Secure DisasterWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Secure Disaster returned the following results.
RSS What is RSS?
Related Categories

 •   Disaster Recovery
 •   Backup Systems and Services
 •   Storage Management
 •   Virtualization
 •   Data Security
 •   Enterprise Data Protection and Privacy
 •   Storage Security
 •   Disk-based Backup & Storage/ RAID
 •   Compliance Management/ Sarbanes-Oxley Compliance
 •   Storage Area Network (SAN)/ Network Attached Storage (NAS)

Related Searches
 •   Business Secure Disaster
 •   Erp Secure Disaster
 •   Expense Secure Disaster
 •   Improvement Secure
 •   Secure Disaster Calendar
 •   Secure Disaster Check
 •   Secure Disaster Spreadsheet
 •   Secure Guides
 •   Secure Network
 •   Spreadsheets Secure
Advertisement

ALL RESULTS
1 - 25 of 454 | Next Page

Featured Sponsors

E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

Secure Offsite Data Storage: It Keeps You Running by Iron Mountain

October 22, 2012 - (Free Research)
Access this article to learn an approach to ensure the "recovery" part of DR: Secure, off-site data storage. Read on to learn how to get started and find a business continuity checklist along with 8 criteria for reliable off-site storage. 
(TECHNICAL ARTICLE) READ ABSTRACT |

VMware ACE 2 Enterprise Edition: Desktop Virtualization Solution by AMD and VMware, Inc (E-mail this company)

VMware ACE 2 Enterprise Edition delivers desktop virtualization solutions for enterprise users. Use VMware ACE 2 to deploy an ACE virtual machine as an IT managed “virtual laptop” to remote workers, provision controlled desktop images as sandbox environments or run legacy operating systems & applications on an existing PC as you migrate to Vista. 
(SOFTWARE PRODUCT)

Reducing Costs and Creating a More Secure IT Environment with a Holistic Approach to Data Protection: An ROI Analysis of FalconStor Storage Management Solutions by FalconStor Software

October 22, 2010 - (Free Research)
Data protection and disaster recovery continue to be overarching challenges for most firms. To remedy a myriad of problems with data protection as well as operational and disaster recovery, companies are replacing legacy backup methods with new approaches. Read on to learn more. 
(WHITE PAPER) READ ABSTRACT |

EVault Remote Disaster Recovery by i365, makers of Evault

November 16, 2009 - (Free Research)
EVault Remote Disaster Recovery Service (RDR) is a hosted service to help you quickly recover your key servers and data after a site disaster, and remotely access them in a secure virtual environment. 
(PRODUCT REVIEW) READ ABSTRACT |

The Value of Off-Site Data Protection Services by Iron Mountain

January 23, 2014 - (Free Research)
This whitepaper describes an off-site data protection service that can keep electronic media secure while providing efficient retrieval with the help of high-specification service elements for magnetic, optical and solid-state media. 
(WHITE PAPER) READ ABSTRACT |

PBS Engineering and Environmental Bolsters Virtualized Environment with Disaster Recovery Efforts and Cuts 40 Percent in Energy Costs by Dell and VMware

August 30, 2013 - (Free Research)
Check out this informative paper to explore a secure DR solution that's built for today's virtualized environments. Read on to learn more. 
(CASE STUDY) READ ABSTRACT |

Secure Sync Demo by Iron Mountain

May 17, 2011 - (Free Research)
Tracking and managing your media inventory can be a very complex proposition. Between tape rotation schedules, retention policies, generating inventory reports, as well as complying with audit trails and regulatory compliance. Most importantly, though, in the event of a disaster, you need your backup data. 
(WEBCAST) READ ABSTRACT |

Introduction to Virtualization E-book, Chapter 1: Virtualization Concepts in Disaster Recovery by Hewlett Packard Company and Intel

February 02, 2009 - (Free Research)
Virtualization is changing the disaster recovery landscape. This E-Book is a beginners' guide to virtualization with chapters on disaster recovery (DR), test and development, server consolidation, high availability, storage, security and key technologies including VMware ESX,Microsoft Hyper-V and Citrix XenServer. 
(EBOOK) READ ABSTRACT |

April Essential Guide to Data Protection by SearchSecurity.com

April 11, 2012 - (Free Research)
In this Information Security Essentials Guide, gain expert insight into the increasing focus on data protection and uncover proven strategies for keeping your sensitive data secure. Explore topics including tokenization technology, 4 keys to DLP success, disaster recovery planning, and more. 
(EGUIDE) READ ABSTRACT |

Virtual Desktop Solutions in the Federal Government by VMware, Inc.

February 07, 2012 - (Free Research)
This webcast shows how the recently released VMware View 5 environment is being used to deploy virtual desktops to provide mission-critical solutions around Disaster Recover/COOP, telework and secure mobile applications to federal organizations. 
(WEBCAST) READ ABSTRACT |

Simpana® Software—A Unique Cloud-Enabled Platform by CommVault Systems, Inc.

February 17, 2011 - (Free Research)
Check out this white paper to see how Simpana software seamlessly extends local backup and archive to a new tier of cloud-based storage. Virtually unlimited storage capacity from out integrated cloud storage partners helps users dramatically reduce costs and operational complexity while improving long-term compliance. 
(WHITE PAPER) READ ABSTRACT |

Securing Data Stored on Tape with Encryption by Quantum Corporation

April 30, 2010 - (Free Research)
Considering company data needs to be stored for longer periods of time and the high cost of a data breach; the need to encrypt data stored on tape is becoming increasingly important. Read this paper now to learn about why companies are moving in this direction, and what technologies are out there to help. 
(IT BRIEFING) READ ABSTRACT |

EXA Corporation Creates a Secure and Resilient Private Cloud by IBM

June 30, 2012 - (Free Research)
In this case study, see how one organization implemented a cloud solution that provides automation, security, and management tools to ensure their data on their hybrid cloud remained protected across multiple servers. 
(WHITE PAPER) READ ABSTRACT |

Network Programmability Is Real: Five Use Cases for Our Disaster Recovery Cloud Services by Cisco Systems, Inc.

February 17, 2014 - (Free Research)
This resource covers the benefits found from five use cases for a networking platform that will provide added flexibility and agility. 
(WHITE PAPER)

Case Study: Rochford District Council Secures 25 Years' of History with Acronis by Acronis NEMEA

May 31, 2011 - (Free Research)
Like many local governmental organisations, Rochford District Council depends heavily on the continual availability of its IT systems. Having a reliable disaster recovery strategy in place is an essential component of the Council’s IT strategy. Read on to learn more. 
(CASE STUDY) READ ABSTRACT |

Key Steps to Securing Your Organization and Evicting a Hacker by Foundstone, Inc.

May 2008 - (Free Research)
This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks. 
(PODCAST) READ ABSTRACT |

Welcome to Iron Mountain’s National Data Center by Iron Mountain

January 2014 - (Free Research)
This brief video provides an overview of Iron Mountain's National Data Center, one of the most secure data center complexes in the world, and reveals key benefits of this strategy. 
(WEBCAST) READ ABSTRACT |

Offsite Tape Vaulting: Secure, Offsite Data Backup and Quick, Reliable Recovery by Iron Mountain

February 2012 - (Free Research)
Check out this brief white paper to learn about an offsite tape vaulting service that enables your organization to quickly recover your data in the event of a disaster or unplanned downtime, and also enables you to track where your backup tapes are at all times (i.e. in transit, handling/storage, etc.). Read on to learn more. 
(DATA SHEET) READ ABSTRACT |

Sunbelt Exchange Archiver (SEA): Your Email Archiving Solution by Sunbelt Software

August 2008 - (Free Research)
SEA is a comprehensive email archiving solution from Sunbelt Software that effectively addresses today's corporate email communication needs. 
(ARTICLE) READ ABSTRACT |

Case Study: Capita Group PLC by Druva Software

December 2010 - (Free Research)
Office and remote laptop users at Capita were unable to securely backup their critical data. A secure and scalable backup solution featuring low impact on system performance was crucial to fulfilling their backup needs. Find out why Capita selected Druva inSync for their backup solutions. 
(CASE STUDY) READ ABSTRACT |

Cloud backup tutorial: How to leverage cloud backup services (Part 2) by Iron Mountain

July 2009 - (Free Research)
In this section of the tutorial on cloud backup, you will learn how cloud storage is changing data protection and disaster recovery and the differences in the cost of cloud backup vs. traditional backup. 
(EGUIDE) READ ABSTRACT |

Information Security Magazine – December 2010: Understanding the Data Accountability and Trust Act by Information Security Magazine

December 2010 - (Free Research)
This month’s issue of Information Security magazine takes you deep inside the Data Accountability And Trust Act (DATA), pending legislation that could reshape the national privacy landscape and impact the way enterprises and midmarket companies architect their security operations. 
(EZINE)

Top Considerations for Implementing Secure Backup and Recovery by Zmanda Inc.

July 2008 - (Free Research)
Since your backup is a copy of your most valuable digital assets, backup security is a critical consideration. This white paper details important considerations for ensuring security of backup data. 
(WHITE PAPER) READ ABSTRACT |

EVault for Microsoft System Center Data Protection Manager by i365, makers of Evault

June 2010 - (Free Research)
This white paper examines the backup and recovery needs of today’s enterprises.  Discover a tool that provides secure, efficient cloud connectivity and can be leveraged to protect the infrastructures in your mixed environment. 
(ARTICLE) READ ABSTRACT |

IBM Power Systems and Their Support for Business Resilience in Challenging IT Environments by IBM

April 2012 - (Free Research)
This short white paper provides insight into a disaster recovery solution that maintains continuous high availability in the face of any threat to the data center. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 454 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts