Disaster Recovery Planning White Papers

(View All Report Types)
The What, How and Where of Deduplication
sponsored by Spectra Logic Corporation
WHITE PAPER: This white paper is as an introduction to data deduplication, answering the what, how, and where of this storage technique. Data deduplication is a method of reducing the amount of duplicate copies of data on your system. It makes a whole lot of sense - instead of storing multiple copies of an item, stores the data once.
Posted: 19 Mar 2009 | Published: 01 May 2008

Spectra Logic Corporation

Comprehensive Data Protection and Disaster Recovery with Dell EqualLogic and VMware
sponsored by DellEMC and Intel®
WHITE PAPER: Read this solution brief to learn how the Dell EqualLogic PS Series' bundled Auto-Snapshot Manager and Auto-Replication features are used to effectively integrate with VMware for scalable online data protection of the complete virtual infrastructure. This paper also discusses protection and simplification for the virtual environment.
Posted: 15 Sep 2010 | Published: 13 May 2009

DellEMC and Intel®

Enterprise Resiliency & Application Recovery
sponsored by SunGard Availability Services
WHITE PAPER: When disaster strikes, your IT information and data is compromised. This side-by-side case study outlines how East Coast University and a medical center in NYC helped weather hurricane sandy and maintain IT availability.
Posted: 26 Nov 2013 | Published: 26 Nov 2013

SunGard Availability Services

CIO Strategies for Storage: Modernize Data Protection Practices
sponsored by DellEMC and Intel®
WHITE PAPER: Explore this game-changing resource to discover the key features of a modernized data protection solution, and how it can benefit your organization.
Posted: 03 Mar 2014 | Published: 31 Dec 2012

DellEMC and Intel®

Oracle Data Guard with Oracle Database 11g Release 2
sponsored by Oracle Corporation UK Ltd
WHITE PAPER: Read this white paper to learn about a unique data protection and recovery solution that provides the management, monitoring, and automation software to create synchronized standby databases that protect data from failures and other disasters.
Posted: 25 Sep 2009 | Published: 25 Sep 2009

Oracle Corporation UK Ltd

When Good Backups Go Bad: Data Recovery Failures and What to Do About Them
sponsored by Symantec Corporation
WHITE PAPER: In this white paper, you'll learn about some of the most common pitfalls associated with backups and how to avoid them. You'll learn about the repercussions of poor/failed backups, and learn how to establish a backup strategy that can ensure minimal downtime during a disaster. Read on to learn more.
Posted: 22 Nov 2011 | Published: 22 Nov 2011

Symantec Corporation

Disaster Got You Down?
sponsored by CDW Corporation
WHITE PAPER: The risks attached to not having a BC or DR plan are neither small nor cheap. Every good plan employs certain technologies and methodologies to limit the disruptiveness of an outage. CDW offers storage, power and networking specialists to assist with disaster recovery needs.
Posted: 27 Jan 2010 | Published: 27 Jan 2010

CDW Corporation

Disaster Recovery Solutions from VMware: Transforming Disaster Recovery - VMware Infrastructure for Rapid, Reliable and Cost-Effective Disaster Recovery
sponsored by VMware, Inc.
WHITE PAPER: VMware Infrastructure is transforming the way disaster recovery is done today and in the future; it changes the disaster recovery paradigm to one that is cost effective, rapid and reliable.
Posted: 20 Oct 2008 | Published: 18 Oct 2008

VMware, Inc.

New Data Center Designs Go Underground for Energy Efficiency
sponsored by Iron Mountain
WHITE PAPER: This resource introduces a service that's changing the data center colocation model by delivering the key capabilities and functions you need to align your data center infrastructure with disaster recovery requirements and fuel success.
Posted: 27 Jan 2014 | Published: 27 Jan 2014

Iron Mountain

3 Key Components of a Risk-Based Security Plan
sponsored by Foundstone, Inc.
WHITE PAPER: This whitepaper takes a look at the different components of an effective security plan, and provides a perspective on how enterprises that are serious about their information security budgets should rethink their security plan.
Posted: 02 Jun 2008 | Published: 02 Jun 2008

Foundstone, Inc.