Business Continuity / Disaster Recovery

Community information
The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
  • Veritas NetBackup appliance è la soluzione efficace e innovativa che semplifica e ottimizza le procedure di backup e recovery.
    Una soluzione pratica che garantisce la scalabilità necessaria per adattare il tuo business ad ambienti, fisici, virtuali e cloud. Performance ed efficienza cresceranno insieme ai profitti: i tuoi team potranno dedicarsi ai clienti e alle attività di business, promuovendo al meglio l'innovazione!
    Che benefici puoi ottenere con le appliance NetBackup di Veritas?
    Scoprilo partecipando al nostro Webcast del 7 ottobre.
  • Comprenez ce qui s’est passé et rétablissez l’activité rapidement

    Au cours des deux premiers webcasts, nous avons vu pourquoi les violations sont inévitables et comment détecter rapidement un menace avancée. Dans ce dernier épisode, nous allons voir comment Advanced Threat Protection peut efficacement résoudre le problème et supprimer les malwares de vos systèmes. Rétablir l’activité, cependant, ne suffit pas : il faut aussi améliorer sa préparation pour l’avenir. Nous y viendrons également

    Inscrivez-vous ici.

    Webcast 1: Advanced Threat: que faire en cas de violation de sécurité inévitable? -

    Webcast 2 - Advanced Threat Protection : j’ai subi une violation de sécurité, que s’est-il passé ? -
  • In today's world of unprecedented growth in enterprise storage demands, traditional infrastructure provisioning and management methods just aren’t capable of keeping up with the frequent adjustments required within modern enterprises. New industry research sheds light on how software-defined storage gives modern enterprises a competitive edge, offering improved scalability, performance, and ease of use.

    Please join us for an upcoming webcast on May 19th, featuring guest speaker Sr. Research Analyst Henry Baltazar with Forrester Consulting who will share insights on the growing need to rethink traditional data storage and on where the data industry is heading. Eric Carter, Sr. Director of Product Marketing at Hedvig will share how Hedvig’s new software-defined storage solution can deliver modern storage for any enterprise compute environment.

    Attend this webcast featuring industry experts from Forrester Research and Hedvig to discover:

    •Why 55% of technology decision makers are expressing interest in or starting to implement software-defined storage
    •What workloads IT leaders consider as top candidates to operate with software-defined storage
    •Why the need for choice and flexibility are ushering in a new era of data management that brings the simplicity of public clouds to your data center
    •How distributed systems technology transforms commodity server infrastructure into a scalable, resilient, self-service storage platform
  • The velocity of change for today's business has exposed weakness in traditional approaches to IT infrastructure. Forrester estimates that 58% of organizations measure storage provisioning in days, weeks, or even months. That’s simply not fast enough!

    Hedvig has re-architected storage using modern, distributed systems capabilities giving you the toolset to successfully deal with the demands of modern business.

    Attend this webinar for an introduction to Hedvig and learn:

    Why software-defined storage is gaining momentum in the enterprise
    How Hedvig is different from other solutions on the market
    What Hedvig uniquely offers for DevOps and IT organizations
  • Learn how data encryption and encryption key management address compliance for healthcare providers and payers. Join Derek Tumulak, VP Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager as they discuss how HIPAA/HITECH regulations impact electronic protected health information (PHI) and best practices to safeguard sensitive patient data.

    Discover how:
    • HIPAA and HITECH regulatory mandates impact data security for healthcare institutions
    • Strong encryption and policy-based access controls provide a separation of duties between data security and system administrators
    • Secure key management and policy management ensure consistency in applying policies and encryption keys to both structured and unstructured data
    • Rapid implementation is achieved because encryption is transparent to users, applications, databases and storage systems
    • The HOSTING and Vormetric cloud solution can satisfy HIPAA and HITECH compliance requirements in the cloud
  • In this presentation, solution providers learn simple steps to help build and grow their IT security practice. Attendees learn about compliance regulations, cloud integration, how to weave security into each opportunity, adherence to best practices, and re-educating customers.
  • Migrating your Hadoop cluster between versions or distributions is difficult. It is a critical process that if done incorrectly can lead to the loss of data, system downtime, and disruption of business activities.

    In this webinar, learn how you can mitigate the risk in a migration through the development of a comprehensive migration strategy and leveraging tools like those from WANdisco to simplify and automate your migration.
  • For years, most endpoint security strategies have revolved around endpoint anti-virus, but this approach is clearly unable to keep pace with modern threats. To mitigate their risks, IT organizations need to rethink their current endpoint security strategies and move past these reactive security technologies. In order to set organizations down the right path, we will present Forrester’s five design principles of an effective endpoint security strategy, helping security professionals to place attack surface reduction and tool integration as their central focus points within their own strategies. Ultimately, this will allow organizations to better deal with the influx of new device types and data access requirements while reducing the likelihood of data breaches.
  • Don’t stay behind. Embrace convergence
    Staggering complexity. Relentless growth. Bare metal, Virtual, Private Cloud? Sound like your data center and the daily challenges you face in your backup infrastructure?

    Register for this webcast and get straight answers on simplifying enterprise data protection, scaling for growth, and increasing agility. You’ll learn how Veritas NetBackup reduces complexity through comprehensive integration, a converged platform, and efficiencies through automation and self-service operation.

    Attend the webcast and learn how to:
    •Reduce the increasing complexity of protecting a modern enterprise IT environment
    •Scale with the relentless growth of the modern enterprise data center
    •Adapt your backup infrastructure to challenge your traditional backup model?
    •Ensure you understand how your can modernize your backup with converged backup appliances

    Learn how to you can focus your team on activities that drive revenue.
  • La convergence des infrastructures de sauvegardes personnalisées avec les appliances Veritas NetBackup est la stratégie adaptée à votre entreprise. Il s'agit de la manière la plus efficace de simplifier considérablement votre sauvegarde et votre récupération.
    Grâce à une solution rationalisée, votre entreprise peut évoluer vers n'importe quelle taille et n'importe quel type d'environnement (physique, virtuel ou cloud). Grâce à l'amélioration des performances et de l'efficacité, vous économiserez du temps et de l'argent. Vos équipes auront alors le temps de se concentrer sur vos clients et sur les activités génératrices de revenus. Et grâce à cette augmentation de revenus, vous pourrez innover.
    Alors, combien pouvez-vous économiser avec Veritas NetBackup, en particulier dans un environnement virtualisé ?
    Inscrivez-vous dès maintenant à notre Webcast diffusé le 7 octobre
  • Die Konvergenz herkömmlicher Backup-Infrastrukturen mit Veritas NetBackup-Appliances ist die richtige Strategie für Ihr Unternehmen. Es ist die effizienteste Methode, um Ihr Backup und Ihre Wiederherstellung deutlich zu vereinfachen.
    Mit einer einzigen optimierten Lösung kann Ihr Unternehmen sein Backup für Umgebungen jeder Größe skalieren – ob physisch, virtuell oder cloudbasiert. Leistung und Effizienz werden erhöht und Sie sparen Zeit und Kosten ein. So haben Ihre Teams mehr Zeit, sich auf Ihre Kunden und gewinnbringende Projekte zu konzentrieren. Denn höhere Gewinne bedeuten, dass Sie mehr in Innovation investieren können.
    Wie viel Kosten können Sie also mit Veritas NetBackup einsparen, insbesondere in einer virtualisierten Umgebung?
  • Конвергенция используемых Вами традиционных инфраструктур резервного копирования с устройствами Veritas NetBackup ─ это оптимальная стратегия для Вашего бизнеса. Это самый эффективный способ существенно упростить резервное копирование и восстановление данных.
    Одно усовершенствованное решение позволит Вашей компании масштабировать среду любого размера и типа — физическую, виртуальную или облачную. А увеличение производительности и эффективности поможет сэкономить время и деньги. У Ваших сотрудников будет достаточно времени, чтобы сосредоточиться на работе с клиентами и деятельности, которая увеличивает Ваш доход. А увеличение дохода обеспечит Вам больше возможностей для внедрения инновационных решений.
    Сколько же денег можно сэкономить с помощью Veritas NetBackup, особенно в виртуализированной среде?
  • Migrating your Hadoop cluster between versions or distributions is difficult. It is a critical process that if done incorrectly can lead to the loss of data, system downtime, and disruption of business activities.

    In this webinar, learn how you can mitigate the risk in a migration through the development of a comprehensive migration strategy and leveraging tools like those from WANdisco to simplify and automate your migration.
  • Companies everywhere are drowning in data. They are collecting more of it, and at an accelerated pace, while at the same time depending on it more than they have before. Data centers are being constructed around the world to house all this information, but research shows that more than two-thirds of what is being kept is worthless.

    That’s where Veritas comes in.

    The demand for our information management services has never been higher, as there will be more than 44 zettabytes of data in the world by 2020. Using current approaches, IT organizations will be incapable of managing that data – they don’t have the financial or human resources. At Veritas, our business is structured on addressing this issue. We are focused on helping companies harness the power of their information – wherever it resides – by driving availability and revealing insights across heterogeneous environments.

    Join this webcast to learn more about the Veritas vision, where an information-centric approach is taken over infrastructure-centric and we explain our three core beliefs;
    • More data does not deliver more value
    • Infrastructure availability does not mean application availability
    • Not all data is created equal
  • Learn how to take control of your data by using advanced encryption, centralized key management and cutting edge access controls and policies. In this session, Imam Sheikh, Dir. Product Management at Vormetric, and Tricia Pattee, HOSTING Product Manager will discuss how to proactively address PCI Compliance in the cloud, protect intellectual property and comply with data privacy and system integrity regulations. Join this informative webinar to learn about HOSTING and Vormetric data encryption security solutions and best practices that have helped leading Fortune 500 businesses protect their sensitive data across their private, public and hybrid cloud environments!

    What you'll learn:
    • How data encryption helps prevent data breaches
    • How to address PCI compliance requirements in the cloud
    • How to safeguard cardholder information that is stored in a variety of different databases and versions
    • The HOSTING and Vormetric approach to securing data in motion and at rest
  • Was geschieht, wenn Hacker in Ihre Systeme eindringen, und wie Sie schnell reagieren können.

    Diese Woche zeigen wir Ihnen, wie Sie einen potenziellen Angriff schnell und noch vor dem Verlust von Daten erkennen können. Mithilfe von ATP-Technologien können Sie schneller und flexibler auf die Situation reagieren und die folgenden drei Fragen leichter beantworten: „Wie?“, „Was?“ und „Wo?“

    Im zweiten Teil dieser dreiteiligen Webcast-Reihe erfahren Sie, wie ATP-Technologien gewährleisten können, dass Ihr Unternehmen darauf vorbereitet ist, schnell zu reagieren, sollte es Ziel eines Angriffs werden.
  • Qué sucede cuando los elementos maliciosos penetran en su infraestructura y cómo reaccionar rápidamente.

    Durante esta semana comentaremos cómo podemos detectar vulneraciones potenciales rápidamente, antes de que se pierdan los datos. La tecnología para amenazas avanzadas le proporciona una respuesta rápida y ágil, y al mismo tiempo le ayuda a responder tres sencillas preguntas: cómo, qué y dónde.

    Únase a nosotros en nuestro segundo capítulo de esta serie de tres partes, con el fin de que entienda cómo las tecnologías ATP pueden encargarse de que su empresa esté lista para reaccionar rápidamente en caso de que ocurra una vulneración.
  • Businesses of all sizes are creating incredible amounts of irreplaceable data and depend on the availability of their systems to keep their business up and running. There are no exceptions.

    Perhaps, this is why Disaster Recovery as a Service (DRaaS) is growing 50% year-over-year and on pace to become a $12 billion market by 2020. DRaaS is especially appealing to midsize organizations that lack the budgets and in-house expertise to maintain recovery operations on their own.

    Discover how emerging DRaaS solutions are challenging traditional DR methods by delivering affordable, simple, and secure methods to failover business apps within 15 minutes.

    At this webcast you will:

    -Understand the trade-offs of current DR methods
    -Learn about Disaster Recovery as a Service
    -Discover the five questions you have to ask potential DRaaS solution providers
  • What happens when bad stuff gets in, how to react fast

    Even with the best intelligence sitting at your network perimeter to keep ‘bad stuff’ out, the reality is that at some point a breach will occur. Targeted attacks can hide, appearing as ‘good stuff’ until they’re inside the corporate network, able to begin impacting systems and stealing valuable data. Recognizing that an attack has started is only the first phase, understanding the level of penetration is key – and this can only be achieved with advanced threat technologies that can detect and remediate across multiple control surfaces, correlating data and able to focus down to fine-grain levels.

    Missed the first webcast? If a breach is inevitable, what should I do? How best to prevent attack, and keep bad stuff out - View on-demand here -

    Sign up for Webcast 3 - Piecing back the jigsaw, what can I learn? Understanding what happened, and getting back on track fast -
  • Ensure your data protection strategy is ready for the new world order of data protection, and meets the nine Rs of backup and recovery: Rebuild, Reduce risk, Restart, Restore, Resume, Roll back, Roll forward, Run your business, and in general, Recover information. IT expert Greg Schulz explains how to make that happen in this webcast.

    Everything isn’t the same when it comes to IT data centers, applications, data, organization size and data recovery needs, but there is one constant: The need for critical application recovery. Learn about industry trends, as well as common IT organization threats, risks, challenges and requirements. In addition, Dell data protection experts Kay Benaroch and Robert Amatruda will show additional ways to ensure reliability, data recovery and overall resiliency. Join us and discover:

    •Why data recovery applies to everyday scenarios as well as headline news events
    •How your organization can’t go forward if you can’t go back in time (recovery)
    •Ways the Dell data protection toolbox adapts to your environment
    •Methods to ensure business continuity through data protection appliances
  • Business continuity encompasses a loosely defined set of planning, preparatory and related activities which are intended to ensure that an organization's critical business functions will either continue to operate despite serious incidents or disasters that might otherwise have interrupted them, or will be recovered to an operational state within a reasonably short period. As such, business continuity includes three key elements: 1. Resilience: critical business functions and the supporting infrastructure are designed and engineered in such a way that they are materially unaffected by most disruptions, for example through the use of redundancy and spare capacity; 2. Recovery: arrangements are made to recover or restore critical and less critical business functions that fail for some reason. 3. Contingency: the organization establishes a generalized capability and readiness to cope effectively with whatever major incidents and disasters occur, including those that were not, and perhaps could not have been, foreseen. Contingency preparations constitute a last-resort response if resilience and recovery arrangements should prove inadequate in practice.
  • This webinar will consider the complementary disciplines of security, crisis, business continuity and disaster response, blending theoretical and practical applications. It should interest practitioners and students of organizational resilience at advanced levels as it will bind together the various complementary disciplines necessary to become resilient into a single holistic approach. The webinar will aim to develop insights and discussion about how to match the needs of security and risk to the requirements of business continuity and impact management; and to identify the intuitive and learned skills to anticipate, respond to and recover from the many unwanted issues that can arise and threaten organizational capability.

    It will be set in the context of a dynamic, changing world where new threats such as embedded terrorism, social media risk generation, food and logistics security, environmental issues, governance and legislation (as examples) can affect resilience significantly. Many of us look at single elements – this will combine many complementary and potentially conflicting elements in a single analysis and discussion.
  • Information. A single word that represents all your customer data, staff records, and source of strategic and competitive advantage. To do right by regulators, customers and shareholders you need to properly manage it, and that job is made harder by our desire to work flexibly. And with this flexibility comes the need to access data stored in the cloud using mobile devices. With these changes, many organisations are reviewing their approach to managing critical information. We believe that these three questions help you focus on the fundamentals:
    1.Where is it being stored?
    2.How is it being used?
    3.How do I protect it against loss and theft?
    Join Christian Brindley and Sunil Choudrie as they explain what is critical information; why managing it is so important; and how you can discover, monitor and protect it using Data Loss Prevention.
  • Ce qui se produit en cas d’infiltration, et comment réagir rapidement.

    Nous verrons cette semaine comment détecter une violation potentielle rapidement et avant toute perte de données. Advanced Threat Protection vous permet de réagir avec rapidité et agilité. Vous pourrez répondre aux trois questions : « Comment ? », « Quoi » et « Où ? ».

    Participez à la deuxième et avant-dernière partie du webcast pour comprendre comment les technologies ATP permettent à l’entreprise de réagir rapidement à une violation.

    Inscrivez-vous ici

    Webcast 1: Advanced Threat: que faire en cas de violation de sécurité inévitable? -

    Webcast 3 Advanced Threat: reconstituer le cheminement d’une attaque et en tirer les leçons -