Disaster Recovery

Organizations live and die by the security of their data and the ability to access business-critical systems. TechRepublic offers advice and best practices for business continuity planning, data backup, and disaster recovery.

  • White Papers // Feb 2015

    A comparison of Hypervisor-based Replication vs. Current and Legacy BC/DR Technologies

    Zerto’s innovative, hypervisor-based replication is a new technology developed to provide a true enterprise-class, yet fully virtual-aware BC/DR solution to protect virtualised, mission-critical applications. This document outlines the fundamental differences between Zerto’s hypervisor-based replication and other current and legacy technologies.

    Sponsored By Zerto

  • White Papers // Feb 2015

    Protect Applications, Not Just Data – BC/DR for Virtualised Applications

    When organisations are considering a business continuity/disaster recovery solution, they look for a solution that not only protects and recovers the data, but also protects and recovers the application. Coordinating the state of the data and the state of the application is challenging, as they typically span multiple virtual machines,...

    Sponsored By Zerto

  • White Papers // Feb 2015

    Mission-Critical Disaster Recovery in the Virtual World

    Enterprise App virtualisation is no longer an emerging technology. Enterprises of all sizes are deploying applications on virtualised IT infrastructures and clouds, and reaping the benefits of ease of management, simplicity, mobility, and cost-effectiveness. But there’s a speed bump on the virtualisation highway. Traditional replication and DR solutions were not...

    Sponsored By Zerto

  • White Papers // Jan 2015

    Why HP 3PAR StoreServ Storage for Client Virtualization and best practices

    The rising demands on infrastructure, coupled with diminishing IT budget has caused major concerns for IT administrators such as infrastructure and maintenance complexity, mobile and remote access needs, security and disaster recovery, cost containment directives, and user productivity requirements. This technical report explores a storage solution with client virtualisation that...

    Sponsored By HP

  • White Papers // Jan 2015

    The State Of Business Technology Resiliency 2014-2015

    The demand for always-on, always-available services has never been stronger. But flat budgets for business continuity and disaster recovery (BC/DR) may be making it difficult for you to meet these high standards. Forrester Research, in a joint survey with Disaster Recovery Journal, has identified several current trends in business resiliency....

    Sponsored By IBM

  • Case Studies // Jan 2015

    Avoiding the pitfalls of outdated DR plans: Expectations and threats may require new approaches.

    Will your disaster recovery plan work when the time comes? It's a hard determination for any organization to make. But in IBM's experience, the answer is often "no." Disaster recovery plans often fail because organization have based their recovery strategies on outdated assumptions. Read this white paper to learn seven...

    Sponsored By IBM

  • Case Studies // Jan 2015

    Forrester Report : The Risks Of DIY Disaster Recovery

    Did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks of ‘Do It Yourself’ Disaster Recovery” to learn the critical components that make a disaster...

    Sponsored By IBM

  • Case Studies // Jan 2015

    Five Myths of Do-It-Yourself: Disaster Recovery

    Learn about the most common faulty disaster recovery assumptions—from insufficient employee work arrangements to the inadequacy of annual or biannual disaster recovery testing.

    Sponsored By IBM

  • Case Studies // Jan 2015

    Case Study - Simplify your backup and recovery with a trusted solution

    ICT professionals have casted their votes and chosen Symantec Backup Exec™ 2014 as the solution to deal with today’s growing data volumes and complex virtual environments. Winning the Computerworld Readers Choice Award 2014 for backup system, this powerful, flexible and easy-to-use solution helps your organisation achieve better backup and recovery...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Towards a Cyber Resilience Partnership

    In this report, Towards a Cyber Resilience Partnership details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it, and recognises that security needs to go beyond systems, software...

    Sponsored By Symantec

  • White Papers // Jan 2015

    Improving the cost and management of mirroring data with a Stretched Cluster Solution

    In today’s world, storage and performance requirements are growing faster than ever before and the costs of managing this growth are eating up more and more of the typical IT budget. With the Software Defined Data Centre (SDDC) four core elements of IT Infrastructure – networking, CPU, storage and security–...

    Sponsored By Tectrade

  • White Papers // Dec 2014

    Tech Tips: How to Get Started with VMware vCloud Air Disaster Recovery

    Few companies can afford operational disruption, yet IT budgets remain flat and can’t encompass the growing need for additional resiliency measures to protect critical-business applications. The recovery-as-a-service offering from VMware, VMware vCloud® Air™ Disaster Recovery, helps you fulfill the need to implement or supplement your organization’s continuity plans while addressing...

    Sponsored By VMware

  • White Papers // Dec 2014

    Top Three Reasons to Use vCloud Air Disaster Recovery

    Traditional disaster recovery solutions are expensive and complex. That’s making disaster recovery in the cloud a compelling alternative for many small-to-mid sized companies. Cloud solutions are more affordable, require less commitment, and offer more capacity—an ideal combination for resource-strapped organizations. VMware vCloud® Air™ Disaster Recovery is easy to deploy and...

    Sponsored By VMware

  • eBooks // Dec 2014

    A Guide to Disaster Recovery in the Cloud

    Most organizations know they need to protect their business critical information to minimize downtime in the event of outages, failures, disasters and other disruptions. But not all companies have the budget, expertise, or time to develop a comprehensive disaster recovery plan...learn more

    Sponsored By VMware

  • White Papers // Dec 2014

    Vmware vCloud Air Disaster Recovery Inforgraphic

    Every business wants to protect its operations from downtime and loss of data. But today, there are more applications, systems and data to protect than ever before. To put it simply, business—and the technology that supports it—is evolving too fast. Like many, you may find that you lack the time...

    Sponsored By VMware

  • White Papers // Nov 2014

    Ease your mind. Find out how to Preserve the Sanctity of Your Data

    Highly complex data protection requirements, server virtualization and exponential data growth are placing tremendous strain on outdated backup infrastructures. What can organizations do to solve this? Read the latest ESG report as it talks about how Symantec Backup Exec 2014 not only backs up data, but also protects against tampering...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Datasheet: Symantec Backup Exec™ 2014

    Backup Exec 2014 delivers powerful, flexible and easy-to-use backup and recovery across your data centre, whether it’s built on virtual or physical environments - or a hybrid of both. So you can recover what you need, when you need it. At the same time storing less with efficient deduplication and...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Forrester Research: Rethinking Data Discovery & Data Classification

    Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.

    Sponsored By IBM

  • White Papers // Oct 2014

    The future of user-based security risks. Free Gartner report

    IT security personnel spend time protecting against external attacks, but often miss the biggest source of data breaches – user-based threats including account hijacking, stolen passwords, insiders and more. Learn more about the need for a user-centric security strategy with this free Gartner report.

    Sponsored By ObserveIT

  • White Papers // Oct 2014

    Cost of Data Breach Study 2014: Impact of Business Continuity Management

    The latest Ponemon report, a survey of 314 companies around the world that had experienced a data breach, reveals that having a business continuity management (BCM) program in place can help reduce the financial and reputational consequences of a data breach. Read the analyst report to learn how having a...

    Sponsored By IBM

  • White Papers // Oct 2014

    Getting The Most From Your Hybrid IT Environment

    This infographic highlights the ways experienced sourcing providers can help organizations profit from hybrid IT by enabling new ways of doing business and reducing costs. Read More...

    Sponsored By IBM

  • White Papers // Oct 2014

    Why Customers Are Moving Beyond the Status Quo with VMware Horizon 6

    In the competitive marketplace that surrounds us today, customers shouldn’t have to settle for legacy desktop or application delivery simply because they’ve relied on a certain vendor in the past. This white paper reviews how three customers decided to partner with VMware, and how they benefited from the latest VDI...

    Sponsored By VMware

  • White Papers // Sep 2014

    Workforce Mobility Comparison Guide

    Are you challenged to find a mobile solution that enables employees to safely create and share content without compromising your enterprise’s security? With the rise of BYOD in the workplace, IT decision makers are faced with finding ways to securely deliver file synchronizations capabilities. The limitations of traditional file...

    Sponsored By Hitachi

  • White Papers // Sep 2014

    Hybrid Approach Rewrites The Rules For BackUp Storage

    Today’s IT professionals are expected to handle vast, rapidly-growing quantities of unstructured and structured data while slashing storage costs. That often requires settling for sluggish backup storage...until now, that is. Learn how hybrid storage shrinks backup windows and reduces RPO & RTO targets...without breaking the bank. Combining the speed of...

    Sponsored By Nexsan by Imation

  • eBooks // Sep 2014

    Hadoop Buyer's Guide

    Increasing numbers of enterprises are turning to Hadoop as an indispensable component for the mission-critical applications that drive their core business operations. Hadoop is no longer considered a “science project" or something to be casually spun off to a “skunk works” team. This newfound prominence means that the responsibility of...

    Sponsored By MapR

  • White Papers // Sep 2014

    CITO Research: Optimized Data Engineering - A Crucial Challenge for the Internet of Everything Era

    From its inception, MapR has been a leader in architectural innovations to make Hadoop easier to use and more dependable. These innovations range from self-healing of critical services, point-in-time data-recovery snapshots and frequent enhancements that help prevent outages. MapR also overcomes the limit on the number of files that can...

    Sponsored By MapR

  • White Papers // Aug 2014

    Gartner 2014 Enterprise Backup Software and Integrated Appliances Magic Quadrant

    According to Gartner, the backup/recovery software and integrated appliance market comprises tens, if not hundreds, of vendors. This research narrows it down to those that have a strong presence in midsize and large organization IT environments.” Download the report to learn why CommVault has been named a leader and why...

    Sponsored By CommVault Systems

  • White Papers // Jun 2014

    The Seven Essential Practices For Effective Business Continuity Management

    Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. The key to successfully protecting your organization’s business operations and reputation is to take a...

    Sponsored By IBM

  • Analyst Briefings // Jun 2014

    The Economics of IT Risk and Reputation: What Business Continuity and IT Security Really Mean to Your Organization

    "For one of the largest global studies ever conducted of more than 2,000 business continuity and IT security professionals, IBM teamed up with the Ponemon institute to dig deeper into the true economic impact of business continuity and security failures. The groundbreaking study revealed key findings that you’ll want to...

    Sponsored By IBM

  • White Papers // Jun 2014

    7 Essentials Whitepaper

    Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. Understand which practices can be followed to successfully protect your organization’s business operations and reputation...

    Sponsored By IBM

  • White Papers // Jun 2014

    2014 Ponemon Cost of Data Breach Study

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in United States

    Sponsored By IBM

  • White Papers // Jun 2014

    The Challenge of Protecting Critical Data

    Protection of the most valuable data should be a central, clearly defined and constant component in an overall security strategy, read this report to understand how senior executives can identify their “crown jewels” in a mountain of sensitive enterprise data.

    Sponsored By IBM

  • White Papers // May 2014

    University of Kentucky Leveraging SAP HANA to Lead the Way in Use of Analytics in Higher Education

    The University of Kentucky faces challenges similar to those faced by most public universities, including declining funding from state and federal sources, pressure to avoid tuition increases, and the need to increase the efficiency of operations and staff. The university needed to develop "better and approachable insight" into its operations...

    Sponsored By SAP

  • White Papers // May 2014

    Best-In-Class Steps to Successfully Manage the Buyer's Journey

    Delighting customers is no easy task for today’s organizations. The constant growth of information on numerous products and services empower customers with crucial intelligence that inuences their purchase decisions. Achieving success in keeping in-tune with customers’ rapidly changing needs requires businesses to streamline their customer data management activities to personalize...

    Sponsored By SAP

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Sponsored By Symantec

  • White Papers // Apr 2014

    Uniform Server Management for Hybrid Environments

    With a broad array of multivendor, cloud and non-cloud platforms and devices to support, managing today’s server infrastructures has grown increasingly complicated. Check this out and learn how you can manage server infrastructures efficiently.

    Sponsored By IBM

  • White Papers // Apr 2014

    How IBM is Enhancing BCM to Help Address Changing Business Realities (Fondly referred to as the IBM story)

    When an organization’s business strategy undergoes significant changes, new risks can arise. Taking a smarter approach to your business continuity program so that it connects business resiliency directly to your business strategy helps address these risks before they can affect your business. IBM did just that with its own business...

    Sponsored By IBM

  • Analyst Briefings // Apr 2014

    The Risks Of DIY Disaster Recovery (Forrester)

    Are you considering in-house disaster recovery management? In the last five years, many companies have. But did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks...

    Sponsored By IBM

  • Case Studies // Apr 2014

    A Broadband Company Streamlines its Recovery Processes with IBM Cloud

    Read the case study “A broadband company streamlines its recovery processes with IBM Cloud” to learn how IBM service teams used cloud-based technology to help the company develop an innovative and proven cloud computing solution for its backup and recovery environment. IBM’s turnkey solution helped the company improve protection, recovery,...

    Sponsored By IBM

  • White Papers // Apr 2014

    IBM Is A Leader Among Traditional Disaster Recovery Service Providers

    In a recent Forrester Wave report, IBM is identified as a “top dog” among traditional disaster recovery service providers, with a strong product offering and global presence. Read this specially commissioned IBM executive brief of the Wave report to find out how IBM’s disaster recovery services can help you meet...

    Sponsored By IBM

  • White Papers // Apr 2014

    Unified Data Protection for Physical and Virtual Environments

    This white paper will discuss the evolution, benefits and challenges of data protection for virtual environments and how a modern data protection solution can enable both virtualization professionals and storage managers to perform successful backups, but more importantly guaranteed restores.

    Sponsored By Symantec

  • White Papers // Jun 2014

    The Seven Essential Practices For Effective Business Continuity Management

    Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. The key to successfully protecting your organization’s business operations and reputation is to take a...

    Sponsored By IBM

  • White Papers // Jan 2015

    Towards a Cyber Resilience Partnership

    In this report, Towards a Cyber Resilience Partnership details to IT leadership the importance of cyber resilience in the face of evolving cyber threats. It defines the state of cyber resilience and the importance of security intelligence in achieving it, and recognises that security needs to go beyond systems, software...

    Sponsored By Symantec

  • Analyst Briefings // Apr 2014

    The Risks Of DIY Disaster Recovery (Forrester)

    Are you considering in-house disaster recovery management? In the last five years, many companies have. But did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks...

    Sponsored By IBM

  • White Papers // Oct 2014

    The future of user-based security risks. Free Gartner report

    IT security personnel spend time protecting against external attacks, but often miss the biggest source of data breaches – user-based threats including account hijacking, stolen passwords, insiders and more. Learn more about the need for a user-centric security strategy with this free Gartner report.

    Sponsored By ObserveIT

  • White Papers // Jun 2014

    2014 Ponemon Cost of Data Breach Study

    The 2014 Global Cost of Data Breach Study from Ponemon Institute, sponsored by IBM, Showcases How much could a data breach cost your organization? This report provides benchmark data based on actual experiences of organizations in United States

    Sponsored By IBM

  • Analyst Briefings // Jun 2014

    The Economics of IT Risk and Reputation: What Business Continuity and IT Security Really Mean to Your Organization

    "For one of the largest global studies ever conducted of more than 2,000 business continuity and IT security professionals, IBM teamed up with the Ponemon institute to dig deeper into the true economic impact of business continuity and security failures. The groundbreaking study revealed key findings that you’ll want to...

    Sponsored By IBM

  • White Papers // Jun 2014

    7 Essentials Whitepaper

    Making changes to your business strategy can often create new risks. If your business continuity management (BCM) plan is not part of an organization-wide, integrated program, it may not evolve to address these new risks. Understand which practices can be followed to successfully protect your organization’s business operations and reputation...

    Sponsored By IBM

  • White Papers // May 2014

    University of Kentucky Leveraging SAP HANA to Lead the Way in Use of Analytics in Higher Education

    The University of Kentucky faces challenges similar to those faced by most public universities, including declining funding from state and federal sources, pressure to avoid tuition increases, and the need to increase the efficiency of operations and staff. The university needed to develop "better and approachable insight" into its operations...

    Sponsored By SAP

  • White Papers // May 2014

    Best-In-Class Steps to Successfully Manage the Buyer's Journey

    Delighting customers is no easy task for today’s organizations. The constant growth of information on numerous products and services empower customers with crucial intelligence that inuences their purchase decisions. Achieving success in keeping in-tune with customers’ rapidly changing needs requires businesses to streamline their customer data management activities to personalize...

    Sponsored By SAP

  • White Papers // Jan 2015

    Why HP 3PAR StoreServ Storage for Client Virtualization and best practices

    The rising demands on infrastructure, coupled with diminishing IT budget has caused major concerns for IT administrators such as infrastructure and maintenance complexity, mobile and remote access needs, security and disaster recovery, cost containment directives, and user productivity requirements. This technical report explores a storage solution with client virtualisation that...

    Sponsored By HP

  • White Papers // Dec 2014

    Tech Tips: How to Get Started with VMware vCloud Air Disaster Recovery

    Few companies can afford operational disruption, yet IT budgets remain flat and can’t encompass the growing need for additional resiliency measures to protect critical-business applications. The recovery-as-a-service offering from VMware, VMware vCloud® Air™ Disaster Recovery, helps you fulfill the need to implement or supplement your organization’s continuity plans while addressing...

    Sponsored By VMware

  • White Papers // Dec 2014

    Top Three Reasons to Use vCloud Air Disaster Recovery

    Traditional disaster recovery solutions are expensive and complex. That’s making disaster recovery in the cloud a compelling alternative for many small-to-mid sized companies. Cloud solutions are more affordable, require less commitment, and offer more capacity—an ideal combination for resource-strapped organizations. VMware vCloud® Air™ Disaster Recovery is easy to deploy and...

    Sponsored By VMware

  • eBooks // Dec 2014

    A Guide to Disaster Recovery in the Cloud

    Most organizations know they need to protect their business critical information to minimize downtime in the event of outages, failures, disasters and other disruptions. But not all companies have the budget, expertise, or time to develop a comprehensive disaster recovery plan...learn more

    Sponsored By VMware

  • White Papers // Dec 2014

    Vmware vCloud Air Disaster Recovery Inforgraphic

    Every business wants to protect its operations from downtime and loss of data. But today, there are more applications, systems and data to protect than ever before. To put it simply, business—and the technology that supports it—is evolving too fast. Like many, you may find that you lack the time...

    Sponsored By VMware

  • White Papers // Jan 2015

    Improving the cost and management of mirroring data with a Stretched Cluster Solution

    In today’s world, storage and performance requirements are growing faster than ever before and the costs of managing this growth are eating up more and more of the typical IT budget. With the Software Defined Data Centre (SDDC) four core elements of IT Infrastructure – networking, CPU, storage and security–...

    Sponsored By Tectrade

  • Case Studies // Jan 2015

    Case Study - Simplify your backup and recovery with a trusted solution

    ICT professionals have casted their votes and chosen Symantec Backup Exec™ 2014 as the solution to deal with today’s growing data volumes and complex virtual environments. Winning the Computerworld Readers Choice Award 2014 for backup system, this powerful, flexible and easy-to-use solution helps your organisation achieve better backup and recovery...

    Sponsored By Symantec

  • White Papers // Sep 2014

    Workforce Mobility Comparison Guide

    Are you challenged to find a mobile solution that enables employees to safely create and share content without compromising your enterprise’s security? With the rise of BYOD in the workplace, IT decision makers are faced with finding ways to securely deliver file synchronizations capabilities. The limitations of traditional file...

    Sponsored By Hitachi

  • White Papers // Aug 2014

    Gartner 2014 Enterprise Backup Software and Integrated Appliances Magic Quadrant

    According to Gartner, the backup/recovery software and integrated appliance market comprises tens, if not hundreds, of vendors. This research narrows it down to those that have a strong presence in midsize and large organization IT environments.” Download the report to learn why CommVault has been named a leader and why...

    Sponsored By CommVault Systems

  • White Papers // Oct 2014

    Cost of Data Breach Study 2014: Impact of Business Continuity Management

    The latest Ponemon report, a survey of 314 companies around the world that had experienced a data breach, reveals that having a business continuity management (BCM) program in place can help reduce the financial and reputational consequences of a data breach. Read the analyst report to learn how having a...

    Sponsored By IBM

  • White Papers // Apr 2014

    Uniform Server Management for Hybrid Environments

    With a broad array of multivendor, cloud and non-cloud platforms and devices to support, managing today’s server infrastructures has grown increasingly complicated. Check this out and learn how you can manage server infrastructures efficiently.

    Sponsored By IBM

  • White Papers // Oct 2014

    Getting The Most From Your Hybrid IT Environment

    This infographic highlights the ways experienced sourcing providers can help organizations profit from hybrid IT by enabling new ways of doing business and reducing costs. Read More...

    Sponsored By IBM

  • eBooks // Sep 2014

    Hadoop Buyer's Guide

    Increasing numbers of enterprises are turning to Hadoop as an indispensable component for the mission-critical applications that drive their core business operations. Hadoop is no longer considered a “science project" or something to be casually spun off to a “skunk works” team. This newfound prominence means that the responsibility of...

    Sponsored By MapR

  • White Papers // Sep 2014

    CITO Research: Optimized Data Engineering - A Crucial Challenge for the Internet of Everything Era

    From its inception, MapR has been a leader in architectural innovations to make Hadoop easier to use and more dependable. These innovations range from self-healing of critical services, point-in-time data-recovery snapshots and frequent enhancements that help prevent outages. MapR also overcomes the limit on the number of files that can...

    Sponsored By MapR

  • White Papers // Nov 2014

    Forrester Research: Rethinking Data Discovery & Data Classification

    Read this Forrester whitepaper to learn more about the critical, yet often overlooked, role that data classification and data discovery can play in reducing your organization's risk and enhancing security.

    Sponsored By IBM

  • White Papers // Oct 2014

    Why Customers Are Moving Beyond the Status Quo with VMware Horizon 6

    In the competitive marketplace that surrounds us today, customers shouldn’t have to settle for legacy desktop or application delivery simply because they’ve relied on a certain vendor in the past. This white paper reviews how three customers decided to partner with VMware, and how they benefited from the latest VDI...

    Sponsored By VMware

  • White Papers // Jan 2015

    The State Of Business Technology Resiliency 2014-2015

    The demand for always-on, always-available services has never been stronger. But flat budgets for business continuity and disaster recovery (BC/DR) may be making it difficult for you to meet these high standards. Forrester Research, in a joint survey with Disaster Recovery Journal, has identified several current trends in business resiliency....

    Sponsored By IBM

  • Case Studies // Jan 2015

    Avoiding the pitfalls of outdated DR plans: Expectations and threats may require new approaches.

    Will your disaster recovery plan work when the time comes? It's a hard determination for any organization to make. But in IBM's experience, the answer is often "no." Disaster recovery plans often fail because organization have based their recovery strategies on outdated assumptions. Read this white paper to learn seven...

    Sponsored By IBM

  • Case Studies // Jan 2015

    Forrester Report : The Risks Of DIY Disaster Recovery

    Did you know that without the proper resources in place, managing disaster recovery yourself can put a strain on your budget, your staff and your disaster preparedness? Read this IBM-Forrester global study “The Risks of ‘Do It Yourself’ Disaster Recovery” to learn the critical components that make a disaster...

    Sponsored By IBM

  • Case Studies // Jan 2015

    Five Myths of Do-It-Yourself: Disaster Recovery

    Learn about the most common faulty disaster recovery assumptions—from insufficient employee work arrangements to the inadequacy of annual or biannual disaster recovery testing.

    Sponsored By IBM

  • White Papers // Nov 2014

    Ease your mind. Find out how to Preserve the Sanctity of Your Data

    Highly complex data protection requirements, server virtualization and exponential data growth are placing tremendous strain on outdated backup infrastructures. What can organizations do to solve this? Read the latest ESG report as it talks about how Symantec Backup Exec 2014 not only backs up data, but also protects against tampering...

    Sponsored By Symantec

  • White Papers // Nov 2014

    Datasheet: Symantec Backup Exec™ 2014

    Backup Exec 2014 delivers powerful, flexible and easy-to-use backup and recovery across your data centre, whether it’s built on virtual or physical environments - or a hybrid of both. So you can recover what you need, when you need it. At the same time storing less with efficient deduplication and...

    Sponsored By Symantec

  • White Papers // Sep 2014

    Hybrid Approach Rewrites The Rules For BackUp Storage

    Today’s IT professionals are expected to handle vast, rapidly-growing quantities of unstructured and structured data while slashing storage costs. That often requires settling for sluggish backup storage...until now, that is. Learn how hybrid storage shrinks backup windows and reduces RPO & RTO targets...without breaking the bank. Combining the speed of...

    Sponsored By Nexsan by Imation

  • White Papers // Jan 2014

    Avoiding the Pitfalls of Outdated Disaster Recovery Plans: Evolving Business Expectations and Threats May Require New Disaster Recovery Approaches

    Why do so many disaster recovery plans fail? Too often, organizations base their entire recovery strategies on outdated assumptions. Read "Avoiding the Pitfalls of Outdated Disaster Recovery Plans"

    Sponsored By IBM

  • White Papers // Jun 2014

    The Challenge of Protecting Critical Data

    Protection of the most valuable data should be a central, clearly defined and constant component in an overall security strategy, read this report to understand how senior executives can identify their “crown jewels” in a mountain of sensitive enterprise data.

    Sponsored By IBM

  • White Papers // Apr 2014

    How IBM is Enhancing BCM to Help Address Changing Business Realities (Fondly referred to as the IBM story)

    When an organization’s business strategy undergoes significant changes, new risks can arise. Taking a smarter approach to your business continuity program so that it connects business resiliency directly to your business strategy helps address these risks before they can affect your business. IBM did just that with its own business...

    Sponsored By IBM

  • Case Studies // Apr 2014

    A Broadband Company Streamlines its Recovery Processes with IBM Cloud

    Read the case study “A broadband company streamlines its recovery processes with IBM Cloud” to learn how IBM service teams used cloud-based technology to help the company develop an innovative and proven cloud computing solution for its backup and recovery environment. IBM’s turnkey solution helped the company improve protection, recovery,...

    Sponsored By IBM

  • White Papers // Apr 2014

    IBM Is A Leader Among Traditional Disaster Recovery Service Providers

    In a recent Forrester Wave report, IBM is identified as a “top dog” among traditional disaster recovery service providers, with a strong product offering and global presence. Read this specially commissioned IBM executive brief of the Wave report to find out how IBM’s disaster recovery services can help you meet...

    Sponsored By IBM

  • White Papers // Feb 2015

    Protect Applications, Not Just Data – BC/DR for Virtualised Applications

    When organisations are considering a business continuity/disaster recovery solution, they look for a solution that not only protects and recovers the data, but also protects and recovers the application. Coordinating the state of the data and the state of the application is challenging, as they typically span multiple virtual machines,...

    Sponsored By Zerto

  • White Papers // Feb 2015

    A comparison of Hypervisor-based Replication vs. Current and Legacy BC/DR Technologies

    Zerto’s innovative, hypervisor-based replication is a new technology developed to provide a true enterprise-class, yet fully virtual-aware BC/DR solution to protect virtualised, mission-critical applications. This document outlines the fundamental differences between Zerto’s hypervisor-based replication and other current and legacy technologies.

    Sponsored By Zerto