Business continuity & disaster recovery News
June 28, 2016
With a new round of $20 million in funding, business continuity/disaster recovery software vendor Zerto plans to double its engineering force by the end of the year to accelerate product releases. ...
May 31, 2016
Zerto's mobile disaster recovery app, one piece of the vendor's next release, allows customers to check on their business continuity environment from anywhere.
February 11, 2016
The ExaGrid EX32000E version 4.9 backup hardware appliance and its deduplication software offer capacity for 25 appliances and support 15 data centers for cross-site DR.
January 08, 2016
Finalists in the data backup and recovery software category for Products of the Year include traditional backup software and point products that address data protection challenges.
Business continuity & disaster recovery Get Started
Bring yourself up to speed with our introductory content
Storing important data in the cloud is a non-starter for many organizations. There are number of reasons for this, including legislation, risk and compliance. Oh, and of course, cost. For those organizations, an on-premises cloud could be a promising alternative. In other words, building a storage system that offers the key attributes of cloud storage while avoiding all that scary stuff. In our cover story, you'll find out what it takes to build an on-premises cloud system, the technologies required and what an on-prem cloud offers that traditional storage does not.
Backup is no longer simply copying data in case something goes wrong. Nowadays, the bleeding edge of backup is about meeting the demands of the "always-on" data center. It wasn't too long ago that meeting these types of demands seemed impossible, but that is changing. You'll find out about the new technologies and approaches that are addressing modern data protection challenges.
Building an effective disaster recovery (DR) plan requires a detailed analysis of the types of risks it will need to protect against and the impact those risks represent. With our step-by-step roadmap, learn where to focus DR resources and how much to invest in building and maintaining those resources.Continue Reading
Cloud computing can help healthcare organizations save money, expand research projects and improve technology offerings. Yet, for some, the age-old question remains: Can cloud services be trusted to protect sensitive healthcare data, such as EHRs?
This three-part guide explores how healthcare organizations are venturing into the cloud. First, expert Trevor Strome analyzes the benefits and most significant barriers to cloud adoption in healthcare. Next, SearchHealthIT's Kristen Lee looks at how Amazon Web Services has helped Nationwide Children's Hospital and a technology vendor perform genomic studies. Finally, healthcare IT consultant Reda Chouffani provides a list of things to consider when purchasing cloud services. Continue Reading
Projecting total costs and confirming a product meets governing regulations are two steps to take before committing to a cloud product. Continue Reading
Evaluate Business continuity & disaster recovery Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
It's hard to put together a valid business continuity plan until you know what capabilities are at risk and what the impact would be from losing those capabilities. Here's how you conduct a business impact analysis.
A business impact analysis identifies the impact of disasters on business operations, financial performance, reputation, employees, supply chains and support networks. The analysis should include potential financial loss and time required to recover from each type of disaster. After conducting the analysis, you can identify threats to your critical business operations and the likelihood each of those events will occur. When you've identified and analyzed your risks, you can come up with IT risk assessment strategies to address them.
IT risk assessment and business impact analysis requires knowledge of standards from the International Organization of Standards (ISO) and National Institute of Standards and Technology (NIST). These standards provide understanding of risk management principles, and guidance on using risk management techniques.
In this guide, you'll learn how to create and update risk analyses and risk assessments, how to develop an effective IT risk assessment analysis in a few, easy-to-follow steps and how risk analysis aids the disaster recovery planning process.Continue Reading
In this disaster recovery report, discover the failure points that led to catastrophe and learn how to make decisions that will lead to data center success. Continue Reading
Cloud-based disaster recovery can be a cost-effective, practical means of DR. Discover how well you know this method compared to a more conventional DR approach with physical sites. Continue Reading
Manage Business continuity & disaster recovery
Learn to apply best practices and optimize your operations.
A BPM tool helps business executives monitor performance and other key metrics. But what exactly is IT's role in a BPM implementation? Continue Reading
A cyberattack on the nation's electrical grid could cripple the nation. The public and private sectors need to cooperate on efforts to recoup. Continue Reading
Disk, tape and the cloud all help ensure rapid recovery, reliable retention and data agility. Each should be part of your data protection strategy. Continue Reading
Problem Solve Business continuity & disaster recovery Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Technology is coming to the rescue for organizations looking to lower their disaster recovery costs. Learn how these steps can help decrease your DR expenses. Continue Reading
Jon Toigo discusses the importance of ensuring that your cloud provider has tape recovery capabilities in this Storage Decisions presentation. Continue Reading
Paul Kirvan explains why your business continuity program must mesh with your information security and corporate cybersecurity strategies. Continue Reading