IT Management  >   Systems Operations  >   Contingency Planning  >  

Continuity Planning

RSS Feed    Add to Google    Add to My Yahoo!
Continuity Planning Reports
 
You've Been Breached: How to Create an Effective Incident Response Plan
sponsored by Dell SecureWorks
VIDEO: In this video, a security expert discusses how you can develop an incident response plan that will ensure your organization isn't caught by surprise in a cyber-attack.
Posted: 09 Jul 2015 | Premiered: 09 Jul 2015

Dell SecureWorks

Achieve business continuity and keep people productive with remote access
sponsored by Citrix
WHITE PAPER: This white paper discusses an approach to business continuity that leverages multiple virtualization technologies to provide the flexible mobile and remote access needed to keep the workforce connected to the critical apps and data they depend on.
Posted: 06 Aug 2015 | Published: 31 May 2013

Citrix

The Importance of a Strong Incident Response
sponsored by CrowdStrike
WHITE PAPER: This white paper discusses how, with the right combination of security services and technology, you can be able to quickly mitigate a security breach and get your business operations back to normal.
Posted: 04 Aug 2015 | Published: 04 Aug 2015

CrowdStrike

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

A Category 4 Is No Excuse For Downtime
sponsored by Datto, Inc.
WHITE PAPER: Access this white paper to learn about a complete line of backup solutions that you can profitably sell downmarket and upmarket.
Posted: 19 Jun 2015 | Published: 19 Jun 2015

Datto, Inc.

Security Essentials for CIO's: Responding to Inevitable Incident
sponsored by IBM
WHITE PAPER: This white paper lists a seven-step process you can take to ensure that your enterprise knows exactly what to do when a security incident occurs.
Posted: 28 Aug 2015 | Published: 31 Aug 2012

IBM

VMware vCenter Site Recovery Managerâ„¢ 5.0 Performance and Best Practices
sponsored by VMware, Inc.
WHITE PAPER: This white paper provides SRM performance data and recommendations so that you can architect an efficient strategy that minimizes recovery time for your environment.
Posted: 21 Oct 2014 | Published: 21 Oct 2014

VMware, Inc.

Double-Take Availability: Keeping Disaster Recovery Systems Up to Date
sponsored by Vision Solutions
CASE STUDY: Access this exclusive case study to discover how a successful accounting organization accommodated an increase in data into their disaster recovery plan.
Posted: 12 Mar 2014 | Published: 31 Dec 2012

Vision Solutions

Best Practices for the Move Towards Virtualization
sponsored by Symantec Corporation
WHITE PAPER: Check out this exclusive resource to find out the virtualization best practices so you can make sure your move to a virtualized environment doesn't risk the safety and security of your organization and its data.
Posted: 06 Feb 2014 | Published: 12 Sep 2013

Symantec Corporation

What You Need to Know about Disaster Recovery
sponsored by Iron Mountain
WHITE PAPER: This eBook explores what it takes to ensure you're in the best position to bounce back should disaster strike.
Posted: 15 Oct 2013 | Published: 15 Oct 2013

Iron Mountain
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement