Your Search returned 2 results from our Editorial content

Sort By


Business Continuity Failure: What Are the Consequences?...

When the unexpected strikes, businesses need to take action fast. Take these steps to build a business continuity plan and be prepared for anything.


In times of chaos, SunGard's mobile office is an island...

Sungard's mobile office is designed to work in areas where nothing else is working. It is for use in places where there is no power or network. It's for disaster...


Your Search returned 197 results from our White Paper Library

Sort By

Disaster Recovery

Organizations are taking business continuity planning more...

Organizations are taking business continuity planning more seriously than ever. An independent report from IT research firm Forrester examines how to...



Using a Comprehensive Virtualization Solution to Maintain...

Is your network ready? Examine this Business Continuity and Disaster Recovery Preparedness Checklist to see how your organization measures up in planning,...


Disaster Recovery

Ensuring the Availability of Hyper-V Virtualized Workloads...

Tune in and learn about Hyper-V and the benefits your organization can gain. You’ll hear about Double-Take Software’s replication technology as well as...


Mobile Communications

Incident Scene, Event and Disaster Management

This white paper outlines the superior situational awareness that broadband data provides on the incident, event or disaster scene so agencies can deliver...

VMware and CA

Disaster Recovery

Improving Business Continuity with VMware Virtualization...

Implementing plans to ensure business continuity for IT infrastructure is an essential requirement for organizations today. Downtime of important applications...

VMware and CA

Disaster Recovery

Business Continuity and Disaster Recovery with CA Recovery...

In this brief, you'll learn how CA Recovery Management Products, like CA ARCserve Backup and CA XOsoft solutions, can be applied with VMware Infrastructure...

VMware and CA

Disaster Recovery

Practical Disaster Recovery Planning: A Step-by-Step Guide...

The primary goal of this guide is not simply to provide a checklist of tasks, but to help you develop an understanding of the disaster recovery (DR) planning...



Business Continuity with Neverfail ClusterProtector

Get a clear view of the three primary choices an organization comes across while implementing a clustered solution today. Learn how Neverfail works with...

Quest Software

Email Encryption

The Active Directory Recycle Bin: The End of Third-Party...

Learn about the Active Directory Recycle Bin – and why there’s still a need for third-party Active Directory recovery tools that are quick, easy and provide...

Previous 1 3 4 5 19 20



Thinking Different

In 2016, get ready for the mobile API explosion

Jon Collins’ in-depth look at tech and society


China Rising

How far can China push its bid to control the internet?

Phil Muncaster reports on China and beyond


Most Recent Comments


Resource Center

  • /view_company_report/1541/a10-networks
  • /view_company_report/775/aruba-networks
  • /view_company_report/1450/carbon-black
  • /view_company_report/624/interactive-intelligence
  • /view_company_report/1219/jama-software
  • /view_company_report/661/kaseya
  • /view_company_report/506/qualys
  • /view_company_report/391/silver-peak-systems
  • /view_company_report/2095/simply-hired
  • /view_company_report/419/splunk
  • /view_company_report/1352/tegile-systems


Does Altruistic Malware introduce more risk despite good intentions?