IT Management  >   Systems Operations  >   Contingency Planning  >  

Network Disaster Recovery

RSS Feed    Add to Google    Add to My Yahoo!
Network Disaster RecoveryMultimedia (View All Report Types)
 
Accounting Firm Decreases Risk with Cloud DR
sponsored by Peak 10
VIDEO: In this brief video, learn how the firm leveraged a cloud-based disaster recovery (DR) technology in order to decrease risk, improve security, and expand access.
Posted: 09 Oct 2014 | Premiered: 13 Aug 2014

Peak 10

Download a Free Trial of SQL Safe Backup
sponsored by Idera
SOFTWARE DOWNLOAD: Learn about the key features of SQL Safe Backup – and find out how you can gain access to a free trial.
Posted: 22 Jul 2014 | Premiered: 22 Jul 2014

Idera

How IBM manages their storage
sponsored by IBM
VIDEO: View this short video to learn how IBM leverages their own storage solutions to help manage their explosion of data growth of 25% - 40% year over year.
Posted: 28 Oct 2013 | Premiered: 10 Aug 2012

IBM

What it Takes to be an Always-on, Always-available Organization
sponsored by SUSE
WEBCAST: According to a recent survey, one in three companies has declared a disaster in the past five years because a critical component of their infrastructure failed. What can you do when downtime is not an option? In this Forrester Research, Inc. webcast, analysts discuss what it takes to be an always-on, always-available organization.
Posted: 06 Oct 2014 | Premiered: Oct 6, 2014

SUSE

Data Protection Today
sponsored by SearchDataBackup.com
VIRTUAL ENVIRONMENT: This classroom takes a look at virtual server recovery advancements, why today's disk backup solutions may struggle with modern recovery demands, and how to craft a robust data protection strategy that goes beyond just backup to focus on speedy recovery for critical apps.
Posted: 30 Jul 2014 | Premiered: 01 Aug 2014

SearchDataBackup.com

D2D Backup and Data Deduplication: Lowering the Costs of Business Continuity
sponsored by Overland Storage
WEBCAST: This Webcast discusses the growing importance of data deduplication as an enabling technology that leverages cost-effective VTLs and other disk appliances to identify and eliminate redundant data.
Posted: 17 Oct 2007 | Premiered: Oct 17, 2007, 09:00 EDT (13:00 GMT)

Overland Storage

Data Protection for Virtualization
sponsored by Dell, Inc.
WEBCAST: Discover how you can ensure comprehensive and reliable data protection for your virtualized environment with enhanced storage infrastructure that offers frequent snapshots and clones, automated off-site disaster recovery, source and target based deduplication and more.
Posted: 29 Mar 2012 | Premiered: Mar 29, 2012

Dell, Inc.

Data Loss Prevention from the Inside Out
sponsored by Cisco Systems, Inc.
VIDEOCAST: In this Techwise TV episode learn about data loss prevention and the three primary loss vectors that you must assess for your organization.
Posted: 08 Jul 2008 | Premiered: Jun 26, 2008

Cisco Systems, Inc.

Key Steps to Securing Your Organization and Evicting a Hacker
sponsored by Foundstone, Inc.
PODCAST: This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks.
Posted: 30 Apr 2008 | Premiered: Apr 30, 2008, 09:00 EDT (13:00 GMT)

Foundstone, Inc.

IT Reputational Risk Study Overview
sponsored by IBM
VIDEO: This short video summarizes the findings from a recent study on risks to your business reputation resulting from failures in your IT environment.
Posted: 16 Jul 2013 | Premiered: 13 Dec 2012

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement