Home | About | Publishers | Advertisers | Contact | Directory
Your Research Library for Finding Relevant BtoB Whitepapers, Webinars, eBooks, and Digital Content
> Research > Technology > Security > Business Continuity Popular Research

Find Research


Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.

Business Continuity Planning (BCP) is a methodology used to create a plan for how an organization will resume partially or completely interrupted critical function(s) within a predetermined time after a disaster or disruption. BCP may be a part of a larger organizational effort to reduce operational risk associated with poor information security controls, and thus has a number of overlaps with the practice of risk management.
Results 201 - 225 of 305Sort Results By: Published Date | Title | Company Name
Published By: InMage     Published Date: Feb 24, 2009
Utah State University is nationally and internationally recognized for its intellectual and technological leadership in land, water, space and life enhancement. Providing education for more than 23,000 undergraduate and graduate students, Utah State relies on technology to support its innovative initiatives including campus-wide wireless networking, a recent partnership with Google, and a unified email system.
Tags : 
inmage, data recovery, disaster recovery, business continuity, dr scout
    
InMage
Published By: HP     Published Date: Jul 29, 2008
Join this informative web event to hear from experts at Forrester Research and HP discuss the top ten challenges for effective disaster recovery planning, how to quantify the cost of downtime as well as tips on selecting and implementing disaster recovery solutions.
Tags : 
business continuity, disaster, disaster recovery, high availability
    
HP
Published By: HP     Published Date: Jun 23, 2008
HP is increasingly demonstrating that its vision includes positioning itself as an innovator at the high end especially with respect to managing heterogeneous storage assets. HP appears to be a leading proponent of avoiding dreams of owning the entire data center storage infrastructure. Rather its aim appears to add customer value by recognizing and accommodating the diversity of installed storage assets at customer sites.
Tags : 
hp disaster proof, disaster proof, disaster-proof, storage, storageworks
    
HP
Published By: HP     Published Date: Jun 23, 2008
To stay competitive in today's business climate, organizations must find ways to meet their business needs while controlling IT costs. IT departments face flat budgets and, at the same time, find that their organizations have become increasingly dependent on uninterrupted access to business-critical data. In today's world, prudent IT administrators prepare to recover from two types of disasters as part of a complete Business Continuity and Availability (BC and A) plan.
Tags : 
3 data center replication, 3dc, 4aa0-3153enw, storageworks, xp continuous access async
    
HP
Published By: HP     Published Date: Jun 23, 2008
This paper provides a comprehensive set of test-proven best practices for properly configuring, deploying, and operating an Oracle 10g database on an HP StorageWorks XP12000 Disk Array (XP12000) in an HP-UX environment using HP StorageWorks XP Continuous Access Software as the remote copy infrastructure.
Tags : 
replication, remote replication, storageworks, hp disaster proof, disaster proof
    
HP
Published By: HP     Published Date: Jun 23, 2008
In this video, at a high-tech ballistics center managed by National Technical Systems in Camden, Arkansas, HP simulated a gas leak using real explosives to blow up a data center. Every system failed-over after the explosion in less than two minutes—including data on an HP StorageWorks XP12000 Disk Array which failed over flawlessly to an HP StorageWorks XP24000 Disk Array.
Tags : 
disaster, disaster proof, disaster-proof, hp disaster proof, xp24000
    
HP
Published By: VMware Dell     Published Date: Jun 05, 2008
Radiator Express Warehouse (1800Radiator), a fast-growing automotive parts distributor, found that it was running at maximum power and its racks were full. Using VMware virtualization technology, the company was able to take 31 physical servers out of production, resulting in a 25 percent reduction in power and cooling costs.
Tags : 
virtualization, vmware, virtual infrastructure, x86, server consolidation
    
VMware Dell
Published By: VMware Dell     Published Date: Jun 05, 2008
WWF is the world’s largest independent conservation organization. As part of its IT department’s contribution to environmentally-friendly business practices, WWF-UK deployed VMware virtualization into its live production environment. They decreased server count, lessened cooling requirements, minimized the space needed to house their datacenter and significantly reduced their overall carbon footprint.
Tags : 
virtualization, vmware, virtual infrastructure, x86, server consolidation
    
VMware Dell
Published By: IBM     Published Date: May 12, 2008
In today's rapidly changing business environment, it's important to be ready to respond to every risk or opportunity. In this white paper, you'll learn how to determine risks, calculate impact, evaluate your current structure’s response and test overall resilience. Then you'll see how IBM can help you combine several risk management strategies into a single integrated one, so you’re better able to respond to the threat of disaster and stay ahead of the competition.
Tags : 
disaster recovery, d/r, business continuity, risk management, ibm
    
IBM
Published By: HP VMware     Published Date: Mar 03, 2008
Why have the majority of large enterprises embraced virtualization technology and why are midsize businesses the fastest growing market segment for new virtualization initiatives? This white paper will explore this important question, examine common virtualization deployment scenarios, and explain how virtualization solutions from HP and VMware can help midsize businesses achieve a wide variety of business continuity, performance, and efficiency goals.
Tags : 
vmware, virtual machine, virtual, virtual server, virtual storage
    
HP VMware
Published By: IBM     Published Date: Feb 25, 2008
In preparation for disasters, it’s critical to have a backup site that can be used if your primary location goes down. Does your business have the right procedures and equipment to recover after a disaster? Get answers. Download this article about a new enterprise data center and learn more about protecting your IT infrastructure.
Tags : 
disaster recovery, business continuity, preparedness, natural disaster, redundancy
    
IBM
Published By: IBM     Published Date: Feb 08, 2008
Unexpected disasters threaten organizations across the globe daily. Surprisingly, many businesses are not prepared for such disasters. They lack business continuity plans which can provide both proactive and reactive strategies to minimize the impact of unforeseen setbacks.
Tags : 
disaster recovery, business continuity, natural disaster, infrastructure, ibm
    
IBM
Published By: GlobalSCAPE     Published Date: Jan 08, 2008
Williams Lea is a leading global provider of customized corporate information solutions. The company needed to reliably, easily and securely transfer sensitive files and implement a system to share files and ensure a business continuity/disaster recovery plan.  Today, Williams Lea uses the GlobalSCAPE’s Enhanced File Transfer (EFT) solution to provide secure protocol support and encryption to protect data in transit and at rest.
Tags : 
eft, enhanced file transfer, managed file transfer, mft, disaster recovery
    
GlobalSCAPE
Published By: Solidcore     Published Date: Jan 07, 2008
It is widely acknowledged that unauthorized changes made to an IT Infrastructure cause up to 80% of system unavailability.  Learn how adding change control to your existing or planned change management infrastructure can help improve IT service availability, lower compliance costs, and accelerate your ITIL implementations.
Tags : 
control change, change management, high availability, change control, sla
    
Solidcore
Published By: Stratus Technologies     Published Date: Jan 07, 2008
CIOs today are being called upon to interpret business strategy and priorities, then add value through information technology initiatives. At a time when "critical to the business" translates to "mission-critical IT", how do you ensure end-to-end availability and reliability of the IT resources that enable your company’s essential business processes.
Tags : 
business success, productivity, compliance, cost control, decrease spending
    
Stratus Technologies
Published By: Astrocom     Published Date: Dec 13, 2007
Enterprises with mission critical applications are exploring the benefits of disaster recovery sites for their data centers to ensure business continuity. Special network technology is needed to ensure that site failover and failback occurs reliably and predictably. An ideal solution should provide reliable network connections, manage inbound and outbound traffic over multiple WAN links, failover to a secondary data center if all links at the primary data center are down, and eliminate deployment barriers and costs of multi-homing with BGP (Border Gateway Protocol).
Tags : 
data center, datacenter, data centers, business continuity, disaster recovery
    
Astrocom
Published By: Stratus Technologies     Published Date: Sep 19, 2007
For mission-critical IT, service outages and data loss pose serious consequences.  This white paper examines how availability management, disaster recovery and business continuity support one another and offers insight to find success at all of them.
Tags : 
business continuity, disaster recovery, high availability, stratus, stratus technologies
    
Stratus Technologies
Published By: SWsoft     Published Date: Dec 12, 2006
When Katrina hit in 2005, Murphy Exploration and Production Company, USA was among the many companies impacted by the devastation. Challenged to implement a new infrastructure quickly with more business continuity considerations, Murphy deployed Virtuozzo across its server infrastructure.
Tags : 
disaster recovery, business continuity, swsoft, infrastructure, servers
    
SWsoft
Published By: ThousandEyes     Published Date: Jan 14, 2018
ThousandEyes integrates monitoring and visualization of device health, end-to-end network paths and the performance of your internally hosted and cloud applications in one place. Identify critical dependencies in your internal network and monitor how device health impacts application performance.
Tags : 
thousandeyes, device management, network devices, cloud applications, network monitoring
    
ThousandEyes
Published By: ThousandEyes     Published Date: Jan 14, 2018
Read how Network Intelligence equips your team to deliver predictable digital experience in the cloud era.
Tags : 
thousandeyes, network intelligence, business application, application performance management, cloud applications
    
ThousandEyes
Published By: Thawte     Published Date: Dec 29, 2015
This white paper presents a brief history of cryptography and how encryption-related technologies have evolved and will continue to evolve as well as the measures Internet users should consider when implementing modern encryptions.
Tags : 
cryptography, encryption, security, business continuity, ssl
    
Thawte
Published By: Thawte     Published Date: Dec 29, 2015
With the ever-changing advances in technology and the internet, it is imperative that you stay on top of the latest security measures at your institution to protect sensitive data.
Tags : 
tech, education, security, protect, data
    
Thawte
Published By: Thawte     Published Date: Dec 29, 2015
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.
Tags : 
security, apache, web server, digital certificate, business continuity
    
Thawte
Published By: Thawte     Published Date: Dec 29, 2015
Learn how you can build customer confidence around Internet security.
Tags : 
security, internet, web server, customer confidence, business continuity
    
Thawte
Published By: Thawte     Published Date: Dec 29, 2015
SSL certificates don’t range from ‘insecure’ to ‘secure’, but they do differ in the level of confidence they inspire in online visitors.
Tags : 
ssl, validation, confidence, business continuity, identity management
    
Thawte
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research