Business Continuity

Business Continuity Planning (BCP) is a methodology used to create a plan for how an organization will resume partially or completely interrupted critical function(s) within a predetermined time after a disaster or disruption. BCP may be a part of a larger organizational effort to reduce operational risk associated with poor information security controls, and thus has a number of overlaps with the practice of risk management.
Results 1 - 25 of 302Sort Results By: Published Date | Title | Company Name
By: Nuance Communications     Published Date: Mar 16, 2010
The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.
Tags : nuance, retail banking, fraud, identify, contact, theft, outbound, access control
     Nuance Communications
By: NEC     Published Date: Dec 16, 2009
The proliferation of communications channels has set expectations around cost and productivity benefits. Unified Communications (UC) is proffered as a way of helping bring them all together, but companies struggle to justify the business case for it. Against this background, how important is UC as an approach to streamlining communications, and how can businesses exploit it?
Tags : nec, business communication, productivity, unified communications, uc delivery, business continuity, mobile workers
     NEC
By: Vision Solutions     Published Date: Apr 11, 2008
If you need more than tape backup to protect your critical applications running on AIX operating environments, download this white paper and learn your options and strategies, including how new technologies have significantly improved the recovery time and data recovery points for AIX.
Tags : data management, disaster recovery, business continuity, ibm aix, backup, recovery, vision, vision solutions
     Vision Solutions
By: Vision Solutions     Published Date: Apr 11, 2008
Until recently, System i high availability solutions were reserved mostly for large enterprises. Now that high availability is dramatically easier to use and less expensive to own and manage, the picture has changed.
Tags : high availability, disaster recovery, vision, vision solutions, ibm, backup and recovery, business continuity, as/400
     Vision Solutions
By: Vision Solutions     Published Date: Dec 31, 2007
For AIX IT departments looking to take the next step in data protection strategies, CDP is an essential consideration. Analysts agree that businesses will be incorporating this strategy in the next few years as part of an integrated solution. CDP enables you to reverse data corruption in a fraction of the time and labor required for recovery from tape.
Tags : aix, data protection, continuous data protection, cdp, high availability, disaster recovery, disk backup, tape backup
     Vision Solutions
By: Vision Solutions     Published Date: Dec 31, 2007
This white paper provides a basic understanding of the building blocks of IT and business continuity—from understanding the concepts of disaster recovery and information availability to calculating the business impact of downtime and selecting the right software solution.
Tags : disaster recovery, business continuity, disk backup, tape backup, data backup, data replication, disaster, high availability
     Vision Solutions
By: NodeSource     Published Date: Nov 10, 2017
Digital transformation is “the use of technology to radically improve performance or (business) reach. But for digital-native businesses that have never needed to make that shift — e-commerce, social media, web-based services — it involves a sharpening of that focus combined with an ongoing evolution of process and infrastructure.
Tags : nodesource, xml, software development, digital transformation, open source, web applications, web development, java
     NodeSource
By: FTI Consulting     Published Date: Mar 03, 2017
2016: The year in crisis provides The Economist Intelligence Unit’s assessment of sources of corporate risk in the year 2016, its evolution over the next three years, and a perspective on the role of the board of directors in managing crises.
Tags : fti, fti consulting, crisis management, corporate risk, cyber attacks, political disruption, corporate crisis, business continuity
     FTI Consulting
By: SAS     Published Date: Mar 31, 2016
Digitization creates major opportunities for financial services – automating operations, expanding channels, delivering engaging customer experiences.
Tags : analytics, financial services, operations, digital management, data, best practices, business continuity, business analytics
     SAS
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
This white paper from Citrix provides a checklist to follow to ensure your company can embrace enterprise mobility securely.
Tags : citrix, enterprise, mobile, network management, network security, business continuity, security management, best practices
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
In this white paper, the experiences of four Citrix customers illustrate key use cases for Citrix XenMobile, the most complete enterprise mobility management solution, and the business value it delivers.
Tags : citrix, enterprise, mobility, business continuity, best practices, customer satisfaction, customer service, collaborative commerce
     Citrix Systems, Inc.
By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Future workplace structures are envisioned to be a scenario wherein employees are likely to use a multitude of connected mobile devices and apps that will offer compelling new work style experiences integrating voice, video and data access services.
Tags : citrix, frost & sullivan, next-gen, enterprise, infrastructure, ip networks, network security, access control
     Citrix Systems, Inc.
By: Digital Realty     Published Date: Dec 02, 2015
A comprehensive approach to security requires much more than simply installing locks and hiring security officers. This paper has examined the elements and organization of a holistic approach to security.
Tags : digital realty, security, secure data center, data center security, secure business operations, network management, network security, storage management
     Digital Realty
By: IBM     Published Date: Sep 30, 2015
Big data analytics to help better protect and secure.
Tags : healthcare, enterprise, security, data, business continuity, compliance, best practices, business intelligence
     IBM
By: Cisco     Published Date: Sep 16, 2015
Big data into manageable components.
Tags : big data, data platform, ioe, analytics, business continuity, business intelligence, productivity
     Cisco
By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
In today’s globalized business environment, the need to build strong relationships with partners, suppliers, internal teams, investors and customers is more important than ever. High-quality video conference calls enable you to communicate as effectively as actually being there in person, helping you to build the engaging relationships needed for success in business.
Tags : video conferencing, speed, competitive advantage, scale, business continuity, network management, quality of service, web development
     LifeSize, a division of Logitech
By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
Sure, ROI calculators help distill anecdotal evidence and analyze cost savings associated with travel, but it usually goes something like this: total hours spent traveling + cost of hotel, rental car, and food divided by the number of meeting hours. Well, at least that’s one version. No matter the final number, the ROI total savings on cost of travel is only part of the story. Calculating the true ROI of video conferencing combines facts with real-life tangibles to help you understand and quantify your investment.
Tags : roi, video conferencing, communication, travel costs, meetings, business continuity, business intelligence, productivity
     LifeSize, a division of Logitech
By: Vectra Networks     Published Date: Aug 03, 2015
Protect against advanced attacks.
Tags : threat, data, security, it management, budget, firewall, intrusion detection, intrusion prevention
     Vectra Networks
By: Vectra Networks     Published Date: Aug 03, 2015
Recently, Kasperky Labs disclosed that it was the victim of a sophisticated cyber attack, which they have named Duqu 2.0. The team at Kaspersky Labs has published a detailed analysis of Duqu 2.0 and it’s definitely worth a read.
Tags : cyber attack, protection, security, network, business continuity, compliance, firewalls, productivity
     Vectra Networks
By: Vectra Networks     Published Date: Aug 03, 2015
Organizations invest heavily to block advanced attacks, on both endpoints and networks. Despite all this investment, devices continue to be compromised in increasing numbers and high-profile breaches continue unabated. Something doesn’t add up. It comes down to psychology: security practitioners want to believe the latest shiny widget for preventing compromise will finally work and stop the pain.
Tags : data, security, threats, protection, advanced threat, ips, ids, firewall
     Vectra Networks
By: IBM     Published Date: Jul 31, 2015
Guide to security intelligence.
Tags : security, data, application security, business continuity, compliance
     IBM
By: IBM     Published Date: Jul 31, 2015
Optimize the process of investigating and gathering evidence.
Tags : data, security, threats, protection, business continuity, compliance, hacker detection, intrusion detection
     IBM
By: Venafi     Published Date: Jul 27, 2015
Learn how security professionals responded about the risk and impact to enterprises from attacks on keys and certificates.
Tags : cybersecurity, keys, certificates, cyber attacks, server certificate misuse, code-signing certificate misuse, ssh key misuse, cryptographic misuse
     Venafi
By: Mimecast     Published Date: Jun 22, 2015
Read the report now to get the knowledge you need to plan the perfect enterprise-class Office 365 environment.
Tags : limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity, compliance, control, data management
     Mimecast
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search White Papers