A Disaster Recovery Plan covers the data, hardware and software critical for a business to restart operations in the event of a natural or human-caused disaster. It should also include plans for coping with the unexpected or sudden loss of key personnel.
Case Study Published By: GlobalSCAPE
Published Date: Jan 08, 2008
Williams Lea is a leading global provider of customized corporate information solutions. The company needed to reliably, easily and securely transfer sensitive files and implement a system to share files and ensure a business continuity/disaster recovery plan. Today, Williams Lea uses the GlobalSCAPE’s Enhanced File Transfer (EFT) solution to provide secure protocol support and encryption to protect data in transit and at rest.
White Paper Published By: GlobalSCAPE
Published Date: Jan 08, 2008
Disaster can strike when you least expect it. So how do you back up and maintain control of your data and still provide access to data in a distributed organization? The challenges are clear...large and growing amounts of data need to be distributed across many sites yet complications such as bandwidth usage, file coherence, version consistency, and file latency all result in lost productivity.
White Paper Published By: Astrocom
Published Date: Dec 13, 2007
Enterprises with mission critical applications are exploring the benefits of disaster recovery sites for their data centers to ensure business continuity. Special network technology is needed to ensure that site failover and failback occurs reliably and predictably. An ideal solution should provide reliable network connections, manage inbound and outbound traffic over multiple WAN links, failover to a secondary data center if all links at the primary data center are down, and eliminate deployment barriers and costs of multi-homing with BGP (Border Gateway Protocol).
For mission-critical IT, service outages and data loss pose serious consequences. This white paper examines how availability management, disaster recovery and business continuity support one another and offers insight to find success at all of them.
Case Study Published By: SWsoft
Published Date: Dec 12, 2006
When Katrina hit in 2005, Murphy Exploration and Production Company, USA was among the many companies impacted by the devastation. Challenged to implement a new infrastructure quickly with more business continuity considerations, Murphy deployed Virtuozzo across its server infrastructure.
White Paper Published By: Cisco
Published Date: May 15, 2015
NSS Labs performed an independent test of the Cisco FirePOWER 8350 v5.3. The product was subjected to thorough testing at the NSS facility in Austin, Texas, based on the Next Generation Firewall (NGFW) methodology v5.4 available on www.nsslabs.com. This test was conducted free of charge and NSS did not receive any compensation in return for Cisco’s participation.
White Paper Published By: McAfee
Published Date: Jan 20, 2015
Advanced persistent threats (APTs) have been central to network security discussions in the past few years, with many organizations implementing new solutions to protect themselves from this determined type of malware. Yet, cybercriminals continue to be effective in penetrating the network defenses of even the strongest security systems, including some very high-profile enterprises. One of the dirty little secret weapons hackers use to bypass security systems and penetrate even the most locked-down networks are advanced evasion techniques (AETs). While AETs are not a secret among the hacking community—where they are well known and have been in widespread use for several years—there are misunderstandings, misinterpretation, and ineffective safeguards in use by the security experts charged with blocking AETs.
Case Study Published By: Websense
Published Date: Feb 26, 2013
Miercom conducted an independent third-party validation of the Websense TRITON Web Security Gateway Anywhere (WSGA) version 7.7.3, with comparisons to several major competitive products evaluated in this review.