Disaster Recovery Whitepapers


Sort by: Date | Company | Title


Traditional Backup is Dead - Are you prepared?
By CommVault | 24/11/2011
Conventional backup and recovery approaches clearly can't keep up with ever-growing storage rates. It's time to take on a new strategy.
Download this now


Backup and Recovery as we Know it is Changing
By CommVault | 24/11/2011
Increasing complexity in the data centre, including the rapid deployment of virtual servers, ever-expanding compliance requirements, and increasing amounts of sensitive data on mobile devices has put more strain on backup and recovery. Read on.
Download this now


Case Study: Bank of New Zealand Reduces Carbon Footprint with Red Hat on the Mainframe
By IBM | 7/11/2011
Like a large number of businesses in New Zealand and around the world, BNZ was close to reaching capacity in its datacenter and needed to determine how to maximise space while keeping costs down. “BNZ had defined two important goals for the future, both of which relied heavily on IT. The first was for the organisation to become carbon neutral by 2010 and the second was to explore open source opportunities though the adoption of Linux.” Another challenge BNZ faced was to create a disaster recovery solution. Its datacentres - one in Auckland, New Zealand and the other in East Melbourne, Australia are separated by the Tasman Sea.
Download this now


Networking or Not Working - Facing Up to the Facebook Dilemma
By Symantec | 20/10/2011
Connect. Share. Work? Facebook isn’t just a social networking tool. It’s a social phenomenon which poses a real dilemma for businesses. Allow employees access…and risk opening a potential Pandora’s box of problems? Go for a blanket ban…and lose a valuable channel of communication and collaboration? Opt for a compromise, with use permitted but limited in some way? This White Paper weighs up Facebook’s pros and cons, and shows how to keep your company safe – whatever policy you choose to implement.
Download this now


IT Security: A Step-by-Step Guide for Growing Business
By Symantec | 20/10/2011
This whitepaper sets out a flexible three stage approach that helps organisations set their security priorities and ensures that the time and effort spent on security is put to good use. It sets out a baseline of security controls that all organisations should apply and that is easy to understand, maintain and manage. Each business can set their security at a level that is right for today, and can then raise that security bar to address their security needs as their business grows and security trends evolve.
Download this now


Death to PST Files: The Hidden Costs of Email
By Symantec | 20/10/2011
This steady flow of email messages means managing email is more difficult than ever. A company must provide employees constant access to their email accounts and manage copies of every important email to comply with regulatory requirements. If a company is faced with a lawsuit, it must have the ability to easily place legal holds on emails and conduct efficient e-discovery. Read on.
Download this now


A Question of Continuity - Maximising Email Availability for Your Business
By Symantec | 20/10/2011
Productivity and reputation protected. Disruption defused. Business efficiency and continuity ensured. The challenge of maximising email availability really can be addressed at a competitive price. With Email Continuity.cloud strengthening your email availability strategy, outages need no longer be the bane of your business – and a resource-hungry burden on the IT Department.
Download this now


Five Tips for Effective Backup and Recovery in Virtual Environments
By Quest Software | 6/9/2011
Virtualisation brings challenges that can erode its cost benefits and leave the infrastructure less protected than before. In this paper, data protection experts offer five tips for effective backup and recovery to help you avoid the challenges that might keep you from fully protecting your virtual assets and infrastructure.
Download this now


Practical Backup and Disaster Recovery for SMBs Implementing Server Virtualisation
By Quest Software | 6/9/2011
SMBs have increasingly been implementing virtualisation in order to take advantage of the benefits and flexibility of the technology. But IT groups supporting SMBs tend to have only a few staff members, most of whom are generalists with no specific expertise in server virtualisation. This lack of resources and expertise leads to particular challenges, especially in backup and disaster recovery.
Download this now


Exchange Disaster Recovery - Protecting Exchange in a Virtual Environment
By Quest Software | 6/9/2011
Creating and implementing a data protection and disaster recovery (D/R) strategy enables you to protect your organization’s data against loss, recover it quickly in the event of a disaster, and comply with regulations and corporate policies. This document explains how to develop a D/R strategy and how to protect and recover Exchange data, and also discusses how an archiving solution can complement your D/R strategy.
Download this now

Latest News Articles

Most Popular Articles

Follow Us

GGG Evaluation Team

Kathy Cassidy

STYLISTIC Q702

First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.

Anthony Grifoni

STYLISTIC Q572

For work use, Microsoft Word and Excel programs pre-installed on the device are adequate for preparing short documents.

Steph Mundell

LIFEBOOK UH574

The Fujitsu LifeBook UH574 allowed for great mobility without being obnoxiously heavy or clunky. Its twelve hours of battery life did not disappoint.

Andrew Mitsi

STYLISTIC Q702

The screen was particularly good. It is bright and visible from most angles, however heat is an issue, particularly around the Windows button on the front, and on the back where the battery housing is located.

Simon Harriott

STYLISTIC Q702

My first impression after unboxing the Q702 is that it is a nice looking unit. Styling is somewhat minimalist but very effective. The tablet part, once detached, has a nice weight, and no buttons or switches are located in awkward or intrusive positions.

Resources

Best Deals on GoodGearGuide

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?