IT Management  >   Systems Operations  >   Contingency Planning  >  

Business Continuity Planning

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Continuity Planning, BCP
DEFINITION: Business impact analysis (BIA) is an essential component of an organization's business continuance plan; it includes an exploratory component to reveal any vulnerabilities, and a planning component to develop strategies for minimizing risk. The result of analysis is a business impact analysis report, which describes the potential risks specific to the organization studied. One of the basic assumptions  … 
Definition continues below.
Business Continuity PlanningReports
51 - 75 of 455 Matches Previous Page  | Next Page
IBM Reputational Risk Index
sponsored by IBM
WHITE PAPER: Access this white paper today to view the results of a survey of more than 1000 business continuity specialists and more than 1200 security practitioners, and learn how your peers are approaching modern DR and reputation management practices.
Posted: 11 Mar 2014 | Published: 31 Dec 2013

IBM

Business and IT Analysis: Availability, recovery, and archive
sponsored by ComputerWeekly.com
RESOURCE: Changes in how technology can be implemented and improvements in connectivity mean that business continuity and rapid systems recovery is now within reach of many more organisations. In this exclusive eGuide explore data recovery, creating a multi-level strategy, and capabilities to aid you in any impact on the technical platform.
Posted: 11 Mar 2014 | Published: 11 Mar 2014

ComputerWeekly.com

CIO Strategies for Storage: Modernize Data Protection Practices
sponsored by Dell, Inc.
WHITE PAPER: Explore this game-changing resource to discover the key features of a modernized data protection solution, and how it can benefit your organization.
Posted: 03 Mar 2014 | Published: 31 Dec 2012

Dell, Inc.

Balancing Cost, Risk and Complexity in Your Disaster Recovery Strategy
sponsored by CommVault Systems, Inc.
WHITE PAPER: This guide goes over the requirements for a suitable Disaster Recovery strategy and highlights the fact that traditional backup plans aren't capable of dealing with new technologies.
Posted: 27 Feb 2014 | Published: 27 Feb 2014

CommVault Systems, Inc.

What Recovery-Centric Licensing Means for You
sponsored by Asigra
WHITE PAPER: Download this report to learn how recovery-centric licensing can benefit your organization.
Posted: 14 Feb 2014 | Published: 31 Jul 2013

Asigra

Best Practices for the Move Towards Virtualization
sponsored by Symantec Corporation
WHITE PAPER: Check out this exclusive resource to find out the virtualization best practices so you can make sure your move to a virtualized environment doesn't risk the safety and security of your organization and its data.
Posted: 06 Feb 2014 | Published: 12 Sep 2013

Symantec Corporation

IT Security Salary Index (UK)
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Are you being paid the right rate for the job ? Check out this IT Security salary index from Acumin.
Posted: 30 Jan 2014 | Published: 30 Jan 2014

ComputerWeekly.com

Ensure Business Resiliency with IBM Power Systems
sponsored by IBM
WHITE PAPER: Access this exclusive document to find out the requirements for delivering resilience and availability in your server systems, as well as one vendor's recommended approach for business resilience.
Posted: 27 Jan 2014 | Published: 30 Apr 2012

IBM

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

Virtual Backup Strategies: Using Storage Snapshots for Backups
sponsored by Veeam Software
WHITE PAPER: Check out this informative white paper to find out how storage snapshots can be used as backups for virtual environments, and how it compares to one vendor's disk-to-disk backup solution.
Posted: 16 Jan 2014 | Published: 16 Jan 2014

Veeam Software

Prepare Now and Save Later: Guide to Business Continuity and Disaster Recovery Implementation
sponsored by Veeam Software
WHITE PAPER: Take a look at this in-depth white paper to find out how this backup and replication solution helps organizations plan and implement a disaster recovery and business continuity that is capable of supporting their demanding data centers.
Posted: 08 Jan 2014 | Published: 08 Jan 2014

Veeam Software

Achieve business continuity and keep people productive with remote access
sponsored by Citrix
WHITE PAPER: This whitepaper discusses an approach to business continuity that leverages multiple virtualization technologies to provide the flexible mobile and remote access needed to keep the workforce connected to the critical apps and data they depend on.
Posted: 07 Jan 2014 | Published: 07 Jan 2014

Citrix

Samaritan Medical Center: CIOs Approach to Consolidating Hospital Data
sponsored by BridgeHead Software
WHITE PAPER: This case study on Samaritan Medical Center highlights their experience with a single, standardized data management platform, and how they were able to offer constant data availability even during disaster recovery. Click now to see how else they're benefiting.
Posted: 26 Dec 2013 | Published: 26 Dec 2013

BridgeHead Software

Governance of IT, an executive guide to ISO/IEC 38500
sponsored by ComputerWeekly.com
BOOK: This extract from the book: Governance of IT, an executive guide to ISO/IEC 38500, tells you the key things you need to consider before you start a project implementation.
Posted: 19 Dec 2013 | Published: 19 Dec 2013

ComputerWeekly.com

The Data Recovery Workbook
sponsored by Iron Mountain
WHITE PAPER: This informative paper explores the basics of developing a plan that will help you protect your data should the worst (or not-quite-worst) happen. Read on now to discover five key steps for protecting your business data and get started!
Posted: 18 Dec 2013 | Published: 18 Dec 2013

Iron Mountain

Double-Take Availability: Keeping Disaster Recovery Systems Up to Date
sponsored by Vision Solutions
CASE STUDY: Access this exclusive case study to discover how a successful accounting organization accommodated an increase in data into their disaster recovery plan.
Posted: 12 Mar 2014 | Published: 31 Dec 2012

Vision Solutions

Maximizing Data Center Uptime with Business Continuity Planning
sponsored by Vision Solutions
WHITE PAPER: This whitepaper covers the value of protecting your business critical applications with a co-location facility.
Posted: 28 Feb 2014 | Published: 17 Feb 2011

Vision Solutions

Five Disaster Recovery Tips for Small to Midsize Businesses running IBM® i
sponsored by Vision Solutions
WHITE PAPER: This exclusive whitepaper covers five tips for small and mid-sized businesses to follow for a comprehensive disaster recovery plan that can protect their data.
Posted: 25 Feb 2014 | Published: 13 Feb 2013

Vision Solutions

Mastering Disaster Recovery in the Cloud
sponsored by VMware, Inc.
WHITE PAPER: This whitepaper looks at how organizations are turning to Disaster-Recovery-as-a-Service in the wake of Hurricane Sandy. Also learn how to pick the right provider for your organization.
Posted: 25 Feb 2014 | Published: 25 Feb 2014

VMware, Inc.

Trend Micro Deep Security: VMWare vSphere with Operations Management
sponsored by Trend Micro
WHITE PAPER: This informative resource introduces a security and operations management solution that protects virtualized datacenters and desktops from the latest threats. Read on to learn how this solution can help your organization address 5 main areas of concern, including security, business continuity, and 3 more.
Posted: 20 Feb 2014 | Published: 20 Feb 2014

Trend Micro

Exchange Object Recovery
sponsored by PHD Virtual
WEBCAST: This webcast addresses the need for an email recovery system and goes in-depth into a solution for your organization. Watch now to see how this solution can help recover your entire Exchange platform.
Posted: 10 Feb 2014 | Premiered: Aug 19, 2013

PHD Virtual

Essential Guide to Business Continuity and Disaster Recovery Plans
sponsored by TechTarget
RESOURCE: Join the IT Solution Advisory Community – a vendor-neutral, expert-moderated group of IT practitioners that you can learn from and connect with based on experience, expertise, first-hand research and unbiased feedback. Get started by scoping out your next disaster recovery-related project via this online form.
Posted: 07 Feb 2014 | Published: 07 Feb 2014

TechTarget

Demand More From Your Data Center Environment
sponsored by Iron Mountain
WHITE PAPER: This resource introduces a colocation strategy that offers more than just space and power to help you optimize your data center operations, achieve compliant IT security, and more.
Posted: 28 Jan 2014 | Published: 31 Dec 2013

Iron Mountain

Breakthrough Replication Solution to Eliminate Disaster Recovery Risks
sponsored by HP and Intel
WHITE PAPER: Explore this exclusive white paper to find out about HP's latest and greatest replication solution which addresses the challenges data growth presents, while promising superior disaster recovery.
Posted: 27 Jan 2014 | Published: 31 Dec 2013

HP and Intel

Symantec NetBackup™ Appliances: Key Factors in Modernizing Backup and Recovery
sponsored by Symantec Corporation
WHITE PAPER: Disasters strike without warning, so shouldn't your data protection solutions always be up to par? Explore this resource to find out the advantages of backup solution models, key requirements for solution offerings and cost-effective solutions.
Posted: 27 Dec 2013 | Published: 27 Dec 2013

Symantec Corporation
51 - 75 of 455 Matches Previous Page    1 2 3 4 5 6    Next Page
 
BUSINESS CONTINUITY PLANNING DEFINITION (continued): …  behind BIA is that every component of the organization is reliant upon the continued functioning of every other component, but that some are more crucial than others and require a greater allocation of funds in the wake of a disaster. For example, a business may be able to continue more or less normally if the cafeteria has to close, but would come to a complete halt if the information system crashes. As part of a disaster recovery plan, BIA is likely to identify costs linked to failures, such as loss of cash flow, replacement of equipment, salaries paid to catch up with a backlog of work, loss … 
Business Continuity Planning definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement