BCP Software Reports

Disaster Recovery eZine - Covering All the Bases: A Concise Guide to Disaster Recovery Essentials, from Building a Plan to Putting It to the Test
sponsored by TechTarget Disaster Recovery
EZINE: Disaster recovery (DR) has quickly become the top priority for today's storage managers. However, the issue isn't whether or not you have a DR plan, but rather if you have one that will work when needed. This paper covers all the bases.
Posted: 05 Dec 2008 | Published: 05 Dec 2008

TechTarget Disaster Recovery

Drowning in a Sea of Downtime
sponsored by Borland, Micro Focus
RESOURCE: With your reputation, ROI, and revenue on the line, you can't afford downtime. You need a way to safeguard your applications and websites, ensuring top performance 100% of the time. Check out this infographic for more shocking stats about downtime, and discover a performance management technology that helps you on the road to minimal downtime.
Posted: 16 Apr 2014 | Published: 16 Apr 2014

Borland, Micro Focus

Planning and Testing Cloud-Based Disaster Recovery
sponsored by CloudEndure Inc.
EGUIDE: This e-guide highlights the challenges of managing cloud DR and discusses the importance of having the same managers control both the production site and DR site. Read on to learn about the DR management options available to you if you're on a tight budget, including utilizing a hosting provider or implementing a private cloud environment.
Posted: 26 Feb 2016 | Published: 24 Feb 2016

CloudEndure Inc.

Business Continuity Planning - The First Step to Business Resiliency
sponsored by Overland Storage
WHITE PAPER: Business Continuity(BC) is the ability to keep vital business operations running in the event of failure in the existing infrastructure. This white paper highlights the importance of (BC) planning and explores strategies and solutions to help achieve them
Posted: 12 Nov 2007 | Published: 01 Aug 2007

Overland Storage

The Cloud and HR: Choosing the Right SaaS Application
sponsored by TechTarget Business Analytics
EGUIDE: This expert e-guide from SearchFinancialApplications.com outlines four questions to ask potential service providers before signing an HR SaaS contract. In addition, uncover the top five HR technology trends for 2013 that you should keep an eye out for.
Posted: 24 Jul 2013 | Published: 24 Jul 2013

TechTarget Business Analytics

Computer Weekly – 1 March 2016: Protecting the UK from cyber attacks
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we talk to the National Crime Agency's top cyber cop about tackling IT security threats against the UK through global collaborations. We ask CIOs for their tips on building an IT strategy for the digital age. And we review the big six storage suppliers' plans for all-flash arrays. Read the issue now.
Posted: 29 Feb 2016 | Published: 01 Mar 2016

TechTarget ComputerWeekly.com

How to Approach Storage Disaster Recovery
sponsored by Rubrik
EGUIDE: In this e-guide learn how to turn back time on a disaster to recover what was lost; manage "deduped" data, and more. Read on to ensure your enterprise can take a hit and recover quickly, allowing for a low-impact return to normalcy.
Posted: 22 Aug 2016 | Published: 18 Aug 2016

Rubrik

Business Continuity Self-Assessment Tool
sponsored by IBM Software Group
WHITE PAPER: The Business Continuity Self Assessment Tool is a step toward becoming a more resilient business. After completing the assessment, you will be able to view a personalized graph that identifies potential gaps within the business and event threat areas.
Posted: 26 Jul 2007 | Published: 09 Apr 2007

IBM Software Group

How Virtualization is Key to Managing Risk: A Guide to Business Continuity and Disaster Recovery
sponsored by Dell and VMware
WHITE PAPER: Learn how encapsulation and server consolidation can minimize the damage that disasters cause.
Posted: 26 Jul 2013 | Published: 26 Jul 2013

Dell and VMware

E-Guide: Align Data Protection with Business Importance
sponsored by IBM
EGUIDE: This SearchStorage.com E-Guide discusses the importance of protecting not just data but "use" of the associated information system, and outlines 4 capabilities needed for a better approach to data protection. Read on to learn more.
Posted: 25 Aug 2011 | Published: 25 Aug 2011

IBM