Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

it recovery

Results 51 - 75 of 637Sort Results By: Published Date | Title | Company Name
Published By: Google     Published Date: Oct 26, 2018
According to the new Accelerate: State of DevOps 2018: Strategies for a New Economy report, elite DevOps performers have more frequent code deployments, faster lead times, lower change failure rates, and far quicker incident recovery times. Download the sponsored report from DORA, and find out what nearly 1,900 professionals said about the role of DevOps in their business, what sets top-performing DevOps teams apart, and how this gives them a competitive edge.
Tags : 
    
Google
Published By: Vision Solutions     Published Date: Feb 18, 2008
Continuous member service is an important deliverable for credit unions, and. the continued growth in assets and members means that the impact of downtime is affecting a larger base and is therefore potentially much more costly. Learn how new data protection and recovery technologies are making a huge impact on downtime for credit unions that depend on AIX-hosted applications.
Tags : 
vision, high availability, ibm, aix, cdp, core union
    
Vision Solutions
Published By: Vision Solutions     Published Date: Apr 11, 2008
If you need more than tape backup to protect your critical applications running on AIX operating environments, download this white paper and learn your options and strategies, including how new technologies have significantly improved the recovery time and data recovery points for AIX.
Tags : 
data management, disaster recovery, business continuity, ibm aix, backup, recovery, vision, vision solutions, platforms
    
Vision Solutions
Published By: Dell Software     Published Date: Oct 01, 2012
Are you prepared for common Active Directory failure scenarios? Are you counting on the Recycle Bin, only to find what you need isn’t there? Learn what you can and can’t do with AD native tools, and how the right third-party tools can automate recovery and put you back in control.
Tags : 
native active directory, delegation, desktop management, ad native tools
    
Dell Software
Published By: ScriptLogic     Published Date: Mar 30, 2012
In this whitepaper, we will walk through a couple of recovery scenarios and how you can accomplish this using native tools and how it could be accomplished using Active Administrator.
Tags : 
active directory, active directory recovery, auditing, native tools, centralized, data, secure, database, networking
    
ScriptLogic
Published By: Schneider Electric     Published Date: Feb 17, 2017
This paper describes key security aspects of developing and operating digital, cloud-based remote monitoring platforms that keep data private and infrastructure systems secure from attackers. This knowledge of how these platforms should be developed and deployed is helpful when evaluating the merits of remote monitoring vendors and their solutions.
Tags : 
cyber security, energy efficiency, power and cooling systems, mean time to recovery, mttr, data privacy, cloud-based platforms, digital remote monitoring, data center
    
Schneider Electric
Published By: NetApp Backup & Recovery     Published Date: Dec 31, 2008
Learn about strategies for enterprise data protection from the data center to remote office environments.
Tags : 
netapp backup recovery, data liability, data protection, data center, sql, server, microsoft exchange, wan, disaster recovery
    
NetApp Backup & Recovery
Published By: IBM     Published Date: Sep 10, 2009
Data protection and recovery can be a complicated problem in remote offices. But there are options. This white paper explores a range of possibilities, and shows how an adaptive data protection solution can protect remotely stored data for enterprises of all sizes.
Tags : 
ibm, applications, risks, rcovery considerations, backup, tivoli software, tivoli® storage manager fastback, remote office, oracle, sap, sql, recovery point objective, rpo, recovery time objective, rto, tape backup, mirroring, asynchronous replication, continuous data protection, wide area file services
    
IBM
Published By: Symantec     Published Date: Jul 29, 2013
Backup and recovery has never been a higher priority for IT organizations than it is right now. But when it comes to Virtual Machine (VM) backup and recovery, the landscape has never been more confusing. Download this white paper and learn about the advantages of backup agents, agentless backup and agent-assisted backup so that you can decide for yourself and truly determine the best approach for your organization. We help you weigh in the pros and cons of each method.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, security, it management
    
Symantec
Published By: Stratus Technologies     Published Date: Feb 12, 2008
Application vulnerabilities and risks must be weighed to identify resources, performance requirements and service level objectives to ensure business continuity. Using real-world case studies, this white paper examines Information Lifecycle Management (ILM) best practices for disaster preparedness.
Tags : 
risk management, vulnerability, info management, information management, best practices, disaster recovery, stratus, stratus technologies
    
Stratus Technologies
Published By: Microsoft Exchange     Published Date: Oct 02, 2008
Today’s business requirements—such as security, disaster recovery, and mobility—are more extensive than ever before. To meet these requirements, Microsoft® Exchange has extended its reach beyond simple e-mail to increase user productivity and keep information close at hand, while being flexible enough to meet your organization’s administrative model.
Tags : 
microsoft exchange, exchange, productivity, microsoft, exchange server, it management, servers
    
Microsoft Exchange
Published By: Dell Software     Published Date: May 07, 2014
Short: Download your trial of AppAssure™ - an advanced data protection tool that unifies backup, replication and recovery in one software solution. Try it today.
Tags : 
storage, advanced data protection, backup, replication, security, recovery, software solution, trial download
    
Dell Software
Published By: Datastax     Published Date: Apr 04, 2017
An an Enterprise Architect (or an aspiring one), your job is to help define, build, and manage your company's technology architecture for its single most important asset - its information - in order to meet the company's business goals. Read this comprehensive guide to learn how all the key areas of database design, creation, security, object management, backup/recovery, monitoring and tuning, data migrations, and more - are carried out in a NoSQL database.
Tags : 
architect, guide, nosql, datastax
    
Datastax
Published By: HP-Intel®     Published Date: Jul 22, 2013
The impact of healthcare legislation in the United States (American Recovery and Reinvestment Act of 2009 [ARRA] and the HITECHAct) will accelerate spending on healthcare IT and increase adoption. of clinical applications
Tags : 
intel, healthcare, patient care, pacs, cmi, aara, ris
    
HP-Intel®
Published By: VMware Dell     Published Date: Sep 29, 2008
Virtualization offers the promise of simplifying your IT infrastructure from the desktop to the data center. But can your virtual environment maintain the level of availability you need to keep your business running or to recover from a disaster?
Tags : 
vmware, dell, virtual data center, data protection, disaster recovery, network architecture
    
VMware Dell
Published By: HP     Published Date: Mar 31, 2015
When was the last time you thought about your disaster recovery plan? Natural disasters, such as earthquakes, tsunamis, hurricanes, fires, or floods can occur anytime and disable your data center, with little to no warning. Hacker activities like a denial of service attack can also take down your systems unexpectedly. Then you have the more mundane risks such as human error and hardware or software failures. The only predictable thing to say about these risks is that at some point, on some scale, you’ll have to recover your data center from downtime. When it comes to disaster readiness, proactive planning is the key to success. Every business, regardless of size, needs to have a well-tested disaster recovery plan in place. Every minute your systems are down, the financial implications grow. Take the assessment to see where your disaster recovery plan ranks. Then learn about next steps and more information.
Tags : 
disaster recovery, natural disasters, data center, hackers, hardware failure, software failure, planning, disaster readiness, networking, security, it management
    
HP
Published By: Symantec     Published Date: Jul 30, 2013
In this whitepaper we will discuss what to look for in a virtualization protection solution as well as consider the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. Download for more information.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management, networking, security
    
Symantec
Published By: Silver Peak     Published Date: Jun 24, 2013
See how Australia's largest independent locally-owned manufacturer and distributor of wood-based building products, Gunnersen, has implemented Silver Peak Systems to ensure its recovery point objectives are achieved.
Tags : 
silver peak, virtual appliances, disaster recovery, wan bandwidth, bandwidth management, wide area networks
    
Silver Peak
Published By: Acronis     Published Date: Dec 28, 2011
According to a 2010 ESG survey, 73% of midmarket companies face "significant revenue loss or other adverse business impact" within three hours of experience downtime. Read this article to find out why you need the automated disaster recovery plan that's built in to Acronis Backup & Recovery® 11!
Tags : 
automated disaster recovery, server backup, server disaster recovery, server data protection, windows server backup, vmware disaster recovery, hyper-v disaster recovery, server backup, backup vmware, backup hyper-v, acronis, acronis backup & recovery, image-based backup, backup virtual machine
    
Acronis
Published By: VMware Dell     Published Date: Sep 29, 2008
Virtualized IT infrastructures can simplify management and facilitate business continuity while helping minimize power consumption and procurement costs. Virtualization also helps organizations automate disaster recovery plans. Dell EqualLogic PS Series arrays and VMware® Site Recovery Manager (SRM) software provide integrated, cost-effective, automated site recovery and testing for enterprise data centers.
Tags : 
vmware, dell, iscsi, equallogic, site recovery manager, navicure, disaster recovery, infrastructure
    
VMware Dell
Published By: Dell Storage     Published Date: Apr 21, 2011
This one-pager discusses the cost savings and ease of management advantages by automating disaster recovery plans and tasks.
Tags : 
dell compellent, automation, disaster recovery, fluid data, vmware site recovery manager, enterprise cloud computing, cloud computing
    
Dell Storage
Published By: Qualys     Published Date: Nov 05, 2013
The SANS 20 Critical Security Controls are known for driving effective security programs across government agencies, establishing guidelines for security professionals to ensure the confidentiality, integrity and availability of information technology assets. This paper describes how automating these controls using QualysGuard can protect your organization with continuous security while drastically lowering costs.
Tags : 
automation, cyber security, critical controls, malware defense, application software security, data recovery, compliance applications, qualysguard
    
Qualys
Published By: IBM     Published Date: Feb 27, 2014
Learn about the pitfalls of an outdated disaster recovery plan and see how your organization can avoid a potential loss of information and data.
Tags : 
disaster recovery, disaster recovery plans, pitfalls, ibm, technology
    
IBM
Published By: IBM     Published Date: Oct 10, 2013
Will your disaster recovery plan work when the time comes? It's a hard determination for any organization to make. But in IBM's experience, the answer is often "no." Disaster recovery plans often fail because organization have based their recovery strategies on outdated assumptions. Read this white paper to learn seven common misconceptions about disaster recovery. You'll also discover how new technologies can help modernize disaster recovery efforts.
Tags : 
avoid pitfalls, business pitfalls, disaster recovery, recovery plans, business recovery, evolving business, business expectations, business threats, outdated assumptions, recovery efforts, failed organization, work to recover
    
IBM
Published By: Kaseya     Published Date: Mar 13, 2013
A holistic, forward-looking and flexible IT security strategy can help organizations avoid common pitfalls and meet security threats head on in a cost and time efficient manner.
Tags : 
kaseya, it security, security threats, scott crawford, enterprise management associates, ema, disaster recovery, data protection, compliance, data security, business continuity, anti virus, anti spam, malware, endpoint security, risk management
    
Kaseya
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.