ComputerWeekly.com Research Library

Powered by Bitpipe.com

Disaster Planning Multimedia

  • Understanding Recovery Readiness in a Not-So-Ready World.

    Sponsored by: Commvault

    Having a recovery readiness strategy in place allows you to combat complexity with a complete recovery readiness approach. Access this webcast to learn the 3 elements of recovery readiness and to see how AI and ML are changing the backup landscape forever.

  • Cloud Disaster Recovery: A Survival Guide by the University of Canberra

    Sponsored by: Commvault

    By choosing a DR backup solution that automatically uploaded data daily and secures it for long-term retention, The University of Canberra could be sure that their data was safe in the event of a disaster. Watch this webcast to learn more about the solution that Canberra chose and the 5 transformational benefits it created.

  • Disaster Recovery as a Service: An Overview

    Sponsored by: Comport Consulting

    Watch this video to learn how cloud-based disaster recovery as a service (DRaaS) is helping organizations achieve resilient, simple, and affordable DR.

  • Modern Data Protection: Why Backup Alone Is Not Enough

    Sponsored by: Comport Consulting

    This white paper introduces one method of unifying data protection across your on-prem and offsite environments: Disaster Recovery as a Service (DRaaS). Read on to view 10 tangible benefits of DRaaS and for guidance on properly protecting all your workloads.

  • iSEEK Case Study

    Sponsored by: Schneider Electric

    Learn how Queensland, Australia-based iSEEK ensured their enterprise-class data center was constructed to survive any natural disaster in a slice of the country renowned for its destructive cyclone season.

  • Reintroducing Tape to the Disaster Recovery Process

    Sponsored by: Fujifilm Recording Media USA, Inc.

    Join George Crump, Lead Analyst at Storage Switzerland, as he breaks down 4 tactical advantages of using tape for Tier 3 and file data recovery, including power and cooling cost reductions and the ability to save 80% of the disk backup capacity you would normally have used.

  • Top 10 Enterprise Restore Scenarios for Enterprises

    Sponsored by: Veeam Software

    Join us, as two experts not only guide you through the top 10 restore scenarios, they will also demonstrate how to bring your applications up faster. Subjects covered in the hour are guest file-level-recovery scenarios, including restore from a replica/restore to Windows VM/restore to Linux VM, and more.

  • Podcast: Avoid the Data Apocalypse: Mitigating and Minimizing Data Disasters

    Sponsored by: Commvault

    This podcast delivers advice and insight from two experts in the field regarding the biggest challenges to data protection today such as VM sprawl and tips on how to handle them.

  • Endpoint Backup & Restore: Protect Everyone, Everywhere

    Sponsored by: Code42

    Access now and watch Arek Sokol from the bleeding-edge IT team at Genentech/Roche explain how he leverages cross-platform enterprise endpoint backup in the public cloud as part of his company's global, "100% virtual" strategy.

  • Focused IT Compliance at Barnabas Health

    Sponsored by: Symantec Corporation

    In this webcast, Barnabas Health leaders share their experience with an always-on compliance management solution that simplified administrative, policy, and risk management.

  • SharePoint Object Recovery

    Sponsored by: PHD Virtual

    Watch this webcast that highlights a recovery tool and draws out the steps you need to take to execute a granular level of restoration, including the recovery of lists, libraries and folders on SharePoint.

  • PHD Virtual RTA Tool

    Sponsored by: PHD Virtual

    This webcast provides information on a virtual Recovery time Actual (RTA) tool that will help you accurately calculate RTOs. Find out how your organization can achieve this goal (hint: no install is needed, just somewhere to run the executable).

  • Butler County’s Iron Mountain Houses Some of U.S.’s Most Amazing, Priceless Treasures

    Sponsored by: Iron Mountain

    This news story describes why Iron Mountain's Butler County, Pennsylvania data center facility is ideal for storing and preserving your business-critical data. Learn why this facility is trusted to securely store everything from the original prints of classic movies to a huge variety of documents and records.

  • Welcome to Iron Mountain’s National Data Center

    Sponsored by: Iron Mountain

    This brief video provides an overview of Iron Mountain's National Data Center, one of the most secure data center complexes in the world, and reveals key benefits of this strategy.

  • IBM SmartCloud Virtualized Server Recovery

    Sponsored by: IBM

    This short video explores a disaster recovery solution that can help you improve recovery times for apps running on both virtualized and traditional servers.

  • FalconStor® RecoverTrac™: Fully Automated Disaster Recovery

    Sponsored by: FalconStor Software

    This two-minute video details the features and benefits FalconStor's award-winning RecoverTrac DR technology can provide your company, including: improved productivity, increased profitability and fully automated data recovery when disaster strikes.

  • Rapid Recovery - Maintaining Operations after the 2011 Japan Earthquake and Tsunami

    Sponsored by: Dell Software

    In this informative webcast, learn the critical need for true Continuous Data Protection (CDP). Then, see how CMC Markets – a financial services organization with an office in Tokyo – relied on CDP servers to maintain operations after the devastating earthquake and tsunami that struck Japan in March 2011.

  • Major Healthcare Provider Protects Against Natural Disasters and Ensures 24/7 Desktop Access with AppSense

    Sponsored by: AppSense

    This video discusses the benefits of desktop virtualization for a number of reasons including its ability to allow employees to access their desktop from anywhere and to ease virtual IT support.

  • Webcast: Active Directory Recovery with Windows Server 2008 R2

    Sponsored by: Dell Software

    In this new Quest on-demand webcast, get a peek at the Active Directory Recycle Bin in action. Then, find out how a powerful third-party solution simplifies the entire recovery process to not only quickly and easily restore deleted objects, but to roll back attributes too.

  • Replay 4 Backup and Disaster Recovery Software for Windows Application Servers

    Sponsored by: AppAssure Software, Inc.

    Replay 4 completely eliminates backup windows by taking continuous snapshots of your Windows application servers, with just a 1-2% performance hit.  Recover from any server outage in 15 minutes or less and use 80% less storage space for your backups.

  • Video: Oracle Active Data Guard

    Sponsored by: Oracle Corporation

    Watch this brief video for an informative explanation of how Oracle Active Data Guard makes better use of the standby database to complement the functionality of the production database and significantly increase software and hardware return on investment.

  • CA ARCserve Backup r12.5 Disaster Recovery

    Sponsored by: arcserve

    Check out this demonstration for an explanation of CA ARCserve Backup r12.5 disaster recovery tools. This video offers detailed instructions on this solution's functionality.

  • Consolidate and Simplify Backup and Recovery for Your VMware Environment

    Sponsored by: EMC Backup and Recovery Solutions

    In this webcast you will learn about this powerful solution, hear about specific deployments and the resulting benefits.

  • Best Practices for Backup and Recovery

    Sponsored by: Symantec Corporation

    Check out this Symantec webcast discussing best practices for backup and recovery

  • Key Steps to Securing Your Organization and Evicting a Hacker

    Sponsored by: Foundstone, Inc.

    This podcast will tech you key steps for getting your company back on track after a security breach. It discusses effective measures that can be put into place, and how to take a proactive approach in securing your company against malicious attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.