Data Replication refers to a data storage and backup strategy that copies data from a host computer to another computer, which may or may not be at a remote location. Replication over a computer network can make data backup entirely independent of local data center physical storage.
White Paper Published By: Doyenz
Published Date: Jul 14, 2011
The July 2011 publication of the IDC Vendor Spotlight paper, "Recovery in the Cloud", sponsored by Doyenz, focuses on trends and technologies in advanced storage services. Specifically, the report notes that the ability to restart applications on alternate resources and the ability to access production data are critical to restarting business services. Download the report to learn more about both market trends impacting business continuity and cloud services as well as the benefits of advanced storage services.
For IT departments looking to bring their AIX environments up to the next step in data protection, IBM’s PowerHA (HACMP) connects multiple servers to shared storage via clustering. This offers automatic recovery of applications and system resources if a failure occurs with the primary server.
Journaling is a powerful feature, one that IBM has continued to develop and improve over the years. Yet, depending upon your business requirements, you probably still need more protection against downtime than journaling alone can provide. This white paper will cover what you need to know about journaling, what it can do and how it supports and cooperates with high availability software.
This white paper provides a basic understanding of the building blocks of IT and business continuity—from understanding the concepts of disaster recovery and information availability to calculating the business impact of downtime and selecting the right software solution.
This paper presents an overview of iSeries high availability to companies that are beginning to explore this powerful business continuity technology. The critical components of high availability solutions are detailed in this paper, including data replication engines, system monitors, role swap capabilities, and the importance of autonomic processes.
Case Study Published By: Zerto
Published Date: May 31, 2016
Download this case study today to learn more about how ARA was able to complete a datacenter migration in a compressed window, and how they continue to use ZVR to deliver aggressive service levels across their infrastructure with a product that is very easy to use.
The Dyre family of banking malware is back in the news after researchers recently observed that the malware incorporated tricks to avoid detection in malware sandboxes. Previously, Dyre was most notable for targeting high value bank accounts, including business accounts, and incorporating sophisticated social engineering components to overcome the 2-factor authentication used by most banks.
Recent research from Kaspersky has revealed a massive criminal campaign that was able to infiltrate more than 100 different banks and steal upwards of $1 billion from the affected institutions. Kaspersky dubbed this operation the Carbanak APT due to a connection between the malware used in the attacks and the now infamous Carberp banking botnet. You may recall the headlines in 2013 that revealed the Carberp source code had been leaked into the wild, making it accessible to virtually any would-be criminal group that may want it. The accessibility of Carberp source code could easily have provided a starting point for the Carbanak as they built their malware.
White Paper Published By: IBM
Published Date: May 12, 2015
Cleversafe commissioned Forrester Consulting to conduct a Total Economic Impact™ (TEI) study and examine the potential return on investment (ROI) that enterprises may realize by using Cleversafe object storage.
White Paper Published By: UK2 Group
Published Date: Apr 27, 2015
In this white paper, we’ll explore the difference between two different approaches and highlight where and how dedicated servers can not only give you better performance, reliability, control and security, but can be just as attractive as cloud in terms of both flexibility and cost efficiency.
Learn how a Cloudant account can be hosted within a multi-tenant Cloudant cluster, or on a single-tenant cluster running on dedicated hardware hosted within a top-tier cloud provider like Rackspace or IBM SoftLayer.
Case Study Published By: Mimecast
Published Date: Oct 17, 2013
Mimecast commissioned Forrester Consulting to examine the total economic impact and potential return on investment (ROI) global enterprises may realize by using Mimecast’s Unified Email Management (UEM) solution. The purpose of this study is to provide readers with a framework to evaluate the potential financial impact of the full Mimecast UEM service on their organizations. Mimecast UEM is a suite of email security, archiving, and continuity services, which can also be purchased separately if required.
Discover how to accelerate database performance, handle change and growth in scalable, incremental steps, and deliver mission-critical data availability and protection with this unique commercial solution.
In this paper, we highlight the features necessary to move beyond server virtualization by leveraging key integration capabilities between IT components, with a particular focus on the role that storage plays in the evolution of the data center.
Case Study Published By: Silver Peak
Published Date: Feb 12, 2013
When faced with their EqualLogic replication not completing due to limited WAN bandwidth and consistently missing their RPO, ZLTO needed a solution. Learn how Silver Peak’s virtual appliances reduced their bandwidth used for replication by 86%.
White Paper Published By: EVault Inc.
Published Date: Aug 22, 2012
Learn best practices for guarding your endpoint corporate data so you can mitigate the risk of regulatory and financial exposure, and more.
This white paper explores:
. Defining security policies for endpoint backup and recovery
. Enforcing endpoint controls
. Ensuring employee adoption
. Keeping IT costs in check
White Paper Published By: EVault Inc.
Published Date: Aug 22, 2012
Go hybrid and get the best of both data protection worlds. Cloud-connected backup and recovery seamlessly combines cloud-based and onsite data protection technologies for fast, local restores and ensured, offsite disaster recovery.
Read the white paper to:
. Discover the benefits of transitioning from tape to disk
. Learn how to get shorter backup windows and faster recovery times
. Ensure your data is totally secure and easily recovered
White Paper Published By: SunGard
Published Date: Aug 14, 2012
Florida Hospital performs recovery tests twice a year, recovering more than 100 applications. The healthcare organization needed a recovery strategy that improved communication and efficiency, managed a complex change control process, and that would keep staff at home during a disaster.
With the Managed Recovery Program, SunGard is Florida Hospital's recovery team, ensuring recovery configurations keep pace with production changes, managing recovery test execution, and providing a single point of contact for the complete recovery program.
White Paper Published By: HP and Intel
Published Date: Aug 13, 2012
This DCIG report details how HP 3PAR F-class midrange arrays provide enhanced levels of VMware integration and optimized virtual machine density so users experience levels of VMware efficiency, performance and visibility well beyond what other midrange arrays natively provide.
White Paper Published By: Intel Corp.
Published Date: Aug 08, 2012
The report outlines the benefits of using HP StoreOnce with NetBackup's integrated Network Data Management Protocol (NDMP) backup capabilities to enhance administrators' abilities to effectively manage NDMP-enabled NAS server backup and recovery.