Browse communities
Browse communities
Presenting a webinar?

Business Continuity / Disaster Recovery

Community information
The unexpected nature of natural disasters and other disruptive events means that preparation is key to managing disaster recovery and business continuity planning. Join the business continuity and disaster recovery community for live and recorded presentations discussing best practices for business continuity planning, disaster recovery programs and business continuity management. Learn from BCDR experts to develop your critical infrastructure and gain insight into tactical solutions to your BCDR issues.
  • Symantec fournit chaque année une rapport sur les menaces et tendances de sécurité, grâce à la collecte inégalée de données partout dans le monde et à l’analyse effectuée par nos experts en cyber sécurité.
    Lors de ce webcast, Laurent Heslault, notre stratégiste sécurité, vous présentera les résultats mondiaux et pour la France de la 20ème édition du Symantec Internet Security Threat Report.
    Vous en saurez plus sur :
    -Les changements observés dans les techniques d’attaques
    -La vitesse d’exécution des nouvelles attaques
    -Les cibles privilégiées et les enjeux financiers
    -Les tendances à suivre (social media, IoT…)
    Si vous êtes intéressé par le rôle que la sécurité doit jouer dans la stratégie d’entreprise pour tendre vers la cyber résilience, ne manquez pas cette opportunité de discuter avec nos experts.
  • Join us to review the emerging risks for 2015 as executives facing an environment of unprecedented volatility: market conditions change rapidly and new risks continue to proliferate. To navigate the continually changing and complex risk environment,

    The webinar will be led by Ian Beale, Senior Director, CEB Risk
  • The evolution of the distributed enterprise network and its ability to deliver for the brand has dramatically changed since 2000. In the past, telephone line infrastructure like V.90 modems were installed to simply process credit cards and the branch office was confined to local content advertising. Then, wired broadband WAN connectivity such as T1, DSL, Cable, and Metro Ethernet was introduced to the mass market, opening up new applications to reach customers. Additionally, the need for private network communications via wired WAN brought about the introduction of technologies like MPLS and Frame Relay networks. The combination of broadband-wired WAN performance, with private network capabilities, offered the brand the ability to provide more secured bandwidth to locations – but at a premium with a level of reliability that greatly varied depending on geography.

    Today, wireless broadband WAN connectivity is pervasive across North America and is the wave of the future. 4G/LTE has outpaced MPLS, Cable, DSL, and other means of traditional wired WAN networking at a fraction of the cost.


    Now, the ‘Store of the Future’ is here with cutting-edge technology offering Ethernet LAN connectivity over 4G/LTE wireless broadband. With dual active 4G LTE modems, wired Ethernet WAN connectivity, dual-band/dual-concurrent ac WiFi and enterprise-grade security - all in a consolidated, easy-to-manage platform, delivering a reliable and scalable broadband experience.

    The convergence of wired and wireless connectivity into a single platform reduces PCI scope, simplifies network complexity, and lowers the carbon footprint of your network; all while leveraging the cloud for remote management and best-in-breed security solutions.

    Join us for this webinar to learn about Ultimate Multi WAN DiversityTM, network cost-savings through cutting-edge technology, and how the ‘Store of the Future’ is here.
  • Is Software Defined Storage (SDS) getting hijacked? It seems every vendor, old and new, is claiming that their storage is “software defined”. The original intent was to create software-only solutions that could be deployed on the customer’s choice of servers. But that original intent has evolved, and now hardware vendors are providing what they claim to be software defined storage solutions too. In addition, SDS is being combined with an embedded compute function to create hyper-converged solutions as well.

    In this webinar we will discuss the differences in these approaches and you will learn what the four key deliverables of a SDS solution should be so you can decide which makes the most sense for your organization.
  • Join us in a series of fast-paced and informative 60-minute webinars on vSphere Virtual Volumes (VVol). In this session, the Taneja Group will talk with David Glynn from Dell Storage. VVols is packaged as a feature in nearly all VMware vSphere Editions and is being embraced by VMware’s storage partners an unprecedented rate. IT professionals, especially those involved in datacenter operations, are showing great interest in implementing VVol in their own environments. The Taneja Group will discuss VVol technology with David and the impact this game-changing capability will have in the datacenter and how Dell is enabling this technology with their arrays. Attendees will be encouraged to submit their questions during the session.
  • What is HIPAA? What information is protected by HIPAA? Do we have to sign Business Associate Agreements with our vendors? All of these questions and more answered on this BrightTALK exclusive webinar, 8 HIPAA FAQs for Businesses. Join Carlo Tapia, Product Marketing Manager at eFolder, as he takes you through commonly asked questions, an overview of HIPAA, the costs associated with HIPAA violations, and how to protect sensitive patient health information. Business influencers and IT admins will appreciate this 45-minute introduction to the stringent regulations of HIPAA.
  • Hadoop clusters are often built around commodity storage, but architects now have a wide selection of Big Data storage choices. Hadoop clusters can use a mix of solid-state and spinning disk storage, while Hadoop compatibility layers and connectors can use enterprise storage systems or share storage between Hadoop and legacy applications.

    In this webinar, 451 Research Director Matt Aslett will review the storage options available to Hadoop architects and provide recommendations for each use case. WANdisco's Randy DeFauw will then present an active-active replication option that makes data available across multiple storage systems.
  • If you’ve ever felt alone with your data protection frustrations, this webcast will prove you’re not ― and that there are some simple, real-world strategies that’ll make your job a whole lot more enjoyable. We’ve put together a panel of IT professionals from a range of industries ― including a network engineer, an IT director and a CTO ― to share with you what worked for them, and what didn’t, when it comes to data protection. You’ll get to hear about the common struggles they shared and the best practices that empowered them to stop wasting time and energy on slow backup and recovery processes.

    By the end of this educational webcast, you’ll be able to:

    •Manage the gap between users who expect "always on" and the reality of system downtime.
    •Overcome the headache of administrative challenges.
    •Modernize your data protection strategy while keeping costs low and meeting requirements.
  • For disaster recovery (DR), you’ve outsourced or virtualized your network, infrastructure, applications and telephony system. Your data is stored in multiple, secure locations, and you’re safe from hurricanes, tornados and blackouts. But what about a pumpkin-spiced latte?

    The desktop is the most overlooked and vulnerable link in your disaster recovery plan. Whether a device is disabled from a coffee spill, a hardware failure, theft or vicious malware, the result is the same: your employee loses access to her desktop, primary lines of communication, and user data. Productivity comes to a grinding halt. One computer, with one access, can snowball into a local or a global problem. You’re only one desktop away from disaster.

    There is a solution: virtualize the desktop. Join Michael McCracken, Director, Professional Services at Hosting, and Steve Prather, CEO of Dizzion, on May 14th, 2015 for a revealing look at how top planners are now integrating Desktop as a Service (DaaS). This 45-minute webcast is ideal for IT leaders, business risk and compliance professionals, and disaster recovery / business continuity planners.

    Attendees will learn:
    • The basics of Disaster Recovery and accessibility of your data
    • How to extend your DR strategy all the way to the desktop
    • DaaS deployment best practices
  • Cloud. Convergence. Software-defined storage (SDS). What does it all really mean, and why should enterprise organizations care?

    Get a peek into the future with IDC’s Senior Research Analyst, Storage Systems Amita Potnis as she joins Seagate Chief Technology Evangelist David A. Chapa and Director, Global Alliance Partners Michael K. Connolly for a live webinar that will help you meet the challenges of storage now and into the future. Here’s some of what you’ll learn:

    -Top peer challenges, according to leading industry research
    -What the future holds for the competing data storage architectures
    -The difference between converged and hyper-converged infrastructures
    -Best and worst use case for SDS

    How can enterprises know what is right for their environments? What differentiates a converged infrastructure from a hyper-converged infrastructure? Find out at this webinar.
  • Organizations need to be more business-centric in their approach if data loss prevention is to be successful. By supplying McAfee Data Loss Prevention (DLP) with reliable insight into the meaning and value of data, Classifier complements the detection methods based on keywords and regular expressions alone, helping reduce the risk of data- loss.

    The combination of Boldon James Classifier and McAfee DLP reduces the likelihood of data loss by providing the DLP solution with predictable, meaningful classification metadata that greatly improves the reliability of DLP decision making, improves system effectiveness and reduces false positives.

    In this webinar we will explore:

    - The role of user-driven classification
    - How user-driven classification benefits DLP
    - When to introduce user-driven classification into a DLP project
    - How to measure and monitor the benefits of user-driven classification
  • If there is one thing that can be said about the threat landscape, and cybersecurity as a whole, it is that the only constant is change. This can clearly be seen in 2014: a year with far-reaching vulnerabilities, faster attacks, files held for ransom, and far more malicious code than in previous years.
    Join us on 26th May, at 10:00 - 10:45 to understand the growing threat landscape and how this affects your business.
    On this webcast we will cover;
    •The main security challenges and trends in 2014
    •Highlight how threats operate to allow you to better informed
    •Key takeaways for executive / functional leaders
  • ISO 31000 was published as a standard on the 13th of November 2009, and provides a standard on the implementation of risk management. A revised and harmonised ISO/IEC Guide 73 was published at the same time. The purpose of ISO 31000:2009 is to be applicable and adaptable for "any public, private or community enterprise, association, group or individual."[3] Accordingly, the general scope of ISO 31000 - as a family of risk management standards - is not developed for a particular industry group, management system or subject matter field in mind, rather to provide best practice structure and guidance to all operations concerned with risk management.
  • With companies adopting SaaS applications more rapidly than ever before, the risk of cloud data loss has also risen. As many as 40% of companies that use cloud based applications have reported data loss since 2013, according to reports from the Aberdeen group and Symantec – but until cloud data disasters hit home, businesses tend not to prioritize cloud data backup.

    In this BrightTALK-exclusive webinar, you’ll learn about the biggest cloud data losses of the year, and how to make sure they don’t happen in your organization.
  • With the increased regulation and scrutiny of the past decade, it is important for organizations to implement best practices in order to maintain control and achieve compliance with evolving regulatory requirements.

    Compliance teams of the brave new world are set up to discuss risks with the key business leaders, and have sufficient resources to ensure company compliance programs are implemented effectively. Their software applications for managing enterprise governance, risk management, and compliance (eGRC) continue to mature with impressive features and functions, and they are making notable strategic advances by linking these three business functions for more informed decision-making, to reduce risk exposure, lower audit costs, and demonstrate compliance.

    To replicate similar success in your eGRC program, you will need to focus on selling GRC value, practicing good GRC project management, and embedding GRC into corporate culture. Join this educational panel webinar as our experts delve deeper into this, and identify the best practices for implementing an eGRC program in 2015.
  • Information technology brings many benefits to a business, but it also brings risks. Knowing how to assess and manage those cyber risks is essential for success, a powerful hedge against many of the threats that your business faces, whether you are an established firm or pioneering startup. ESET security researcher Stephen Cobb explains how cyber risk assessment and management can work for you.
  • Rapidly deploy and dynamically manage secure networks at geographically distributed stores, branch locations, and on the road with Cradlepoint’s Enterprise Cloud Manager. This innovative cloud platform is the next generation management and application platform that helps you improve productivity, increase security and network reliability, and reduce costs; all while enhancing the intelligence of your network and business operations.

    The webinar is a cloud presentation and live product demonstration.

    Attendees will learn how to:
    •Set up and configure groups of devices for “zero-touch” installation and continuous remote management.
    •Troubleshoot their network, limit truck rolls, and reduce downtime
    •Perform remote diagnostics – status reports, error logs, and alerts
    •Easily upgrade firmware on multiple routers at once
    •Use next generation Out-of-Band Management through the cloud
    •Implement best-in-breed security applications from the cloud
  • Stress testing is a useful method for determining how a portfolio will fare during a period of financial crisis...
  • You already understand the process of risk management. The next step is to equip yourself to fully integrate business risk and opportunities for innovation into your organisation's corporate governance model.
  • A primary role of Information Technology (IT) organizations is to protect, preserve and serve information in support of business functions. The role of data storage is to protect, preserve and serve the needs of IT and various applications that transform data into use for information when needed. In this Server Storage I/O fundamentals webinar we will look at the current state of technology, tools, trends along with techniques as well as what is emerging from cloud, virtual, software defined as well as hardware defined capabilities. In addition, with a sub-theme of head in the clouds, feet on the ground, we will also look at what to use when, where, why and how as well as what matters for different scenarios.

    Key themes:
    •Software defined, virtual, cloud and physical or legacy environments
    •Networking with your servers and storage (LAN, SAN, WAN, DAS, Block, File, Object)
    •What to know about NVMe and emerging flash SSD technologies
    •How to access cloud storage and local storage from the cloud
    •Bulk storage including object, archive, big data, data ponds, data pools and data lakes
    •Changing roles of block and file storage complimenting objects
    •Data protection trends, techniques and tools
    •Various tools to have in your server storage I/O toolbox
  • With fraudulent payment card transactions continually on the rise, it’s more important than ever that merchants protect themselves from the potentially huge financial losses and damages to their brand and customer loyalty associated with a data breach. The total number of attacks has grown every year since 2006, and experts are calling 2014 “the year of the breach.” The Ponemon Institute found that each breach cost the average retailer $8.6 million in related expenses, and the price tag connected with a data breach increased across the board, reaching $20.8 million for financial service firms, $14.5 million for technology companies and $12.7 for communications providers.

    Criminals have displayed a better understanding of how point-of-sale systems operate than the technicians that maintain them, so to reverse the trend security professionals must fully understand their POS architecture, integrated payment processing and weaknesses in the technology. The upside is that companies can minimize their risk and foster a culture of security awareness with a proactive security plan which includes a set of ongoing processes to assess threats, set risk tolerance, address vulnerabilities, and train staff.

    Join this educational session as our panel of experts discuss the key steps to prevent payment card breaches across your organization.
  • Data is exploding—to the tune of doubling in size every two years. Of course, storage is exploding too as businesses look for ways to hold on to all their data as they analyze and extract insights. With all this growth, business continuity and disaster recovery are areas that can sometimes be overlooked. This webinar will discuss the growth of data and why it is becoming even more important for businesses, then explore the basics behind building a BC/DR strategy that will ensure smooth operations.