Disaster recovery Whitepapers


Sort by: Date | Company | Title


EDC Case Study: Why We Rehearse
By EDC Online | 19/8/2014

The reality of natural disasters such as flood, fire and even earthquakes can strike without warning. But it is not just natural disasters we need to be mindful of, the threat of technical, man-made threats and errors are commonplace.

Download this now


Best Practices in Data Protection Monitoring
By EMC Corporation | 28/2/2014

This whitepaper discusses best practice in data protection monitoring, with a focus on recoverability and visibility as significant drivers for success. Whether backing up a private cloud or several smaller environments, learn how a unified view is necessary for proactively reporting protection, compliance to auditors, and understanding overall data protection health, performance, and reliability.

Download this now


Balancing Cost, Risk and Complexity in Disaster Recovery
By Commvault | 27/11/2013

In the face of more frequent disaster situations and a higher reliance on technology, Disaster Recovery and Business Continuity have become absolutely vital for maintaining an edge in today’s competitive business environment. In this whitepaper, we look at how to build a sound strategy for recovery reduces complexity.

Download this now


Federal Guide to the Value of Encryption
By Check Point Software Technologies | 5/9/2013

Encryption is a cyber security technology used to protect the confidentiality, integrity, and availability of information stored on or transmitted between computers. Find out which encryption solutions are best to automatically obscure digital files and make them unreadable by unauthorized users. Click to download

Download this now


Managing Web Security in an Increasingly Challenging Threat Landscape
By Webroot | 5/9/2013

Cybercriminals have increasingly turned their attention to the web, which has become by far the predominant area of attack. Those who would do harm to our computer systems for profit or malice always manage to focus their efforts on our most vulnerable weak spots. Today, that is the web, for a wide number of reasons. Download to find out why and what you can do to protect yourself.

Download this now
[]