Business Continuity White Papers

Business Continuity Planning (BCP) is a methodology used to create a plan for how an organization will resume partially or completely interrupted critical function(s) within a predetermined time after a disaster or disruption. BCP may be a part of a larger organizational effort to reduce operational risk associated with poor information security controls, and thus has a number of overlaps with the practice of risk management.
Results 1 - 25 of 305Sort Results By: Published Date | Title | Company Name
By: Nuance Communications     Published Date: Mar 16, 2010

The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.

Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, access control, authentication, business continuity, identity management, web service security, customer interaction service, customer relationship management, customer satisfaction, customer service, ebusiness
By: NEC     Published Date: Dec 16, 2009

The proliferation of communications channels has set expectations around cost and productivity benefits. Unified Communications (UC) is proffered as a way of helping bring them all together, but companies struggle to justify the business case for it. Against this background, how important is UC as an approach to streamlining communications, and how can businesses exploit it?

Tags : nec, business communication, productivity, unified communications, uc delivery, business continuity, mobile workers
By: Vision Solutions     Published Date: Apr 11, 2008

If you need more than tape backup to protect your critical applications running on AIX operating environments, download this white paper and learn your options and strategies, including how new technologies have significantly improved the recovery time and data recovery points for AIX.

Tags : data management, disaster recovery, business continuity, ibm aix, backup, recovery, vision, vision solutions, platforms, backup and recovery, as/400, unix
By: Vision Solutions     Published Date: Apr 11, 2008

Until recently, System i high availability solutions were reserved mostly for large enterprises. Now that high availability is dramatically easier to use and less expensive to own and manage, the picture has changed.

Tags : high availability, disaster recovery, vision, vision solutions, ibm, backup and recovery, business continuity, as/400, data protection
By: Vision Solutions     Published Date: Dec 31, 2007

For AIX IT departments looking to take the next step in data protection strategies, CDP is an essential consideration. Analysts agree that businesses will be incorporating this strategy in the next few years as part of an integrated solution. CDP enables you to reverse data corruption in a fraction of the time and labor required for recovery from tape.

Tags : aix, data protection, continuous data protection, cdp, high availability, disaster recovery, disk backup, tape backup, recovery, backup, mimix, vision, vision solutions, platforms, backup and recovery, business continuity, as/400, unix
By: Vision Solutions     Published Date: Dec 31, 2007

This white paper provides a basic understanding of the building blocks of IT and business continuity—from understanding the concepts of disaster recovery and information availability to calculating the business impact of downtime and selecting the right software solution.

Tags : disaster recovery, business continuity, disk backup, tape backup, data backup, data replication, disaster, high availability, uptime, maximizing uptime, downtime, minimizing downtime, vision, vision solutions, platforms, backup and recovery, as/400, unix
By: Digital Realty     Published Date: Feb 22, 2018

A new white paper from Digital Realty shows how to improve hybrid cloud computing performance and ramp up agility, security and reliability through its Service Exchange product.

Tags : digital realty, cloud computing, network performance, cloud performance, hybrid cloud, business continuity, security management, application performance management, database security
By: NodeSource     Published Date: Nov 10, 2017

Digital transformation is “the use of technology to radically improve performance or (business) reach. But for digital-native businesses that have never needed to make that shift — e-commerce, social media, web-based services — it involves a sharpening of that focus combined with an ongoing evolution of process and infrastructure.

Tags : nodesource, xml, software development, digital transformation, open source, web applications, web development, java, .net, soap, infrastructure, business continuity, web service security, application performance management, customer satisfaction, ebusiness, web services, data protection, secure content management, business technology
By: FTI Consulting     Published Date: Mar 03, 2017

2016: The year in crisis provides The Economist Intelligence Unit’s assessment of sources of corporate risk in the year 2016, its evolution over the next three years, and a perspective on the role of the board of directors in managing crises.

Tags : fti, fti consulting, crisis management, corporate risk, cyber attacks, political disruption, corporate crisis, business continuity, security policies, best practices, risk management, project management, vulnerability management, business technology, social media, reputation monitoring
By: SAS     Published Date: Mar 31, 2016

Digitization creates major opportunities for financial services – automating operations, expanding channels, delivering engaging customer experiences.

Tags : analytics, financial services, operations, digital management, data, best practices, business continuity, business analytics, project management, data management/analytics
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

This white paper from Citrix provides a checklist to follow to ensure your company can embrace enterprise mobility securely.

Tags : citrix, enterprise, mobile, network management, network security, business continuity, security management, best practices, business process management, secure content management, employee performance, productivity
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

In this white paper, the experiences of four Citrix customers illustrate key use cases for Citrix XenMobile, the most complete enterprise mobility management solution, and the business value it delivers.

Tags : citrix, enterprise, mobility, business continuity, best practices, customer satisfaction, customer service, collaborative commerce, customer experience management, business technology
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016

Future workplace structures are envisioned to be a scenario wherein employees are likely to use a multitude of connected mobile devices and apps that will offer compelling new work style experiences integrating voice, video and data access services.

Tags : citrix, frost & sullivan, next-gen, enterprise, infrastructure, ip networks, network security, access control, business continuity, security management, data protection, collaboration, productivity, cloud computing, mobile device management
By: IBM     Published Date: Sep 30, 2015

Big data analytics to help better protect and secure.

Tags : healthcare, enterprise, security, data, business continuity, compliance, best practices, business intelligence, data protection, database security
By: Cisco     Published Date: Sep 16, 2015

Big data into manageable components.

Tags : big data, data platform, ioe, analytics, business continuity, business intelligence, productivity, infrastructure
By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015

In today’s globalized business environment, the need to build strong relationships with partners, suppliers, internal teams, investors and customers is more important than ever. High-quality video conference calls enable you to communicate as effectively as actually being there in person, helping you to build the engaging relationships needed for success in business.

Tags : video conferencing, speed, competitive advantage, scale, business continuity, network management, quality of service, web development, productivity
By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015

Sure, ROI calculators help distill anecdotal evidence and analyze cost savings associated with travel, but it usually goes something like this: total hours spent traveling + cost of hotel, rental car, and food divided by the number of meeting hours. Well, at least that’s one version. No matter the final number, the ROI total savings on cost of travel is only part of the story. Calculating the true ROI of video conferencing combines facts with real-life tangibles to help you understand and quantify your investment.

Tags : roi, video conferencing, communication, travel costs, meetings, business continuity, business intelligence, productivity
By: Vectra Networks     Published Date: Aug 03, 2015

Recently, Kasperky Labs disclosed that it was the victim of a sophisticated cyber attack, which they have named Duqu 2.0. The team at Kaspersky Labs has published a detailed analysis of Duqu 2.0 and it’s definitely worth a read.

Tags : cyber attack, protection, security, network, business continuity, compliance, firewalls, productivity, vulnerability management
By: Vectra Networks     Published Date: Aug 03, 2015

Organizations invest heavily to block advanced attacks, on both endpoints and networks. Despite all this investment, devices continue to be compromised in increasing numbers and high-profile breaches continue unabated. Something doesn’t add up. It comes down to psychology: security practitioners want to believe the latest shiny widget for preventing compromise will finally work and stop the pain.

Tags : data, security, threats, protection, advanced threat, ips, ids, firewall, antivirus, business continuity, intrusion detection, intrusion prevention, security management, vulnerability management
By: IBM     Published Date: Jul 31, 2015

Guide to security intelligence.

Tags : security, data, application security, business continuity, compliance, infrastructure
By: IBM     Published Date: Jul 31, 2015

Optimize the process of investigating and gathering evidence.

Tags : data, security, threats, protection, business continuity, compliance, hacker detection, intrusion detection, itil
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End