Disaster recovery Whitepapers


Sort by: Date | Company | Title


Health Unit Boosts Disaster Recovery Capabilities with NetIQ
By NetIQ | 8/2/2015
The Health Unit needs to provide continuous and secure access to online medical services, and must safeguard citizens’ health information held in its medical centers.
Download this now


Databarracks Delivers Disaster Recovery as a Service with PlateSpin Protect
By NetIQ | 8/2/2015
Databarracks wanted to provide better, faster, more reliable disaster recovery for customers—and at lower cost. This winning combination could provide a huge competitive advantage.
Download this now


Tintri Deployment and Best Practices Guide for VMware vCenter™ Site Recovery Manager™ 5.8
By Tintri | 9/1/2015
This Best Practices Guide for running VMware vCenter™ Site Recovery Manager™ (SRM) on Tintri VMstore™ systems is intended to assist Data Protection and Disaster Recovery (DR) Administrators, IT Administrators and Architects who are responsible for deploying and managing DR strategies within their virtual infrastructures powered by Tintri VMstore storage appliances. This guide focuses specifically on SRM 5.8 – and therefore all instructions and screenshots focus on the vSphere Web Client – although the Tintri Storage Replication Adapter (SRA) supports SRM 5.5 as well.
Download this now


Cloud is not bureau: welcome to choice
By UXC | 25/9/2014
Commentators often compare cloud computing with the bureau computing model widely used 30-40 years ago. This whitepaper discusses the significant differences between the two. • ‘Bureau’ meant being tied to one supplier and their applications, with cloud, there is choice • ICT needs to support business' ongoing improvement with the options available • Cloud supports contestability, which was rare in the world of bureau computing
Download this now


Teleworking toward a healthy recovery
By Dell | 1/9/2014
With EmblemHealth’s company headquarters flooded after Hurricane Sandy in 2012, this paper explains how a mobile laptop solution enabled displaced employees to work remotely and maintain productivity. • Hurricane Sandy’s surge swamped the building’s sublevels, where its mechanical and electrical systems reside, rendering it uninhabitable for three months • Employees who were working remotely could access the company’s intranet to get updates as needed • Corporate notebooks were also essential to mobile workers such as visiting nurses and health coaches
Download this now


EDC Business Resilience
By EDC Online | 19/8/2014
A survey was undertaken by Victorian Government with analysis by Enterprise Data Corporation (EDC) a leading BCM provider. This exercise benchmarked the current state of business resilience and business continuity within government departments against global good practice, based on a comprehensive survey of Victorian State Departments.
Download this now


EDC Case Study: Why We Rehearse
By EDC Online | 19/8/2014
The reality of natural disasters such as flood, fire and even earthquakes can strike without warning. But it is not just natural disasters we need to be mindful of, the threat of technical, man-made threats and errors are commonplace.
Download this now


Best Practices in Data Protection Monitoring
By EMC Corporation | 28/2/2014
This whitepaper discusses best practice in data protection monitoring, with a focus on recoverability and visibility as significant drivers for success. Whether backing up a private cloud or several smaller environments, learn how a unified view is necessary for proactively reporting protection, compliance to auditors, and understanding overall data protection health, performance, and reliability.
Download this now


Balancing Cost, Risk and Complexity in Disaster Recovery
By CommVault | 27/11/2013
In the face of more frequent disaster situations and a higher reliance on technology, Disaster Recovery and Business Continuity have become absolutely vital for maintaining an edge in today’s competitive business environment. In this whitepaper, we look at how to build a sound strategy for recovery reduces complexity.
Download this now


Federal Guide to the Value of Encryption
By Check Point Software Technologies | 5/9/2013
Encryption is a cyber security technology used to protect the confidentiality, integrity, and availability of information stored on or transmitted between computers. Find out which encryption solutions are best to automatically obscure digital files and make them unreadable by unauthorized users. Click to download
Download this now