> Technology > Security > Business Continuity
 

Business Continuity

Business Continuity Planning (BCP) is a methodology used to create a plan for how an organization will resume partially or completely interrupted critical function(s) within a predetermined time after a disaster or disruption. BCP may be a part of a larger organizational effort to reduce operational risk associated with poor information security controls, and thus has a number of overlaps with the practice of risk management.
Results 1 - 25 of 305Sort Results By:Published Date | Title | Company Name
White Paper Published By: Digital Realty     Published Date: Feb 22, 2018
A new white paper from Digital Realty shows how to improve hybrid cloud computing performance and ramp up agility, security and reliability through its Service Exchange product.
Tags : 
digital realty, cloud computing, network performance, cloud performance, hybrid cloud
    
Digital Realty
Free Offer Published By: ThousandEyes     Published Date: Jan 14, 2018
ThousandEyes integrates monitoring and visualization of device health, end-to-end network paths and the performance of your internally hosted and cloud applications in one place. Identify critical dependencies in your internal network and monitor how device health impacts application performance.
Tags : 
thousandeyes, device management, network devices, cloud applications, network monitoring
    
ThousandEyes
White Paper Published By: ThousandEyes     Published Date: Jan 14, 2018
Read how Network Intelligence equips your team to deliver predictable digital experience in the cloud era.
Tags : 
thousandeyes, network intelligence, business application, application performance management, cloud applications
    
ThousandEyes
White Paper Published By: NodeSource     Published Date: Nov 10, 2017
Digital transformation is “the use of technology to radically improve performance or (business) reach. But for digital-native businesses that have never needed to make that shift — e-commerce, social media, web-based services — it involves a sharpening of that focus combined with an ongoing evolution of process and infrastructure.
Tags : 
nodesource, xml, software development, digital transformation, open source
    
NodeSource
White Paper Published By: FTI Consulting     Published Date: Mar 03, 2017
2016: The year in crisis provides The Economist Intelligence Unit’s assessment of sources of corporate risk in the year 2016, its evolution over the next three years, and a perspective on the role of the board of directors in managing crises.
Tags : 
fti, fti consulting, crisis management, corporate risk, cyber attacks
    
FTI Consulting
White Paper Published By: SAS     Published Date: Mar 31, 2016
Digitization creates major opportunities for financial services – automating operations, expanding channels, delivering engaging customer experiences.
Tags : 
analytics, financial services, operations, digital management, data
    
SAS
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
This white paper from Citrix provides a checklist to follow to ensure your company can embrace enterprise mobility securely.
Tags : 
citrix, enterprise, mobile, network management, network security
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
In this white paper, the experiences of four Citrix customers illustrate key use cases for Citrix XenMobile, the most complete enterprise mobility management solution, and the business value it delivers.
Tags : 
citrix, enterprise, mobility, business continuity, best practices
    
Citrix Systems, Inc.
White Paper Published By: Citrix Systems, Inc.     Published Date: Jan 27, 2016
Future workplace structures are envisioned to be a scenario wherein employees are likely to use a multitude of connected mobile devices and apps that will offer compelling new work style experiences integrating voice, video and data access services.
Tags : 
citrix, frost & sullivan, next-gen, enterprise, infrastructure
    
Citrix Systems, Inc.
White Paper Published By: Thawte     Published Date: Dec 29, 2015
This white paper presents a brief history of cryptography and how encryption-related technologies have evolved and will continue to evolve as well as the measures Internet users should consider when implementing modern encryptions.
Tags : 
cryptography, encryption, security, business continuity, ssl
    
Thawte
White Paper Published By: Thawte     Published Date: Dec 29, 2015
With the ever-changing advances in technology and the internet, it is imperative that you stay on top of the latest security measures at your institution to protect sensitive data.
Tags : 
tech, education, security, protect, data
    
Thawte
White Paper Published By: Thawte     Published Date: Dec 29, 2015
In this guide we examine the importance of Apache-SSL and who needs an SSL certificate.
Tags : 
security, apache, web server, digital certificate, business continuity
    
Thawte
White Paper Published By: Thawte     Published Date: Dec 29, 2015
Learn how you can build customer confidence around Internet security.
Tags : 
security, internet, web server, customer confidence, business continuity
    
Thawte
White Paper Published By: Thawte     Published Date: Dec 29, 2015
SSL certificates don’t range from ‘insecure’ to ‘secure’, but they do differ in the level of confidence they inspire in online visitors.
Tags : 
ssl, validation, confidence, business continuity, identity management
    
Thawte
White Paper Published By: IBM     Published Date: Sep 30, 2015
Big data analytics to help better protect and secure.
Tags : 
healthcare, enterprise, security, data, business continuity
    
IBM
White Paper Published By: Cisco     Published Date: Sep 16, 2015
Big data into manageable components.
Tags : 
big data, data platform, ioe, analytics, business continuity
    
Cisco
White Paper Published By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
In today’s globalized business environment, the need to build strong relationships with partners, suppliers, internal teams, investors and customers is more important than ever. High-quality video conference calls enable you to communicate as effectively as actually being there in person, helping you to build the engaging relationships needed for success in business.
Tags : 
video conferencing, speed, competitive advantage, scale, business continuity
    
LifeSize, a division of Logitech
White Paper Published By: LifeSize, a division of Logitech     Published Date: Sep 08, 2015
Sure, ROI calculators help distill anecdotal evidence and analyze cost savings associated with travel, but it usually goes something like this: total hours spent traveling + cost of hotel, rental car, and food divided by the number of meeting hours. Well, at least that’s one version. No matter the final number, the ROI total savings on cost of travel is only part of the story. Calculating the true ROI of video conferencing combines facts with real-life tangibles to help you understand and quantify your investment.
Tags : 
roi, video conferencing, communication, travel costs, meetings
    
LifeSize, a division of Logitech
White Paper Published By: Cisco     Published Date: Aug 27, 2015
Magic Quadrant report looking specifically at on-premises unified communications requirements for midsize organizations with 100 to 999 employees.
Tags : 
unified communications, midsize enterprise, uc solutions, productivity, business process
    
Cisco
White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
Protect against advanced attacks.
Tags : 
threat, data, security, it management, budget
    
Vectra Networks
White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
Recently, Kasperky Labs disclosed that it was the victim of a sophisticated cyber attack, which they have named Duqu 2.0. The team at Kaspersky Labs has published a detailed analysis of Duqu 2.0 and it’s definitely worth a read.
Tags : 
cyber attack, protection, security, network, business continuity
    
Vectra Networks
White Paper Published By: Vectra Networks     Published Date: Aug 03, 2015
Organizations invest heavily to block advanced attacks, on both endpoints and networks. Despite all this investment, devices continue to be compromised in increasing numbers and high-profile breaches continue unabated. Something doesn’t add up. It comes down to psychology: security practitioners want to believe the latest shiny widget for preventing compromise will finally work and stop the pain.
Tags : 
data, security, threats, protection, advanced threat
    
Vectra Networks
White Paper Published By: IBM     Published Date: Jul 31, 2015
Manage identities and access.
Tags : 
management, risk, continuous compliance, access control, business continuity
    
IBM
White Paper Published By: IBM     Published Date: Jul 31, 2015
Guide to security intelligence.
Tags : 
security, data, application security, business continuity, compliance
    
IBM
White Paper Published By: IBM     Published Date: Jul 31, 2015
Optimize the process of investigating and gathering evidence.
Tags : 
data, security, threats, protection, business continuity
    
IBM
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.