"Tech Solutions - one byte at a time!"
DigiBytes.com is the digital library of solutions for business and technology professionals.

Login Register Login
For Admins

Business Continuity

Business Continuity Planning (BCP) is a methodology used to create a plan for how an organization will resume partially or completely interrupted critical function(s) within a predetermined time after a disaster or disruption. BCP may be a part of a larger organizational effort to reduce operational risk associated with poor information security controls, and thus has a number of overlaps with the practice of risk management.
Results 226 - 250 of 305Sort Results By: Published Date | Title | Company Name
White Paper Published By: Cisco     Published Date: Aug 27, 2015
Magic Quadrant report looking specifically at on-premises unified communications requirements for midsize organizations with 100 to 999 employees.
Tags : 
unified communications, midsize enterprise, uc solutions, productivity, business process
    
Cisco
White Paper Published By: Windstream     Published Date: May 06, 2015
Read this Gartner report to learn how to keep business up and running no matter what.
Tags : 
business continuity, windstream, gartner, it service, analysis
    
Windstream
White Paper Published By: McAfee     Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Tags : 
next generation firewall, intrusion prevention systems, firewall, contextual security, advanced evasion detection
    
McAfee
White Paper Published By: Mimecast     Published Date: Jun 04, 2013
With recent high profile cases, such as the News of the World hacking scandal, hitting the news headlines, the issue of email retention has quickly moved up the IT Director’s agenda.
Tags : 
email archiving, ediscovery, compliance, legal, intrusion prevention
    
Mimecast
White Paper Published By: Arbor Networks     Published Date: Mar 06, 2013
This Frost & Sullivan white paper identifies what organizations need to know to protect their intellectual property and prepare for unexpected data breaches.
Tags : 
cyber threats, security, ddos, data breaches, atlas
    
Arbor Networks
Case Study Published By: Websense     Published Date: Feb 26, 2013
Miercom conducted an independent third-party validation of the Websense TRITON Web Security Gateway Anywhere (WSGA) version 7.7.3, with comparisons to several major competitive products evaluated in this review.
Tags : 
security, appliance, detection, blocking, malware
    
Websense
Case Study Published By: Oracle Corp.     Published Date: Feb 12, 2013
In today's always-open global economy, success means ensuring access to enterprise data whenever it is needed. Downtime, weather planned or unplanned, can be extremely costly. Find out how to minimize downtime in your organization.
Tags : 
downtime, network, high availability, oracle, study
    
Oracle Corp.
White Paper Published By: IBM     Published Date: Jan 25, 2013
At the beginning of 2012, IBM asked a group of executives from leading companies to share how they were approaching reputational risk management. View this infographic to see the surprising results.
Tags : 
risk management, reputational management, enterprise, threat prevention, access control
    
IBM
White Paper Published By: IBM     Published Date: Jan 25, 2013
IBM has written this paper to enable discussion around the new security challenges that the cloud introduces.
Tags : 
security, cloud, ibm, access management, identity management
    
IBM
White Paper Published By: IBM     Published Date: Jan 23, 2013
How security, business continuity, and technical support can shape the reputation and value of your company
Tags : 
reputational risk, business continuity, risk management, cloud, social media
    
IBM
White Paper Published By: IBM     Published Date: Jan 23, 2013
The paper examines key factors you should consider when planning for the transition to cloud-based business resilience and in selecting your cloud partner.
Tags : 
disaster recovery, cloud computing, cloud, virtualization, data protection
    
IBM
White Paper Published By: IBM     Published Date: Jan 23, 2013
Global organizations are increasingly emphasizing business resilience, that is, the ability to adapt rapidly to a continuously changing business environment.
Tags : 
risk management, disaster recovery, business continuity, security, encryption
    
IBM
Webinar Published By: Lumension     Published Date: Jan 22, 2013
Keeping track of 10,000+ of anything is a management nightmare. With ongoing compliance and evolving attacks against vulnerable endpoint devices, getting a handle on managing endpoints becomes more important.
Tags : 
endpoint management, security, compliance, patch management, file integrity monitoring
    
Lumension
White Paper Published By: Symantec     Published Date: Oct 02, 2012
Making the Best Choice When Considering Your Online Security Options
Tags : 
access control, authentication, business continuity
    
Symantec
White Paper Published By: CDW Vmware     Published Date: Aug 02, 2012
Your business counts on you for reliable, secure, responsive IT services. It's a nonstop job, with no time off to figure out complex new technologies or wrestle with software solutions designed for larger firms. Virtualization is the way to simplify your IT without unnecessary complexity or cost.
Tags : 
ebook, reliable, secure, simplify, infrastructure
    
CDW Vmware
White Paper Published By: Dell Software     Published Date: Jul 18, 2012
Take the Active Directory management quiz!
Tags : 
quiz, active sirectory, microsoft, directory service, server
    
Dell Software
White Paper Published By: Lumension     Published Date: Jan 11, 2012
The 2012 State of the Endpoint focused on four topics on the state of endpoint security: risk, productivity, resources and com­plexity. Find out more!
Tags : 
vulnerability management, patch management, vulnerability assessment, data protection, data loss
    
Lumension
White Paper Published By: Blue Coat Systems     Published Date: Oct 25, 2011
Blue Coat WebFilter is best-in-class for web threat protection, but content filtering databases have another key role to play: control of Internet use
Tags : 
blue coat, insider threats, security, social media risks, twitter risks
    
Blue Coat Systems
White Paper Published By: IBM Corporation     Published Date: Jun 09, 2011
This study provides real-world findings from in-depth interviews with 15 enterprises that have implemented database auditing and real-time protection solutions.
Tags : 
ibm, guardium, database auditing, security, real-time protection
    
IBM Corporation
White Paper Published By: IBM Corporation     Published Date: Jun 01, 2011
Gartner has identified five key failures in crucial interactions between security and risk professionals and their client.
Tags : 
ibm, gartner, communication, security message, enterprise risk management
    
IBM Corporation
White Paper Published By: VMware     Published Date: May 03, 2011
Read our guide to learn how you can get started quickly with VMware.
Tags : 
vmware, virtualization management, smbs, business continuity, vsphere
    
VMware
White Paper Published By: VMware     Published Date: May 03, 2011
The VMware SMB Survey is designed to help small and midsize businesses understand the benefits their peers are achieving with virtualization.
Tags : 
vmware, virtualization, smbs, bc/dr, application availability
    
VMware
White Paper Published By: VMware     Published Date: May 02, 2011
The cost of downtime and/or lost data can be devastating. For this reason, business continuity and disaster recovery (BC/DR) is becoming a critical mandate. Virtualization can keep your business running through many types of planned and unplanned IT outages. Download this white paper to learn more.
Tags : 
smb, vmware, virtualization, business continuity, disaster re vsphere
    
VMware
White Paper Published By: Time Warner Cable     Published Date: Apr 11, 2011
Time Warner Cable Business Class' cable broadband, teleworking services, and fiber-based solutions offer government agencies the communications options they need to enable resilient COOP.
Tags : 
time warner cable, business class, business continuity, cable broadband, teleworking
    
Time Warner Cable
White Paper Published By: Cisco     Published Date: Mar 15, 2011
This document explores the environmental uses of job scheduling (batch processing) and RBA (IT process automation) and defines the conditions for choosing one solution over another. This document also notes when it is appropriate to run a combination of both to gain immediate benefits for business operations and continuity.
Tags : 
cisco, it automation, job scheduling, run book automation, batch processing
    
Cisco
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Special Report

The proliferation of communications channels has set expectations around cost and productivity benefits. Unified Communications (UC) is proffered as a way of helping bring them all together, but companies struggle to justify the business case for it. Against this background, how important is UC as an approach to streamlining communications, and how can businesses exploit it?

Add Research

Get your company's research in the hands of targeted business professionals.

Modern Analyst Media Modern Analyst Media
Modern Analyst Requirements Modern Analyst Media Modern Analyst DigiBytes
Copyright 2009-2014 by Modern Analyst Media LLC Home  |  Featured Bytes  |  Popular Bytes  |  All Topics  |  Vendor Directory