IT Management  >   Systems Operations  >   Contingency Planning  >  

Continuity Planning

RSS Feed   
Continuity Planning Reports
 
Solving Data Management Challenges for NoSQL Databases
sponsored by Rubrik
WHITE PAPER: Native database replication is not a substitute for backup and certainly doesn’t help meet test/dev and data mobility requirements. Read this e-book to learn about the architecture of a durable and reliable backup and recovery solution capable of fully protecting NoSQL databases and view its differentiating features in 3 areas.
Posted: 19 Feb 2020 | Published: 19 Feb 2020

Rubrik

The Ransomware Recovery Guide: How to Spot, Prevent and Recover from Ransomware
sponsored by Databarracks
WHITE PAPER: Ransomware affects everyone, making awareness, education, and defense crucial to keeping your sensitive data secure. Access this white paper to learn what ransomware looks like, how to recover from it, and 2 proactive steps to take in order to thwart a potential attack.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Databarracks

IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software
ComputerWeekly.com

A Computer Weekly buyer's guide to on-site, off-site and cloud-based disaster recovery
sponsored by ComputerWeekly.com
EGUIDE: With businesses becoming increasingly dependent on data to function, being able to recover quickly from an IT systems failure is critical. In this 14-page buyer's guide, Computer Weekly looks at the various options available when implementing disaster recovery.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

ComputerWeekly.com

How to Buy Backup and Recovery: A Customer's Evaluation
sponsored by Rubrik
EBOOK: This 81-page e-book is designed to provide you with valuable insights on overcoming common obstacles when choosing enterprise backup and recovery technology.
Posted: 15 May 2018 | Published: 15 May 2018

Rubrik

Disaster Recovery/Business Continuity: Spotlight on ANZ
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, read about the IT outage at Woolworths that shut down checkouts and forced shoppers to leave their groceries behind, what you can do to avert a disaster through a recovery plan and the top business continuity risks you should be aware of this year.
Posted: 25 May 2018 | Published: 25 May 2018

ComputerWeekly.com

How to Develop A Business Continuity Plan
sponsored by OneLogin
EBOOK: A security-first continuity plan is crucial to running your company in the event of an emergency or a critical market change. Given the current crises around COVID-19, OneLogin published a how-to manual to help your organization remain operational in the event of a disaster. Read on to get started.
Posted: 09 Mar 2020 | Published: 09 Mar 2020

OneLogin

15 Field-proven Disaster Recovery Test Plan Best Practices
sponsored by Databarracks
EGUIDE: Disaster recovery tests require a lot of preparation, but they are essential to a proper DR strategy. This e-guide explores a checklist to help your organization before, during, and after DR testing.
Posted: 23 Sep 2016 | Published: 21 Sep 2016

Databarracks

Breakthrough Replication Solution to Eliminate Disaster Recovery Risks
sponsored by HPE and Intel®
WHITE PAPER: Explore this exclusive white paper to find out about HP's latest and greatest replication solution which addresses the challenges data growth presents, while promising superior disaster recovery.
Posted: 27 Jan 2014 | Published: 31 Dec 2013

HPE and Intel®

A Disaster Recovery/Business Continuity Plan for the Data Breach Age
sponsored by QuorumLabs Inc.
EGUIDE: Our increasing use of social media, internet of things (IoT), mobile computing and the cloud has increased our data dependence. While this has improved accessibility, it has also made us more vulnerable to cyber-attacks - 40% of businesses hit never recover. In this eGuide, find 10 best DR/BC practices DR/BC that will help you avoid fatal attacks.
Posted: 14 Nov 2016 | Published: 09 Nov 2016

QuorumLabs Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info