Disaster recovery Whitepapers


Sort by: Date | Company | Title


Federal Guide to the Value of Encryption
By Check Point Software Technologies | 5/9/2013

Encryption is a cyber security technology used to protect the confidentiality, integrity, and availability of information stored on or transmitted between computers. Find out which encryption solutions are best to automatically obscure digital files and make them unreadable by unauthorized users. Click to download

Download this now


Guidelines for maintaining business continuity for your organisation
By Citrix | 23/9/2015

Internal and external disruptions can impede business continuity and result in negative repercussions for enterprise productivity and data resources. This whitepaper looks at how improved mobility access can shield companies from unprecedented risks, resulting in greater cost savings and enhanced workforce continuity. It also highlights the benefits of having a mobile workspace technology which enables the workforce to have access to apps, desktops and files in difficult situations.

Included are four case studies where organisations are able to demonstrate a high level of business continuity with sound disaster recovery strategies in place.

Download this now


Balancing Cost, Risk and Complexity in Disaster Recovery
By Commvault | 27/11/2013

In the face of more frequent disaster situations and a higher reliance on technology, Disaster Recovery and Business Continuity have become absolutely vital for maintaining an edge in today’s competitive business environment. In this whitepaper, we look at how to build a sound strategy for recovery reduces complexity.

Download this now


Teleworking toward a healthy recovery
By Dell | 1/9/2014

With EmblemHealth’s company headquarters flooded after Hurricane Sandy in 2012, this paper explains how a mobile laptop solution enabled displaced employees to work remotely and maintain productivity.

• Hurricane Sandy’s surge swamped the building’s sublevels, where its mechanical and electrical systems reside, rendering it uninhabitable for three months • Employees who were working remotely could access the company’s intranet to get updates as needed • Corporate notebooks were also essential to mobile workers such as visiting nurses and health coaches

Download this now


EDC Case Study: Why We Rehearse
By EDC Online | 19/8/2014

The reality of natural disasters such as flood, fire and even earthquakes can strike without warning. But it is not just natural disasters we need to be mindful of, the threat of technical, man-made threats and errors are commonplace.

Download this now


EDC Business Resilience
By EDC Online | 19/8/2014

A survey was undertaken by Victorian Government with analysis by Enterprise Data Corporation (EDC) a leading BCM provider. This exercise benchmarked the current state of business resilience and business continuity within government departments against global good practice, based on a comprehensive survey of Victorian State Departments.

Download this now


Best Practices in Data Protection Monitoring
By EMC Corporation | 28/2/2014

This whitepaper discusses best practice in data protection monitoring, with a focus on recoverability and visibility as significant drivers for success. Whether backing up a private cloud or several smaller environments, learn how a unified view is necessary for proactively reporting protection, compliance to auditors, and understanding overall data protection health, performance, and reliability.

Download this now


Skilled Group virtualised environment relies on open fabric solution
By Extreme Networks | 9/11/2015

Find out how Skilled Group were able to operate an EMC storage environment replicating across to its 2nd data centre with an RPO of minutes rather than days and automated their disaster recovery process.

Download this now


Threat intelligence: Shellshock
By F5 Networks | 17/4/2015

A high profile vulnerability released to the public will draw the attention of people who will use the opportunity to take advantage of vulnerable machines. This whitepaper provides information on the security threat "Shellshock" and its mitigation process.

Download this now


Databarracks Delivers Disaster Recovery as a Service with PlateSpin Protect
By NetIQ | 8/2/2015

Databarracks wanted to provide better, faster, more reliable disaster recovery for customers—and at lower cost. This winning combination could provide a huge competitive advantage.

Download this now
[]