalls of Outdated Disaster Recovery Plans"

    Sponsored By IBM

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    Customer strategies for data protection and recovery continue to be dictated by aggressive SLAs, rapid recovery, and ease of integration in existing environments. As a result, firms are embracing more disk-based data protection technologies, including purpose-built backup appliances (PBBAs) to protect and recover data and applications. This IDC White Paper...

    Sponsored By Symantec

  • eBooks // Dec 2014

    A Guide to Disaster Recovery in the Cloud

    Most organizations know they need to protect their business critical information to minimize downtime in the event of outages, failures, disasters and other disruptions. But not all companies have the budget, expertise, or time to develop a comprehensive disaster recovery plan...learn more

    Provided By VMware

  • White Papers // Dec 2014

    Tech Tips: How to Get Started with VMware vCloud Air Disaster Recovery

    Few companies can afford operational disruption, yet IT budgets remain flat and can’t encompass the growing need for additional resiliency measures to protect critical-business applications. The recovery-as-a-service offering from VMware, VMware vCloud® Air™ Disaster Recovery, helps you fulfill the need to implement or supplement your organization’s continuity plans while addressing...

    Provided By VMware

  • White Papers // Dec 2014

    Top Three Reasons to Use vCloud Air Disaster Recovery

    Traditional disaster recovery solutions are expensive and complex. That’s making disaster recovery in the cloud a compelling alternative for many small-to-mid sized companies. Cloud solutions are more affordable, require less commitment, and offer more capacity—an ideal combination for resource-strapped organizations. VMware vCloud® Air™ Disaster Recovery is easy to deploy and...

    Provided By VMware

  • White Papers // Dec 2014

    Vmware vCloud Air Disaster Recovery Inforgraphic

    Every business wants to protect its operations from downtime and loss of data. But today, there are more applications, systems and data to protect than ever before. To put it simply, business—and the technology that supports it—is evolving too fast. Like many, you may find that you lack the time...

    Provided By VMware

  • White Papers // Oct 2014

    Business Continuity and Disaster Recovery Plan Template

    This whitepaper gives a detailed plan to manage potential disaster and deal with common issues in and around the workplace. The plan sets out to cover every aspect of your business in terms of ensuring that all areas are covered with an effective plan. Learn more...

    Provided By attix5

  • White Papers // Oct 2014

    The Ultimate Guide to Business Continuity and Disaster Recovery

    This guide looks at the facts around when disaster strikes and assesses whether you are equipped to survive the disaster. It also looks at types of incidents to plan for and the steps to create a Business Continuity plan. Another important aspect covered by this report is how to combat...

    Provided By attix5

  • White Papers // Oct 2014

    The future of user-based security risks. Free Gartner report

    IT security personnel spend time protecting against external attacks, but often miss the biggest source of data breaches – user-based threats including account hijacking, stolen passwords, insiders and more. Learn more about the need for a user-centric security strategy with this free Gartner report.

    Provided By ObserveIT

  • White Papers // Oct 2014

    Open for business: Ins and outs of enterprise-class cloud continuity

    HP examines the emergence of a new generation of cloud-based business continuity solutions and addresses the most current challenges of enterprise-class cloud continuity and how traditional IT operations can be recovered to the cloud. Read this report and learn how HP helped organisations reduced operational cost and maintained availability.

    Provided By HP

  • White Papers // Oct 2014

    What would you do without a Cloud?

    Your organisation needs to have a plan to ensure that you can recover from a catastrophic event – some businesses don’t plan and often don’t survive the effects of this oversight. Read more and watch this video to learn how HP’s cloud based Disaster Recovery services can protect your...

    Provided By HP

  • White Papers // Oct 2014

    Cost of Data Breach Study 2014: Impact of Business Continuity Management

    The latest Ponemon report, a survey of 314 companies around the world that had experienced a data breach, reveals that having a business continuity management (BCM) program in place can help reduce the financial and reputational consequences of a data breach. Read the analyst report to learn how having a...

    Provided By IBM

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Sponsored By Symantec

  • White Papers // Jan 2015

    Towards a Cyber Resilience Partnership

    In this report, Towards a Cyber Resilience Partnership details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it, and recognises that security needs to go beyond systems, software...

    Sponsored By Symantec

  • Analyst Briefings // Apr 2014

    The Risks Of DIY Disaster Recovery (Forrester)

    Are you considering in-house disaster recovery management? In the last five years, many companies have. But did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks...

    Sponsored By IBM

  • White Papers // Jun 2014

    2014 Ponemon Cost of Data Breach Study

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in United States

    Sponsored By IBM

  • Analyst Briefings // Jun 2014

    The Economics of IT Risk and Reputation: What Business Continuity and IT Security Really Mean to Your Organization

    "For one of the largest global studies ever conducted of more than 2,000 business continuity and IT security professionals, IBM teamed up with the Ponemon institute to dig deeper into the true economic impact of business continuity and security failures. The groundbreaking study revealed key findings that you’ll want to...

    Sponsored By IBM

  • White Papers // Jun 2014

    7 Essentials Whitepaper

    Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. Understand which practices can be followed to successfully protect your organization’s business operations and reputation...

    Sponsored By IBM

  • White Papers // Nov 2014

    Ease your mind. Find out how to Preserve the Sanctity of Your Data

    Highly complex data protection requirements, server virtualization and exponential data growth are placing tremendous strain on outdated backup infrastructures. What can organizations do to solve this? Read the latest ESG report as it talks about how Symantec Backup Exec 2014 not only backs up data, but also protects against tampering...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Datasheet: Symantec Backup Exec™ 2014

    Backup Exec 2014 delivers powerful, flexible and easy-to-use backup and recovery across your data centre, whether it’s built on virtual or physical environments - or a hybrid of both. So you can recover what you need, when you need it. At the same time storing less with efficient deduplication and...

    Sponsored By Symantec

  • Case Studies // Jan 2015

    Case Study - Simplify your backup and recovery with a trusted solution

    ICT professionals have casted their votes and chosen Symantec Backup Exec™ 2014 as the solution to deal with today’s growing data volumes and complex virtual environments. Winning the Computerworld Readers Choice Award 2014 for backup system, this powerful, flexible and easy-to-use solution helps your organisation achieve better backup and recovery...

    Sponsored By Symantec

  • White Papers // Oct 2013

    The Evolution and Value of Purpose-Built Backup Appliances

    Customer strategies for data protection and recovery continue to be dictated by aggressive SLAs, rapid recovery, and ease of integration in existing environments. As a result, firms are embracing more disk-based data protection technologies, including purpose-built backup appliances (PBBAs) to protect and recover data and applications. This IDC White Paper...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Why HP 3PAR StoreServ Storage for Client Virtualization and best practices

    The rising demands on infrastructure, coupled with diminishing IT budget has caused major concerns for IT administrators such as infrastructure and maintenance complexity, mobile and remote access needs, security and disaster recovery, cost containment directives, and user productivity requirements. This technical report explores a storage solution with client virtualisation that...

    Sponsored By HP

  • White Papers // Jan 2015

    Improving the cost and management of mirroring data with a Stretched Cluster Solution

    In today’s world, storage and performance requirements are growing faster than ever before and the costs of managing this growth are eating up more and more of the typical IT budget. With the Software Defined Data Centre (SDDC) four core elements of IT Infrastructure – networking, CPU, storage and security–...

    Sponsored By Tectrade

  • White Papers // Nov 2014

    Forrester Research: Rethinking Data Discovery & Data Classification

    Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.

    Sponsored By IBM

  • White Papers // Jun 2014

    The Challenge of Protecting Critical Data

    Protection of the most valuable data should be a central, clearly defined and constant component in an overall security strategy, read this report to understand how senior executives can identify their “crown jewels” in a mountain of sensitive enterprise data.

    Sponsored By IBM

  • White Papers // Jan 2014

    Avoiding the Pitfalls of Outdated Disaster Recovery Plans: Evolving Business Expectations and Threats May Require New Disaster Recovery Approaches

    Why do so many disaster recovery plans fail? Too often, organizations base their entire recovery strategies on outdated assumptions. Read "Avoiding the Pitfalls of Outdated Disaster Recovery Plans"

    Sponsored By IBM

  • White Papers // Apr 2014

    How IBM is Enhancing BCM to Help Address Changing Business Realities (Fondly referred to as the IBM story)

    When an organization’s business strategy undergoes significant changes, new risks can arise. Taking a smarter approach to your business continuity program so that it connects business resiliency directly to your business strategy helps address these risks before they can affect your business. IBM did just that with its own business...

    Sponsored By IBM

  • Case Studies // Apr 2014

    A Broadband Company Streamlines its Recovery Processes with IBM Cloud

    Read the case study “A broadband company streamlines its recovery processes with IBM Cloud” to learn how IBM service teams used cloud-based technology to help the company develop an innovative and proven cloud computing solution for its backup and recovery environment. IBM’s turnkey solution helped the company improve protection, recovery,...

    Sponsored By IBM

  • White Papers // Apr 2014

    IBM Is A Leader Among Traditional Disaster Recovery Service Providers

    In a recent Forrester Wave report, IBM is identified as a “top dog” among traditional disaster recovery service providers, with a strong product offering and global presence. Read this specially commissioned IBM executive brief of the Wave report to find out how IBM’s disaster recovery services can help you meet...

    Sponsored By IBM

  • White Papers // Mar 2015

    Infrastructure Matters: Disaster Recovery Overview

    This solution overview guide demonstrates how our services can help to give your users the level of data availability they have come to expect everywhere else. Read More..

    Sponsored By Fujitsu

  • White Papers // Sep 2014

    Workforce Mobility Comparison Guide

    Are you challenged to find a mobile solution that enables employees to safely create and share content without compromising your enterprise’s security? With the rise of BYOD in the workplace, IT decision makers are faced with finding ways to securely deliver file synchronizations capabilities. The limitations of traditional file...

    Sponsored By Hitachi

  • White Papers // Mar 2015

    Unitrends 7 Deadly Sins

    Business systems have evolved into critical elements of conducting normal, day-to-day business. Backup and recovery systems for an organization should not only be flexible and robust enough to restore user data quickly and accurately, but also entire systems and applications to prevent minimal downtime. Read more..

    Sponsored By Unitrends

  • Case Studies // Jan 2015

    Avoiding the pitfalls of outdated DR plans: Expectations and threats may require new approaches.

    Will your disaster recovery plan work when the time comes? It's a hard determination for any organization to make. But in IBM's experience, the answer is often "no." Disaster recovery plans often fail because organization have based their recovery strategies on outdated assumptions. Read this white paper to learn seven...

    Sponsored By IBM

  • Case Studies // Jan 2015

    Forrester Report : The Risks Of DIY Disaster Recovery

    Did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks of ‘Do It Yourself’ Disaster Recovery” to learn the critical components that make a disaster...

    Sponsored By IBM

  • Case Studies // Jan 2015

    Five Myths of Do-It-Yourself: Disaster Recovery

    Learn about the most common faulty disaster recovery assumptions—from insufficient employee work arrangements to the inadequacy of annual or biannual disaster recovery testing.

    Sponsored By IBM

  • White Papers // Jan 2015

    The State Of Business Technology Resiliency 2014-2015

    The demand for always-on, always-available services has never been stronger. But flat budgets for business continuity and disaster recovery (BC/DR) may be making it difficult for you to meet these high standards. Forrester Research, in a joint survey with Disaster Recovery Journal, has identified several current trends in business resiliency....

    Sponsored By IBM

  • White Papers // Mar 2015

    Data Sheet : Symantec Endpoint Encryption - Get you facts right

    In an era where cyber-attacks are growing and becoming increasingly sophisticated, it's not surprising to find that the number of data breaches has also grown exponentially. Regulatory requirements make encryption a necessity for many. Companies that need to comply with regulations such as PCIDSS or HIPAA must have an auditable...

    Sponsored By Symantec

  • White Papers // Mar 2015

    Data Sheet : Symantec Endpoint Security - Get you facts right

    Malware has evolved from large-scale massive attacks to include Targeted Attacks and Advanced Persistent Threats that cannot be stopped by antivirus alone. It’s time to move beyond antivirus. Download this report to learn how you can focus on your business without compromising security or performance with Symantec™ Endpoint Protection providing:...

    Sponsored By Symantec

  • White Papers // Feb 2015

    Protect Applications, Not Just Data – BC/DR for Virtualised Applications

    When organisations are considering a disaster recovery strategy, they look for a solution that not only protects and recovers data, but also provides application consistency. Learn how Zerto enables automated replication and recovery with application awareness to align with the business’ needs – application protection and availability. Download this resource...

    Sponsored By Zerto

  • White Papers // Feb 2015

    A comparison of Hypervisor-based Replication vs. Current and Legacy BC/DR Technologies

    Zerto’s innovative, hypervisor-based replication is a new technology developed to provide a true enterprise-class, yet fully virtual-aware BC/DR solution to protect virtualised, mission-critical applications. This document outlines the fundamental differences between Zerto’s hypervisor-based replication and other current and legacy technologies.

    Sponsored By Zerto

  • White Papers // Feb 2015

    Mission-Critical Disaster Recovery in the Virtual World

    Enterprise App virtualisation is no longer an emerging technology. Enterprises of all sizes are deploying applications on virtualised IT infrastructures and clouds, and reaping the benefits of ease of management, simplicity, mobility, and cost-effectiveness. But there’s a speed bump on the virtualisation highway. Traditional replication and DR solutions were not...

    Sponsored By Zerto

  • White Papers // Oct 2014

    Business Continuity and Disaster Recovery Plan Template

    This whitepaper gives a detailed plan to manage potential disaster and deal with common issues in and around the workplace. The plan sets out to cover every aspect of your business in terms of ensuring that all areas are covered with an effective plan. Learn more...

    Provided By attix5

  • White Papers // Feb 2009

    Best Practices for Data Archiving

    Corporations depend on the flow of information to conduct their business. From accounting to production to marketing to personnel, the information procured, generated, organized, and stored by an organization represents a significant portion of the output of its workforce. Protecting that information from unexpected disasters is not only prudent, in...

    Provided By CA

  • Webcasts // Sep 2013

    Backup Best Practices for VMware Virtual Machines

    Are you a brand new vSphere administrator? Virtualization has come a long way in a short time, so keeping up with the latest best practices is critical. In this on-demand webcast, Greg Shields of Concentrated Technology discusses the history of virtual backups, how to address VMware and VM backups and...

    Provided By Dell

  • White Papers // Oct 2014

    The future of user-based security risks. Free Gartner report

    IT security personnel spend time protecting against external attacks, but often miss the biggest source of data breaches – user-based threats including account hijacking, stolen passwords, insiders and more. Learn more about the need for a user-centric security strategy with this free Gartner report.

    Provided By ObserveIT

  • White Papers // Oct 2014

    The Ultimate Guide to Business Continuity and Disaster Recovery

    This guide looks at the facts around when disaster strikes and assesses whether you are equipped to survive the disaster. It also looks at types of incidents to plan for and the steps to create a Business Continuity plan. Another important aspect covered by this report is how to combat...

    Provided By attix5

  • Downloads // Apr 2005

    Disaster recovery plan update checklist

    A disaster recovery plan isn't a static document. For the plan to be effective in a crisis, you need to review and reevaluate your recovery strategies and periodically update them to reflect organizational changes and the current state of business operations. This checklist steps through the major DRP practices that...

    Provided By TechRepublic

  • White Papers // Sep 2006

    The Business Case for Disaster Recovery Planning: Calculating the Cost of Downtime

    IT leaders recognize that a disaster can be any event that prevents a business from accessing the data and systems it needs to operate. This could encompass everything from regional power outages, to virus outbreaks, to employee sabotage, to external data fraud, to devastating terrorist attacks. Virtually every company faces...

    Provided By Iron Mountain

  • White Papers // Oct 2014

    Cost of Data Breach Study 2014: Impact of Business Continuity Management

    The latest Ponemon report, a survey of 314 companies around the world that had experienced a data breach, reveals that having a business continuity management (BCM) program in place can help reduce the financial and reputational consequences of a data breach. Read the analyst report to learn how having a...

    Provided By IBM

  • White Papers // Jun 2014

    The Seven Essential Practices For Effective Business Continuity Management

    Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. The key to successfully protecting your organization’s business operations and reputation is to take a...

    Provided By IBM

  • White Papers // Jul 2013

    Tech Tips: VMware vSphere Data Protection

    Straight from our experts at VMware®, follow these technical tips for a successful and smooth implementation of VMware vSphere® Data Protection™. From retention policies to best practices for deploying appliances, reference these tips as you create or improve your data protection plan.

    Provided By VMware