• RSS
  • Twitter
  • FaceBook

Related Topics

Add White Papers

Get your company's white papers in the hands of targeted business professionals.

recovery

Results 301 - 325 of 990Sort Results By: Published Date | Title | Company Name
By: Iron Mountain     Published Date: Sep 13, 2010
Today, more organizations than ever recognize the value and convenience of using cloud backup to protect their data.
Tags : 
iron mountain, cloud, pc backup, recovery, connected, data management, data storage, cloud storage, virtualization, backup and recovery, storage management, storage virtualization, data protection, database security, cloud computing
    
Iron Mountain
By: Iron Mountain     Published Date: Sep 24, 2010
Increasingly firms are adopting data protection and recovery for enterprise laptops and desktops. Read this IDC Report to find out if your PCs and Laptops are Recovery and Discovery Ready.
Tags : 
iron mountain, cloud, pc backup, recovery, connected, data management, data storage, cloud storage, virtualization, backup and recovery, ip storage, storage management, storage virtualization, mobile computing, mobile workers, wireless security, document management, information management, records management, search and retrieval
    
Iron Mountain
By: F5 Networks Inc     Published Date: Jan 31, 2017
Organizations considering moving enterprise applications to the public cloud should ensure that they also move the application delivery services their applications rely on in the data center. In addition, cloud migration presents an opportunity to organize and rationalize security and access, gain visibility into cloud-based application traffic, and architect a strong disaster recovery plan. Download to read the 5 rules to follow when lifting and shifting apps to the the cloud.
Tags : 
apps, cloud, enterprise applications, public cloud, networking
    
F5 Networks Inc
By: NaviSite     Published Date: Sep 02, 2014
This whitepaper explores the reasons behind changing traditional desktop computing strategies, why cloud-hosted virtual desktops are a compelling solution for many businesses and how to leverage cliud-hosted desktops for windows 7 migrations, mobile and departmental workers, and disaster recovery scenarios.
Tags : 
virtual desktops, cloud hosted virtual desktops, navisite, remote access, cloud computing
    
NaviSite
By: Black Box     Published Date: Nov 24, 2015
Black Box can help you get the most out of your technology investment. We partner with customers to identify the right solutions for strategic IT needs that add value to your business. Our portfolios of Wired/Wireless, UCC, and IT Service solutions, and our depth of expertise, deliver positive business outcomes for evolving IT business scenarios. Black Box takes a vendor-independent approach to deliver the right solution, on the right network. Our long-term, established relationships with best-in-class IT technology providers allow us to offer objective, vendor-neutral solutions designed to meet a broad range of IT requirements. With more than 4,000 team members & 200 offices in 150 countries, we offer global capabilities with local expertise, and are committed to driving business success through IT excellence. Our passion to IT communications is unsurpassed, and we will work with you to find the ideal solution for today’s challenge while helping to anticipate tomorrow’s needs.
Tags : 
voip solutions, contact center solutions, business phone systems, ucc, it services, it solutions, it security, it infrastructure, uc solutions, mobility solutions, cloud solutions, enterprise business solutions, data center cloud service, it disaster recovery, network services, video collaboration
    
Black Box
By: Absolute Software     Published Date: Jan 29, 2008
Does your PC lifecycle management (PCLM) reflect the issues associated with mobile users? Many organizations face expensive inefficiencies by not managing mobile assets effectively. These inefficiencies include dispersed and manual data collection, and inventory tools that are dependent on a connection to the company network.
Tags : 
absolute, intel, laptop, saas, managing laptops, pclm, computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm
    
Absolute Software
By: Absolute Software     Published Date: Jan 27, 2010
This whitepaper explains how organizations can reduce their energy bills by remotely regulating computers. Topics include typical workplace computer usage, how to calculate your potential energy savings, debunking power management myths, and how you can assign multiple power saving profiles to clients.
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, application integration, application performance management, business activity monitoring, business analytics, business integration, business management, business process automation, business process management, groupware workflow, product lifecycle management
    
Absolute Software
By: Absolute Software     Published Date: Feb 23, 2010
A majority of environments today are cross-platform, combining both PCs and Macs. The result has become a common IT challenge: How can you maintain Macs in a network environment with a PC-centric infrastructure and with Windows-based network services?
Tags : 
computrace, absolute software, it asset management, remote data delete, geolocation tracking, theft recovery, service guarantee, application integration, application performance management, business activity monitoring, business analytics, business integration, business management, business process automation, business process management, analytical applications, configuration management
    
Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Let us walk you through Absolute Manage's capabilities in this 10-minute demo; see how Absolute Manage can help you centrally manage both Mac and PCs.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, application security, disaster recovery
    
Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Watch this webcast as Support Manager for La Jolla Institute for Allergy & Immunology relates how he successfully frees up 30 IT support hours a week.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Vice President and Research Fellow for Aberdeen Group, shares trends, best practices and actionable insight on management of iOS mobile devices.
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
Forrester Research and Absolute Software discuss the importance for IT to create a "layered approach" for endpoint security and management
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software
By: Absolute Software     Published Date: Sep 06, 2011
See how Absolute Manage Mobile Device Management allows organizations to remotely manage their Apple® iOS devices (iPhone®, iPod® Touch, iPadT).
Tags : 
absolute, intel, laptop, saas, lock down, rapid recovery, stolen, data defense, theft deterrence, pc protection, tpm, trusted platform module, anti theft, data breach, password protection, password, encryption, security, access control, application security
    
Absolute Software
By: HP     Published Date: Jul 29, 2008
Join Forrester Research and HP in this webinar which explores common myths about IT disasters and analyzes different strategies to protect a company's information assets based on risk and cost. Stephanie Balaouras of Forrester analyzes 5 common myths around IT disasters e.g. disasters and loss of a data centers are rare.
Tags : 
disaster, disaster recovery, d/r, high availability, mission critical, forrester, webcast, webinar, it management
    
HP
By: HP     Published Date: Jul 29, 2008
Join this informative web event to hear from experts at Forrester Research and HP discuss the top ten challenges for effective disaster recovery planning, how to quantify the cost of downtime as well as tips on selecting and implementing disaster recovery solutions.
Tags : 
business continuity, disaster, disaster recovery, high availability
    
HP
By: Tealeaf     Published Date: Mar 31, 2011
Do you let the customer abandon and hope they have a better experience the next time they visit your site (assuming they return)?
Tags : 
tealeaf, cem solutions, real-time customer recovery, remarketing
    
Tealeaf
By: NetApp Backup & Recovery     Published Date: Dec 31, 2008
Discover for yourself how NetApp disk-to-disk backup with SnapVault® can increase the storage availability of a VMware® ESX environment.
Tags : 
netapp backup recovery, esx server, storage virtualization, networking, virtualizing servers, storage, vmware, network management, server hardware, servers, backup and recovery
    
NetApp Backup & Recovery
By: NetApp Backup & Recovery     Published Date: Dec 31, 2008
Download this exclusive report to learn how NetApp direct-to-tape technology can reduce the number of media servers required to support a solution, which can reduce hardware, software, and management costs by utilizing the VTL to perform tape exports.
Tags : 
netapp backup recovery, symantec, esg, virtual tape library, raid, storage, backup and recovery, storage management
    
NetApp Backup & Recovery
By: NetApp Backup & Recovery     Published Date: Dec 31, 2008
Learn about strategies for enterprise data protection from the data center to remote office environments.
Tags : 
netapp backup recovery, data liability, data protection, data center, sql, server, microsoft exchange, wan, disaster recovery, storage, data management, backup and recovery, server virtualization
    
NetApp Backup & Recovery
By: NetApp Backup & Recovery     Published Date: Dec 31, 2008
Download this exclusive report to learn how NetApp deduplication can be applied to all storage tiers, including primary application data.
Tags : 
netapp backup recovery, dedupication, data deduplication, raid, storage, backup and recovery, storage management
    
NetApp Backup & Recovery
By: NetApp Backup & Recovery     Published Date: Dec 31, 2008
Download this exclusive article to gain insight on why a NetApp SnapVault backup system is 54% less expensive than a similar tape-based backup solution over a typical backup product lifecycle.
Tags : 
netapp backup recovery, snapvault, backup solution, wan, raid, storage, backup and recovery, storage management
    
NetApp Backup & Recovery
By: NetApp Backup & Recovery     Published Date: Dec 31, 2008
Download this exclusive article to gain insight on how to view the entire archival infrastructure including benefits that storage management can provide.
Tags : 
netapp backup recovery, deduplication, esg, server virtualization, data deduplication, storage, backup and recovery, storage virtualization
    
NetApp Backup & Recovery
By: Dell     Published Date: Oct 20, 2008
Dell can help corporations to properly dispose of old PCs in a secure and cost-effective manner that is also environmentally friendly.
Tags : 
dell, hardware asset recovery, safe hardware disposal, asset recovery, environmental liability, dell asset recovery services, security, platforms, disaster recovery, windows
    
Dell
By: NetApp     Published Date: Jun 09, 2009
NetApp® SnapManager® for Oracle (SMO) is designed to significantly simplify all these tasks and more. In this article, we examine how you can deploy SMO to simplify and even automate data protection, recovery, and cloning across both primary and secondary storage. Learn more today!
Tags : 
netapp, snapmanager, oracle, smo, networked storage, snapmanager, dataontap, direct attached storage, das, data management, data integration, storage, storage efficiency, implementation, esg, it sandbox, microsoft office sharepoint server, moss, mission-critical, sql
    
NetApp
By: NetApp     Published Date: Jun 09, 2009
Nothing is scarier than the prospect of having to recover an entire site after a disaster. VMware® Site Recovery Manager (SRM) is designed to simplify and accelerate disaster recovery. This article discusses the challenges of DR planning and how VMware SRM—in conjunction with NetApp storage functionality—can simplify DR for virtual infrastructure.
Tags : 
netapp, vmware, disaster recovery, site recovery manager, srm, storage, backup and recovery, business continuity
    
NetApp
Start   Previous    6 7 8 9 10 11 12 13 14 15 16 17 18 19 20    Next    End
Search White Papers      

Community Area

Log in | Register

Solution Center

Follow TechGenix on Twitter