Research Library > Technology > Security > Business Continuity

Business Continuity

Business Continuity Planning (BCP) is a methodology used to create a plan for how an organization will resume partially or completely interrupted critical function(s) within a predetermined time after a disaster or disruption. BCP may be a part of a larger organizational effort to reduce operational risk associated with poor information security controls, and thus has a number of overlaps with the practice of risk management.
Results 1 - 25 of 301Sort Results By: Published Date | Title | Company Name
White Paper Published By: Nuance Communications     Published Date: Mar 16, 2010
The recent economic downturn has created some formidable challenges for the retail banking industry. Fraud and identify theft are on the rise, costing banks big money and raising customer concerns about security.
Tags : 
nuance, retail banking, fraud, identify, contact
    
Nuance Communications
White Paper Published By: NEC     Published Date: Dec 16, 2009
The proliferation of communications channels has set expectations around cost and productivity benefits. Unified Communications (UC) is proffered as a way of helping bring them all together, but companies struggle to justify the business case for it. Against this background, how important is UC as an approach to streamlining communications, and how can businesses exploit it?
Tags : 
nec, business communication, productivity, unified communications, uc delivery
    
NEC
White Paper Published By: Vision Solutions     Published Date: Apr 11, 2008
If you need more than tape backup to protect your critical applications running on AIX operating environments, download this white paper and learn your options and strategies, including how new technologies have significantly improved the recovery time and data recovery points for AIX.
Tags : 
data management, disaster recovery, business continuity, ibm aix, backup
    
Vision Solutions
White Paper Published By: Vision Solutions     Published Date: Apr 11, 2008
Until recently, System i high availability solutions were reserved mostly for large enterprises. Now that high availability is dramatically easier to use and less expensive to own and manage, the picture has changed.
Tags : 
high availability, disaster recovery, vision, vision solutions, ibm
    
Vision Solutions
White Paper Published By: Vision Solutions     Published Date: Dec 31, 2007
For AIX IT departments looking to take the next step in data protection strategies, CDP is an essential consideration. Analysts agree that businesses will be incorporating this strategy in the next few years as part of an integrated solution. CDP enables you to reverse data corruption in a fraction of the time and labor required for recovery from tape.
Tags : 
aix, data protection, continuous data protection, cdp, high availability
    
Vision Solutions
White Paper Published By: Vision Solutions     Published Date: Dec 31, 2007
This white paper provides a basic understanding of the building blocks of IT and business continuity—from understanding the concepts of disaster recovery and information availability to calculating the business impact of downtime and selecting the right software solution.
Tags : 
disaster recovery, business continuity, disk backup, tape backup, data backup
    
Vision Solutions
White Paper Published By: FTI Consulting     Published Date: Mar 03, 2017
2016: The year in crisis provides The Economist Intelligence Units assessment of sources of corporate risk in the year 2016, its evolution over the next three years, and a perspective on the role of the board of directors in managing crises.
Tags : 
fti, fti consulting, crisis management, corporate risk, cyber attacks
    
FTI Consulting
White Paper Published By: SAS     Published Date: Mar 31, 2016
Digitization creates major opportunities for financial services automating operations, expanding channels, delivering engaging customer experiences.
Tags : 
analytics, financial services, operations, digital management, data
    
SAS
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
This white paper from Citrix provides a checklist to follow to ensure your company can embrace enterprise mobility securely.
Tags : 
citrix, enterprise, mobile, network management, network security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
In this white paper, the experiences of four Citrix customers illustrate key use cases for Citrix XenMobile, the most complete enterprise mobility management solution, and the business value it delivers.
Tags : 
citrix, enterprise, mobility, business continuity, best practices
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Future workplace structures are envisioned to be a scenario wherein employees are likely to use a multitude of connected mobile devices and apps that will offer compelling new work style experiences integrating voice, video and data access services.
Tags : 
citrix, frost & sullivan, next-gen, enterprise, infrastructure
    
Citrix Systems, Inc.
White Paper Published By: Digital Realty     Published Date: Dec 02, 2015
A comprehensive approach to security requires much more than simply installing locks and hiring security officers. This paper has examined the elements and organization of a holistic approach to security.
Tags : 
digital realty, security, secure data center, data center security, secure business operations
    
Digital Realty
White Paper Published By: IBM     Published Date: Sep 30, 2015
Big data analytics to help better protect and secure.
Tags : 
healthcare, enterprise, security, data, business continuity
    
IBM
White Paper Published By: Cisco     Published Date: Sep 16, 2015
Big data into manageable components.
Tags : 
big data, data platform, ioe, analytics, business continuity
    
Cisco
White Paper Published By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
In todays globalized business environment, the need to build strong relationships with partners, suppliers, internal teams, investors and customers is more important than ever. High-quality video conference calls enable you to communicate as effectively as actually being there in person, helping you to build the engaging relationships needed for success in business.
Tags : 
video conferencing, speed, competitive advantage, scale, business continuity
    
LifeSize, a division of Logitech
White Paper Published By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
Sure, ROI calculators help distill anecdotal evidence and analyze cost savings associated with travel, but it usually goes something like this: total hours spent traveling + cost of hotel, rental car, and food divided by the number of meeting hours. Well, at least thats one version. No matter the final number, the ROI total savings on cost of travel is only part of the story. Calculating the true ROI of video conferencing combines facts with real-life tangibles to help you understand and quantify your investment.
Tags : 
roi, video conferencing, communication, travel costs, meetings
    
LifeSize, a division of Logitech
White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
Protect against advanced attacks.
Tags : 
threat, data, security, it management, budget
    
Vectra Networks
White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
Recently, Kasperky Labs disclosed that it was the victim of a sophisticated cyber attack, which they have named Duqu 2.0. The team at Kaspersky Labs has published a detailed analysis of Duqu 2.0 and its definitely worth a read.
Tags : 
cyber attack, protection, security, network, business continuity
    
Vectra Networks
White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
Organizations invest heavily to block advanced attacks, on both endpoints and networks. Despite all this investment, devices continue to be compromised in increasing numbers and high-profile breaches continue unabated. Something doesnt add up. It comes down to psychology: security practitioners want to believe the latest shiny widget for preventing compromise will finally work and stop the pain.
Tags : 
data, security, threats, protection, advanced threat
    
Vectra Networks
White Paper Published By: IBM     Published Date: Jul 31, 2015
Manage identities and access.
Tags : 
management, risk, continuous compliance, access control, business continuity
    
IBM
White Paper Published By: IBM     Published Date: Jul 31, 2015
Guide to security intelligence.
Tags : 
security, data, application security, business continuity, compliance
    
IBM
White Paper Published By: IBM     Published Date: Jul 31, 2015
Optimize the process of investigating and gathering evidence.
Tags : 
data, security, threats, protection, business continuity
    
IBM
Case Study Published By: Venafi     Published Date: Jul 27, 2015
Learn how security professionals responded about the risk and impact to enterprises from attacks on keys and certificates.
Tags : 
cybersecurity, keys, certificates, cyber attacks, server certificate misuse
    
Venafi
White Paper Published By: Mimecast     Published Date: Jun 22, 2015
Read the report now to get the knowledge you need to plan the perfect enterprise-class Office 365 environment.
Tags : 
limitations of cloud based services, third party solutions, microsoft office 365, email security, continuity
    
Mimecast
White Paper Published By: Mimecast     Published Date: Jun 22, 2015
Download this whitepaper today and take a good hard look at one of the biggest threats companies are facing without preparation your company could be next.
Tags : 
spear-phising, cyber attacks, cyber threats, network security, company security
    
Mimecast
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.