Hi [[ session.user.profile.firstName ]]

Backup and Recovery

  • Date
  • Rating
  • Views
  • How to Limit Damage from Cyber Attacks with BCDR & SDS
    How to Limit Damage from Cyber Attacks with BCDR & SDS Garry Carpenter Recorded: Jun 7 2018 21 mins
    Join us for this 45 minute webinar on 7th June at 10am UK that will ensure that your Business is Seamlessly Up and Running in Minutes. Understand how Ultimate Damage Limitation for Cyber-Attacks is Achieved through Business Continuity within Software-Defined Storage.

    Reasons to attend:

    Severity of cyber-attacks are judged by the length of time critical systems, data and applications are down. The ability to have a Business Continuity and Disaster Recovery enabled infrastructure mitigates the risk, offering zero downtime, zero Recovery Point Objective, and seamless rollback in time to the point before the attack hits.

    Joining the webinar equips you with 3 essential skills for damage limitation:

    Learn how to:

    * Implement multi layered protection that offers
    * Achieve additional resiliency with disaster recovery to the Cloud and 3rd Site
    * Rollback to the point immediately before the attack

    Your host for the meeting, Garry Carpenter has immersed himself in all things business continuity for the past few decades and is one of the leading UK authorities in the field.
  • What’s Next in Storage: Analysts and Experts Share their Predictions
    What’s Next in Storage: Analysts and Experts Share their Predictions Greg McSorley, SNIA Technical Council (non-voting); Rick Kutcipal, President, STA; Don Jeanette of TRENDFOCUS Recorded: May 2 2018 43 mins
    You won’t want to miss the opportunity to hear leading data storage experts provide their insights on prominent technologies that are shaping the market. With the exponential rise in demand for high capacity and secured storage systems, it’s critical to understand the key factors influencing adoption and where the highest growth is expected. From SSDs and HDDs to storage interfaces and NAND devices, get the latest information you need to shape key strategic directions and remain competitive.
  • FCIP (Extension): Data Protection and Business Continuity
    FCIP (Extension): Data Protection and Business Continuity Rupin Mohan, Director R&D, SAN Chief Technologist, HPE, Mark Detrick, Director, Extension Principal Architect, Brocade Recorded: Dec 7 2017 59 mins
    Businesses today rely heavily on their data. Disaster may strike anywhere and occurs in many shapes and sizes. Transporting data over significant distance beyond the reach of a threatening event preserves data so organizations can rapidly recover in the event of a site going down.

    This makes deploying a disaster recovery infrastructure between data centers with fast, continuous, and easy replication of mission-critical data to anywhere in the world essential.
    Fibre Channel over IP (FCIP), often referred to as “Extension,” is used to connect SANs across distance using IP networks. FCIP is commonly used for Remote Data Replication (RDR) between Enterprise Storage Arrays and Remote Tape applications, for the purpose of Business Continuance via Disaster Recovery (BC/DR).

    Join storage technology and industry experts as they discuss their experience and deployment knowledge in:

    •Best known methods for deployment with extension architectures, extension in routed topologies, and performance optimization for remote replication
    •Industry best practices: topologies to achieve high-availability goals, advantages in trunking, encryption, etc…
    •Customer examples and use cases of a variety of critical production environments ranging from SMBs to the largest most demanding enterprises and government institutions

    After you watch the webcast, check out our Q&A blog: http://fibrechannel.org/fcip-extension-questions-and-their-answers/
  • How Can the Concept of Secure Content Management Help You Align Information Gove
    How Can the Concept of Secure Content Management Help You Align Information Gove Rich Lauwers, HPE Recorded: Sep 29 2016 41 mins
    Join this interactive webinar to see how you can leverage the concept of secure content management to support privacy and information security transparently within your information governance program. You will also learn how the need for security, business continuity and data protection be balanced with collaboration and productivity expectations to successfully deliver the desired business outcomes for your stakeholders and customers. There will be opportunity throughout the session to share your thoughts, experiences and answer any questions.
  • IT Security: Incident Planning and Response
    IT Security: Incident Planning and Response Mark Essayian, Microsoft Recorded: Jun 16 2016 59 mins
    It’s critical to know what is going on inside your network, what technology is being snuck into your firm, and how to educate employees about security precautions. IT management has a clear responsibility to protect, defend and remain vigilant over all systems and it doesn’t stop at antivirus on the desktop and a firewall to the Internet.

    Join this webcast to learn:
    •Why SMB’s are a prime target
    •How to help prevent your employees from being your biggest security threat
    •Proper asset inventory – you cannot protect what you do not know about
    •Protection and planning to prevent and/or mitigate a breach
  • Transforming Data Protection with HPE: A Unified Backup and Recovery
    Transforming Data Protection with HPE: A Unified Backup and Recovery Julita Kussmaul, Mike Whalen Recorded: Jun 16 2016 57 mins
    Under pressure from demanding applications, increased virtualization and a proliferation of mobile devices, IT organizations are looking for a highly-available, resilient and performant data protection environment that ensures business resiliency and efficiency. However, sourcing products from multiple vendors is costly and can create management complexity that will deter you from deriving maximum value from your infrastructure. Instead, consider a single stack, integrated software and hardware backup solution.

    Join HPE data protection experts to learn why more organizations are moving away from fragmented point based solutions to HPE’s unified data protection solutions, and how HPE Data Protector, through native integrations with HPE StoreOnce Systems, HPE 3PAR StoreServ, and HPE StoreEver (Tape) offerings, can provide you with advanced capabilities that accelerate the backup process in a cost-efficient, scalable way.
  • A DNA-based Archival Storage System
    A DNA-based Archival Storage System Luis Henrique Ceze, University of Washington Recorded: Jun 13 2016 37 mins
    Demand for data storage is growing exponentially, but the capacity of existing storage media is not keeping up. Using DNA to archive data is an attractive possibility because it is extremely dense, with a raw limit of 1 exabyte/mm3 (10^9 GB/mm3), and long-lasting, with observed half-life of over 500 years.

    This work presents an architecture for a DNA-based archival storage system. It is structured as a key-value store, and leverages common biochemical techniques to provide random access. We also propose a new encoding scheme that offers controllable redundancy, trading off reliability for density. We demonstrate feasibility, random access, and robustness of the proposed encoding with wet lab experiments. Finally, we highlight trends in biotechnology that indicate the impending practicality of DNA storage.
  • Managing Vendor Resiliency Through Audits and Contract Management
    Managing Vendor Resiliency Through Audits and Contract Management Melinda Rahe, Business Continuity Program Manager Dell, Inc. Recorded: May 19 2016 43 mins
    Outsourcing shifts the burden to mitigate risk to the vendor. But, it does not shift the impact of the risk. Your company’s reputation and its’ customers can be negatively impacted when your vendor experiences failure.
    This presentation discusses how to formulate a vendor resiliency strategy. And, will equip participants with practical solutions for effectively, as well as efficiently, assessing the business continuity risk exposures introduced by outsourcing business functions
  • Playing a Dangerous DR Game? Take Your DR and Backup Plan to the Next Level
    Playing a Dangerous DR Game? Take Your DR and Backup Plan to the Next Level Lilac Schoenbeck, VP of Product Management & Marketing and Dante Orsini, SVP of Business Development Recorded: May 18 2016 54 mins
    Whether your nemesis is a malicious attack, a hurricane or (more likely) human error, have you collected all the tools you need to triumph and save the day?

    There are a host of technologies available to those prepping for potential business disruptions: backups on-premise, backups in the cloud, on-premise failovers, Disaster Recovery as a Service, and, of course, delivering an offering of cable and silicon to your mainframe every Tuesday at noon.

    Obviously, you don’t need all of these options – but which do you need? And why would you choose one over the other? Join this webinar to learn:
    - What has changed since your tried-and-true backup plan was hatched in 2010
    - How to evaluate on-premise vs. cloud-based options
    - How to marry different technologies to create a complete solution
    - What to consider when selecting a technology or cloud partner

    With 10 years of experience leading the DRaaS and Backup market around the world, we’ve seen a lot of technologies come and go – and have some strong opinions and solid guidance for our customers on how best to evaluate options.
  • New Rules for Recovery: Setting Expectations for Today's Continuity Platforms
    New Rules for Recovery: Setting Expectations for Today's Continuity Platforms Jim Whalen, Taneja Group; Dave LeClair, Unitrends Recorded: May 4 2016 47 mins
    Traditionally, when people talk about data protection, they’re talking about some form of backup. However, if those backups effectively end up in a “write-only memory”, they’re not much good. So really, the bottom line is recovery is what people are most concerned about when they talk about data protection. With the degree to which today’s technologies have been refined and the plethora of data protection platforms available, users should maintain a baseline set of simple expectations to be met no matter who or what they choose for the job. In this presentation, Taneja Group and Dave LeClair of Unitrends will discuss the “New Rules for Recovery” that everyone’s solution should adhere to.

Embed in website or blog