Business Continuity / Disaster Recovery

Community information
The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
  • With an ever-changing IT landscape and growing business demands, it’s time to expect more from your enterprise software. Dell Software delivers integrated, end-to-end solutions that simplify IT management while mitigating risks and accelerating results. Thanks to Dell Software, your workday is more efficient, and ends when it should – giving you the time to do the things you love.
  • Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
  • With the increased regulation and scrutiny of the past decade, it is important for organizations to implement best practices in order to maintain control and achieve compliance with evolving regulatory requirements.

    Compliance teams of the brave new world are set up to discuss risks with the key business leaders, and have sufficient resources to ensure company compliance programs are implemented effectively. Their software applications for managing enterprise governance, risk management, and compliance (eGRC) continue to mature with impressive features and functions, and they are making notable strategic advances by linking these three business functions for more informed decision-making, to reduce risk exposure, lower audit costs, and demonstrate compliance.

    To replicate similar success in your eGRC program, you will need to focus on selling GRC value, practicing good GRC project management, and embedding GRC into corporate culture. Join this educational panel webinar as our experts delve deeper into this, and identify the best practices for implementing an eGRC program in 2015.
  • With companies adopting SaaS applications more rapidly than ever before, the risk of cloud data loss has also risen. As many as 40% of companies that use cloud based applications have reported data loss since 2013, according to reports from the Aberdeen group and Symantec – but until cloud data disasters hit home, businesses tend not to prioritize cloud data backup.

    In this BrightTALK-exclusive webinar, you’ll learn about the biggest cloud data losses of the year, and how to make sure they don’t happen in your organization.
  • ISO 31000 was published as a standard on the 13th of November 2009, and provides a standard on the implementation of risk management. A revised and harmonised ISO/IEC Guide 73 was published at the same time. The purpose of ISO 31000:2009 is to be applicable and adaptable for "any public, private or community enterprise, association, group or individual."[3] Accordingly, the general scope of ISO 31000 - as a family of risk management standards - is not developed for a particular industry group, management system or subject matter field in mind, rather to provide best practice structure and guidance to all operations concerned with risk management.
  • If there is one thing that can be said about the threat landscape, and cybersecurity as a whole, it is that the only constant is change. This can clearly be seen in 2014: a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code than in previous years.
    Join us on 26th May, at 10:00 - 10:45 to understand the growing threat landscape and how this affects your business.
    On this webcast we will cover;
    •The main security challenges and trends in 2014
    •Highlight how threats operate to allow you to better informed
    •Key takeaways for executive / functional leaders
  • Join us for a fast-paced and informative 30-minute webinar in which the Taneja Group will talk with David Bailey about how he was able to store over 10 billion files. We will discuss with David how he was able to design a 10 Billion file storage system, who is using systems of this size, how he tracks the analytics for a system this large and what this means for the datacenter. David works for Qumulo, a leader in “data-aware” storage systems. Data-aware systems have real-time analytics that enable users to instantly obtain information about data and how it is being used. Attendees will be encouraged to submit their questions during the session.
  • This webinar will go through 10 proven ways to assure your business can be resilient to any sort of downtime event including disaster recovery as a service, instant recovery, recovery assurance, archiving, and other best practices.
  • Watch this EMC Tech Talk recorded on Thursday, May 21st!

    Are you looking to design an in-house infrastructure that delivers the flexibility, and scalability of today’s cloud based IaaS solutions to your end-users while also satisfying the demands of today’s high-performance applications? Would you like to learn about a technology that can help you leverage commodity servers and storage devices to deliver a software defined converged infrastructure solution that can scale to cost-effectively meet your most demanding performance requirements?

    By watching you’ll learn the answers to these questions and more as ESG introduces the challenges, technologies and trends associated with delivering scale-out solutions.

    Watch this Tech Talk to:
    - Get a ScaleIO Overview
    -Learn about the lab validation findings with ESG
  • Cloud computing has broken down traditional geographic borders, and defining data ‘location’ has become more complex. Global enterprises embracing the cloud must deal with the compliance and risk challenges that arise when information is distributed across multiple physical, logical, and legal locations.

    Join our guest Holger Mueller, Vice President and Principal Analyst, Constellation Research, and Todd Partridge, Product Marketing Director, as they explore the challenges of information governance in the cloud:

    - The critical emerging topic of data sovereignty and jurisdiction
    - How governments are responding in different ways to the questions of data privacy and ownership
    - What organizations must do to address the varying requirements and regulatory environments
  • Organizations need to be more business-centric in their approach if data loss prevention is to be successful. By supplying McAfee Data Loss Prevention (DLP) with reliable insight into the meaning and value of data, Classifier complements the detection methods based on keywords and regular expressions alone, helping reduce the risk of data- loss.

    The combination of Boldon James Classifier and McAfee DLP reduces the likelihood of data loss by providing the DLP solution with predictable, meaningful classification metadata that greatly improves the reliability of DLP decision making, improves system effectiveness and reduces false positives.

    In this webinar we will explore:

    - The role of user-driven classification
    - How user-driven classification benefits DLP
    - When to introduce user-driven classification into a DLP project
    - How to measure and monitor the benefits of user-driven classification
  • Cloud. Convergence. Software-defined storage (SDS). What does it all really mean, and why should enterprise organizations care?

    Get a peek into the future with IDC’s Senior Research Analyst, Storage Systems Amita Potnis as she joins Seagate Chief Technology Evangelist David A. Chapa and Director, Global Alliance Partners Michael K. Connolly for a live webinar that will help you meet the challenges of storage now and into the future. Here’s some of what you’ll learn:

    -Top peer challenges, according to leading industry research
    -What the future holds for the competing data storage architectures
    -The difference between converged and hyper-converged infrastructures
    -Best and worst use case for SDS

    How can enterprises know what is right for their environments? What differentiates a converged infrastructure from a hyper-converged infrastructure? Find out at this webinar.
  • For disaster recovery (DR), you’ve outsourced or virtualized your network, infrastructure, applications and telephony system. Your data is stored in multiple, secure locations, and you’re safe from hurricanes, tornados and blackouts. But what about a pumpkin-spiced latte?

    The desktop is the most overlooked and vulnerable link in your disaster recovery plan. Whether a device is disabled from a coffee spill, a hardware failure, theft or vicious malware, the result is the same: your employee loses access to her desktop, primary lines of communication, and user data. Productivity comes to a grinding halt. One computer, with one access, can snowball into a local or a global problem. You’re only one desktop away from disaster.

    There is a solution: virtualize the desktop. Join Michael McCracken, Director, Professional Services at Hosting, and Steve Prather, CEO of Dizzion, on May 14th, 2015 for a revealing look at how top planners are now integrating Desktop as a Service (DaaS). This 45-minute webcast is ideal for IT leaders, business risk and compliance professionals, and disaster recovery / business continuity planners.

    Attendees will learn:
    • The basics of Disaster Recovery and accessibility of your data
    • How to extend your DR strategy all the way to the desktop
    • DaaS deployment best practices
  • What is HIPAA? What information is protected by HIPAA? Do we have to sign Business Associate Agreements with our vendors? All of these questions and more answered on this BrightTALK exclusive webinar, 8 HIPAA FAQs for Businesses. Join Carlo Tapia, Product Marketing Manager at eFolder, as he takes you through commonly asked questions, an overview of HIPAA, the costs associated with HIPAA violations, and how to protect sensitive patient health information. Business influencers and IT admins will appreciate this 45-minute introduction to the stringent regulations of HIPAA.
  • Hadoop clusters are often built around commodity storage, but architects now have a wide selection of Big Data storage choices. Hadoop clusters can use a mix of solid-state and spinning disk storage, while Hadoop compatibility layers and connectors can use enterprise storage systems or share storage between Hadoop and legacy applications.

    In this webinar, 451 Research Director Matt Aslett will review the storage options available to Hadoop architects and provide recommendations for each use case. WANdisco's Randy DeFauw will then present an active-active replication option that makes data available across multiple storage systems.
  • If you’ve ever felt alone with your data protection frustrations, this webcast will prove you’re not ― and that there are some simple, real-world strategies that’ll make your job a whole lot more enjoyable. We’ve put together a panel of IT professionals from a range of industries ― including a network engineer, an IT director and a CTO ― to share with you what worked for them, and what didn’t, when it comes to data protection. You’ll get to hear about the common struggles they shared and the best practices that empowered them to stop wasting time and energy on slow backup and recovery processes.

    By the end of this educational webcast, you’ll be able to:

    •Manage the gap between users who expect "always on" and the reality of system downtime.
    •Overcome the headache of administrative challenges.
    •Modernize your data protection strategy while keeping costs low and meeting requirements.
  • Join us in a series of fast-paced and informative 60-minute webinars on vSphere Virtual Volumes (VVol). In this session, the Taneja Group will talk with David Glynn from Dell Storage. VVols is packaged as a feature in nearly all VMware vSphere Editions and is being embraced by VMware’s storage partners at an unprecedented rate. IT professionals, especially those involved in datacenter operations, are showing great interest in implementing VVol in their own environments. The Taneja Group will discuss VVol technology with David and the impact this game-changing capability will have in the datacenter and how Dell is enabling this technology with their arrays. Attendees will be encouraged to submit their questions during the session.
  • Is Software Defined Storage (SDS) getting hijacked? It seems every vendor, old and new, is claiming that their storage is “software defined”. The original intent was to create software-only solutions that could be deployed on the customer’s choice of servers. But that original intent has evolved, and now hardware vendors are providing what they claim to be software defined storage solutions too. In addition, SDS is being combined with an embedded compute function to create hyper-converged solutions as well.

    In this webinar we will discuss the differences in these approaches and you will learn what the four key deliverables of a SDS solution should be so you can decide which makes the most sense for your organization.
  • The evolution of the distributed enterprise network and its ability to deliver for the brand has dramatically changed since 2000. In the past, telephone line infrastructure like V.90 modems were installed to simply process credit cards and the branch office was confined to local content advertising. Then, wired broadband WAN connectivity such as T1, DSL, Cable, and Metro Ethernet was introduced to the mass market, opening up new applications to reach customers. Additionally, the need for private network communications via wired WAN brought about the introduction of technologies like MPLS and Frame Relay networks. The combination of broadband-wired WAN performance, with private network capabilities, offered the brand the ability to provide more secured bandwidth to locations – but at a premium with a level of reliability that greatly varied depending on geography.

    Today, wireless broadband WAN connectivity is pervasive across North America and is the wave of the future. 4G/LTE has outpaced MPLS, Cable, DSL, and other means of traditional wired WAN networking at a fraction of the cost.


    Now, the ‘Store of the Future’ is here with cutting-edge technology offering Ethernet LAN connectivity over 4G/LTE wireless broadband. With dual active 4G LTE modems, wired Ethernet WAN connectivity, dual-band/dual-concurrent ac WiFi and enterprise-grade security - all in a consolidated, easy-to-manage platform, delivering a reliable and scalable broadband experience.

    The convergence of wired and wireless connectivity into a single platform reduces PCI scope, simplifies network complexity, and lowers the carbon footprint of your network; all while leveraging the cloud for remote management and best-in-breed security solutions.

    Join us for this webinar to learn about Ultimate Multi WAN DiversityTM, network cost-savings through cutting-edge technology, and how the ‘Store of the Future’ is here.
  • Join us to review the emerging risks for 2015 as executives facing an environment of unprecedented volatility: market conditions change rapidly and new risks continue to proliferate. To navigate the continually changing and complex risk environment,

    The webinar will be led by Ian Beale, Senior Director, CEB Risk
  • Symantec fournit chaque année une rapport sur les menaces et tendances de sécurité, grâce à la collecte inégalée de données partout dans le monde et à l’analyse effectuée par nos experts en cyber sécurité.
    Lors de ce webcast, Laurent Heslault, notre stratégiste sécurité, vous présentera les résultats mondiaux et pour la France de la 20ème édition du Symantec Internet Security Threat Report.
    Vous en saurez plus sur :
    -Les changements observés dans les techniques d’attaques
    -La vitesse d’exécution des nouvelles attaques
    -Les cibles privilégiées et les enjeux financiers
    -Les tendances à suivre (social media, IoT…)
    Si vous êtes intéressé par le rôle que la sécurité doit jouer dans la stratégie d’entreprise pour tendre vers la cyber résilience, ne manquez pas cette opportunité de discuter avec nos experts.