Disaster recovery Whitepapers


Sort by: Date | Company | Title


Guidelines for maintaining business continuity for your organisation
By Citrix | 23/9/2015

Internal and external disruptions can impede business continuity and result in negative repercussions for enterprise productivity and data resources. This whitepaper looks at how improved mobility access can shield companies from unprecedented risks, resulting in greater cost savings and enhanced workforce continuity. It also highlights the benefits of having a mobile workspace technology which enables the workforce to have access to apps, desktops and files in difficult situations.

Included are four case studies where organisations are able to demonstrate a high level of business continuity with sound disaster recovery strategies in place.

Download this now


Flash arrays accelerate innovation
By EMC/Thomas Duryea | 11/9/2015

This IDC infographic looks at how flash is designed to meet the new levels of intelligence needed to help organisations develop applications that accelerate business innovation and how the increase in flash storage adoption will change the landscape by 2018.

Download this now


Security in a world with no perimeters
By Logicalis & Cisco | 4/9/2015

This practical “how to” guide looks at the fundamentals of securing an enterprise, when the traditional concept of having a perimeter to defend is rapidly losing all relevance. As well as proposing a flexible business-centric security architecture that takes a new approach to securing the enterprise, this guide takes a practical process that applies to organisations of any size.

Download this now


The virtue of virtualisation
By Crosspoint Telecom | 26/8/2015

The world of virtualisation may seem complex, however it’s clear that moving to a virtual IT environment can deliver many cost and efficiency benefits. This whitepaper looks at how emerging technologies such as cloud based services, moving desktops and application virtualisation helping to create a streamlined, responsive and flexible virtual environment, your business will be well positioned to capitalise on future growth opportunities.

Download this now


The death of tapes
By Crosspoint Telecom | 26/8/2015

Backing up to tape has been the standard for around 50 years. There are many perceived reasons as to why tapes are the best backup solution...they’re reliable, cheap, re-usable and easy to store. This whitepaper looks at how these benefits are now being challenged in the face of modern cloud-based and de-duplication backup solutions and what’s in store for the future.

Download this now


Disaster recovery and verification
By Crosspoint Telecom | 26/8/2015

Business continuity and disaster recovery are critical issues and top priorities for any IT department. This whitepaper looks at how you can best guarantee the security of your data, knowing that lost data can be recovered in the event of server failure, and have the ability to quickly get your business up and running again.

Download this now


Data centre downtime: risk and cost avoidance through service
By Eaton | 23/6/2015

An effective preventive maintenance strategy can be one of the most cost-effective measures you can take to ensure the ongoing health of both your critical equipment and overall business. Find out the most common causes of UPS failure, how regular maintenance practices so dramatically improve UPS reliability and performance, and the 10 elements an effective UPS maintenance plan should include.

Download this now


Is your Identity and Access Governance program vulnerable to risk?
By NetIQ | 12/6/2015

Identity and Access Governance is often used in reaction to demands from auditors. However, thinking of governance as only a means to pass audit is short-sighted. Failure to proactively manage user access to sensitive resources puts you at risk for sabotage, fraud, data breaches and financial penalties. In this whitepaper you'll learn: if your governance program is proactive or reactive, what to look for when searching for a solution to help you reduce risk.

Download this now


Identity and Access Governance - bringing business and IT together
By NetIQ | 12/6/2015

With increasing levels of threats and regulations, your need for identity and access governance (IAG) has never been greater. You need to know exactly who has access to what, and make sure all access levels are appropriate. Your overall solution needs to be integrated and seamless. And it has to move fast—otherwise it's too little, too late. This white paper explores the market forces that are driving the growth of this problem.

Download this now


Threat intelligence: Shellshock
By F5 Networks | 17/4/2015

A high profile vulnerability released to the public will draw the attention of people who will use the opportunity to take advantage of vulnerable machines. This whitepaper provides information on the security threat "Shellshock" and its mitigation process.

Download this now