Web Editor
White Papers
DRJ's White Paper section is the one place to explore indepth thoughts on today's most relevant issues. Discover insight into a variety of topics including cloud computing, industry standards, personnel management, risk analysis and much more. The subjects are constantly evolving, providing you a non-stop feed of up-to-date industry information.
White Papers are sponsored by our industry's leading service providers. This allows DRJ to bring you the most relevant information in a free, convenient format. Your contact information will be shared with White Paper sponsors.
* By downloading a white paper you are agreeing to share your contact information with the sponsor of that paper.
For information on sponsoring a White Paper, view our media kit.
Unitrends Backup & Recovery Solutions and Disaster Recovery Best Practices: Flood Preparedness
Sponsored by Unitrends
The ability of your business to respond to a disaster depends on how well your IT organization can address specific situations. While you can only plan for so much in the way of detail, you can understand and anticipate both the likelihood and ramifications of certain types of disasters, and use this knowledge to plan your response and thus expedite the disaster recovery process.
Is Business Continuity Certification Right For your Organization?
Sponsored by Avalution
This white paper analyzes the business case for pursuing organizational business continuity certification, including what it takes to complete the certification process and how best to begin preparing.
Designing a Business Continuity Training Program to Maximize Value & Minimize Cost
Sponsored by Avalution
Business continuity is a key component of an organization’s risk management program. However, employees (ranging from executives to the general employee population), partners and customers are often unaware of the existence of the program or their role within the business continuity effort. Can management rely on a business continuity program if key stakeholders are unaware of their response and recovery responsibilities? No. And, as a result, the time and resources invested in the planning effort are often wasted.
Unitrends Backup & Recovery Solutions and Disaster Recovery Best Practices: Hurricane Preparedness
Sponsored by Unitrends
The ability of your business to respond to a disaster depends on how well your IT organization can address specific situations. While you can only plan for so much in the way of detail, you can understand and anticipate both the likelihood and ramifications of certain types of disasters, and use this knowledge to plan your response and thus expedite the disaster recovery process.
Unitrends Backup & Recovery Solutions and Disaster Recovery Best Practices: Tornado Preparedness
Sponsored by Unitrends
The ability of your business to respond to a disaster depends on how well your IT organization can address specific situations. While you can only plan for so much in the way of detail, you can understand and anticipate both the likelihood and ramifications of certain types of disasters, and use this knowledge to plan your response and thus expedite the disaster recovery process.
Floods, Fires and the Atomic Clock: Get Back Up and Running in 30 Minutes or Less
Sponsored by Egenera
Floods, thunderstorms, fires, corrupted data, human error, leap year, atomic clock adjustments. Those were the causes of the most headline-grabbing data center outages in 20121. When an enterprise suffers an outage it can result in fi nancials losses to be sure. It can be even worse when a public cloud service like Amazon Web Services goes down - as that can impact thousands of businesses all at once.
A BCM Professional's Playbook on Evaluating and Applying Relevant BCM Standards
Strategic BCP
Discover a better way to address key business continuity standards and guidelines that are so important for compliance and better continuity plans. Harness the power of the original BCP Genome™ to strengthen your own planning and compliance practices—whether you adopt its framework as is, or adapt its logic to create your own framework. Also, compare eight leading industry standards—ISO22301, FFIEC, NFPA, NIST, HIPAA, and more—to identify their strengths and gaps relative to program organization, management, training, and audit vs. emergency facilities or business and IT recovery.
Cloud Service Delivers Better, More Reliable Service Levels Using Mellanox InfiniBand Products
Sponsored by Atlantic.net
Mellanox InfiniBand dramatically reduces hardware acquisition costs and improves the delivery of cloud services, permitting higher application scalability and performance.
The Cloud Advantage: Five Ways the Cloud Is Better for Business When Disaster Strikes
Sponsored by EVault
Hurricane Sandy caused an unprecedented level of damage and disruption. Faced with extended power outages, fuel shortages, flooding, and transportation limitations, some companies managed to keep their businesses running while others suffered significant downtime. Why such a drastic difference among companies hit hard by the same storm in the same region?
Organizations with well-architected, thoroughly tested, and fully documented disaster recovery (DR) plans and solutions were able to bounce back quickly when Superstorm Sandy wreaked havoc onshore. Those who were less prepared had their operations knocked completely offline. Are you ready for a disastrous event like Sandy?
Learn the top five advantages of cloud-connected(tm) disaster recovery.
Lessons from Hurricane Sandy about Disaster Recovery
Sponsored by Recovery Point
Now that Hurricane Sandy is only a memory for most businesses on the East Coast, we thought this would be a good time to share with you a few key lessons we learned from the storm that could help to improve your disaster recovery/business continuity planning.
The 7 Deadly Sins of Backup and Recovery
Sponsored by Unitrends
This paper guides IT executives and system administrators in designing and implementing business backup and disaster recovery systems that enable every organization to rapidly recover entire business systems including business data, server OS, applications, and user data in case of a system failure or disaster, without experiencing undue planning and management pains.
What Most Backup Vendors Don't Want You to Know
Sponsored by Unitrends
Get past the hype and focus on simply, reliably, and cost-effectively protecting your systems and data. There are always a few "secrets" in any industry - and the backup and restore business has its share. Our secrets are widely known within the industry but are less well-known outside of it - for the obvious reason that none of these secrets helps the majority of the vendors in this space. Read this whitepaper to learn the secrets most vendors don't want you to know.
Is Your Network Safe Behind Just A Firewall?
Sponsored by Windstream
Malicious software or "malware" is the biggest network security threat facing organizations today. Cybercriminals target enterprises that hold a great deal of money or conduct a high volume of transactions on a daily basis. A network intrusion can cost an organization as much as $5 million. And, the damage to a company's reputation can be irreparable. Statistics show that if a major security breach occurs against a U.S. enterprise, that organization has a 90 percent chance of going out of business within two years. This is particularly alarming considering that malware is currently the fastestgrowing trend in the misuse of network resources.
The BCM Professional's Playbook: Assessing, Mitigating, and Managing Risk
Sponsored by Stategic BCP
For many business continuity professionals, BCM is changing toward a convergence with risk management. Learn how to appreciate the difference, as well as the need for evolving toward new tools and objective methodologies that can help you keep pace with risk assessment and management. Gain ideas for building reliable plans based on thorough, objective BIAs and methodologies. And leverage the opportunity to make business continuity a more strategic part of your organization's operations.
Beyond Technology: Backup and Recovery Best Practices
Sponsored by eVault
When establishing a backup and recovery program, most IT experts focus first on technology What team do you need to have in place? What communications and cross-functional planning need to occur? What are the program deliverables, milestones, and proof points?
Learn about expert techniques used to run a successful backup and recovery program: assigning ownership, managing expectations, preparing for audits, and building redundancy into the team.
Cloud-Connected Means Faster Backup, More Reliable Recovery
Sponsored by eVault
Cloud-connected™ data protection keeps a copy of your data onsite so that you can back up and recover data over your LAN. It also puts a copy of the data in the cloud—your private cloud or a public cloud—for offsite disaster protection. The goal is to combine the best of onsite and cloud data protection to get the right balance of reliability, performance, and affordability.
Find out how cloud-connected™ backup and recovery offerings are helping customers thrive in today’s rapidly evolving data protection environment.
Start Here for Your BYOD Policy
Sponsored by eVault
It’s a trend that is storming the business world—workers using their own smartphones and tablets to access corporate data wherever they go. How can you make sure your confidential business data stay secure and accessible? It starts with a sound bring-your-own device (BYOD) policy.
How to Sell Backup to Your CFO
Sponsored by Unitrends
Learn how to get beyond the insurance metaphor to create a value proposition for data protection. In this document we're first going to explore the use of the insurance metaphor in terms of its most fundamental element: the broad consequences of data loss. We'll also discuss industry and regulatory consequences of data loss. After that we'll go beyond the insurance metaphor and present three additional mechanisms for selling data protection to the CFO.
Top 10 Reasons to Choose Unitrends for Windows Server 2012 and Hyper-V Server 2012
Sponsored by Unitrends
Unitrends allows you to escape the limitations of restrictive backup for Windows Server 2012. Learn why Unitrends is the #1 all-in-one complete backup and data protection solution for Microsoft virtual, physical and cloud environments.
Windstream's Position on Security Compliance
Sponsored by Windstream
Since Windstream's role is central to customer network security, we as an ISP and Managed Security Service Provider (MSSP) must be “ahead of the curve" to maintain our position within the confines of the popular compliance standards because the overwhelming buying triggers for our services surround these standards. We see emerging threats and general business practices that require review and standards application on a regular basis.
The Business Case for Business Continuity Management Software
Sponsored by SunGard
When it comes to building a business continuity management (BCM) program that's complete, current, and compliant, there is no substitute for BCM software. But the benefits of a good BCM program extend beyond just using an automated tool. Learn why leveraging the right BCM software and services provider also makes real business sense, before, during and after business interruption
This is NOT a Test! Taking a Risk-based Approach to Validating Resilience and Recoverability
Sponsored by SunGard
Writing a plan is not enough. Recent years have seen an increased emphasis on demonstrating business resilience of mission critical business processes. But with the myriad of tests possible, how does an organization decide upon and justify what it will test? SunGard Availability Services offers guidance on how this can be addressed by applying key elements from risk management and business impact analysis – in essence, taking a risk-based approach.
ISO 22301: A Framework for Business Process Definition
Sponsored by SunGard
In May 2012, the International Standards Organization (ISO) published the long-awaited ISO 22301 which utilizes as a foundation BS 25999:2: a standard which has already garnered broad acceptance outside the UK. SunGard Availability Services outlines how this new standard "Societal Security – Business Continuity Management Systems –Requirements" offers a robust framework for individual organizations to build their own Business Continuity Management Systems (BCMS).
Solving HIPPA, HITECH, SSAE16 Server Compliance Issues with Next Generation Datacenters
Sponsored by Atlantic.Net
HIPPA stands for the Health Insurance Portability and Accountability Act. HITECH and SSAE16 are also Acts that require datacenters to live up to certain standards. It was designed to provide better access to health insurance, reduce the occurrence of fraud and abuse and lower the cost of obtaining health care in the USA. So, dedicated server and managed hosting services that use new generation datacenters must ensure that they can meet the requirements as outlined in the compliance requirements of the Acts.
Replication Reinvented: What's New in Zerto Virtual Replication 2.0?
Sponsored by Zerto
Zerto Virtual Replication (ZVR) 2.0 takes Zerto's award-winning, hypervisor-based replication technology to the next level, providing enterprises with a scalable, robust and automated solution for their data protection needs across different sites and application types. Zerto replication solutions lift disaster recovery from the storage layer to the virtualization layer, offering organizations critical benefits such as scalability across thousands of VMs, VM-level granularity, automated test and recovery, and low RTO/RPO. ZVR 2.0 builds upon the previous release to continue to deliver true, cost-effective BC/DR for virtualized mission-critical applications.
Mission-Critical Disaster Recovery in the Virtual World
Sponsored by Zerto
Virtualization has changed the face of disaster recovery, but traditional replication and recovery solutions are not conditioned to deal with the demands created by the virtual paradigm. In light of these challenges, Zerto has compiled a list of ten questions enterprises should use to evaluate their current DR initiatives for mission-critical applications and ensure its suitability for the virtual world.
Hypervisor-based Replication: A New Approach to BC/DR
Sponsored by Zerto
Zerto Virtual Replication, the industry's first hypervisor-based replication solution, lifts disaster recovery from the storage layer to the virtualization layer, offering organizations critical benefits such as scalability across thousands of VMs, VM-level granularity, automated test and recovery, and low RTO/RPO. Leveraging the flexibility of the hypervisor, Zerto is able to deliver enterprise-class disaster recovery without the associated enterprise infrastructure changes and costs. This white paper compares and contrasts hypervisor-based replication to traditional replication solutions and evaluates how virtualization is changing the face of IT.
BC/DR in the Cloud Era: Opportunities and Challenges
Sponsored by Zerto
Enterprises today are beginning to virtualize their mission-critical applications in order to increase availability, business continuity and disaster recovery. While cloud virtualization has become a viable option and enterprises are seeking private, hybrid and public cloud BC/DR solutions, these solutions are still limited by the fact that mission-critical applications up until this point have been effectively virtualized and managed in the cloud, but ineffectively protected. This white paper will explore the opportunities and challenges of private cloud BC/DR, disaster recovery-as-a-service (DRaaS) and in-cloud BC/DR to guide enterprises in their search for the best-suited cloud solution.
Cloud-Based Disaster Recovery: Ready for the Midmarket
Sponsored by EVAULT
In the past, a comprehensive disaster recovery solution was out of reach for midmarket and smaller companies because of the significant up-front costs and expenses. Cloud-based disaster recovery solutions significantly reduce total cost of ownership by eliminating the large initial investment and moving these large capital expenditures to smaller recurring operating expenses. Plus, cloud-based disaster recovery is fast, reliable, and secure. The bottom line: World-class disaster recovery services are now affordable for midmarket and smaller companies. This white paper examines the evolution of disaster recovery, discusses relevant advances in technology, reviews the benefits of using the cloud, shows how cloud disaster recovery works, and offers a checklist for moving forward.
A BCM Professional's Playbook on Customer Satisfaction
Sponsored by Strategic BCP
Elevate your BCM profile within your organization by taking a page from this playbook on customer satisfaction. Gain insight for leveraging basics of the BCM process into opportunities to raise your profile and value in the eyes of the key organizational "customers." Learn tactics that have already proven their validity at the highest levels in more than 250 organizations, and ideas you can apply in any organization.
Testing Made Easy for Financial Institutions
Sponsored by Agility Recovery
Government mandated annual disaster testing isn't a big worry if you plan ahead. A time of crisis is not the time to be asking yourself critical questions such as, 'How long would it take to get our systems back up and running if they went down in a disaster?' Testing and preparedness are the keys to survival. Agility's whitepaper summarizes how to plan for the testing process by building a team and then challenging all aspects of your recovery operation. It also discusses the top 10 lessons learned from real disaster recovery processes.
Business Continuity for the Healthcare Field
Sponsored by Agility Recovery
Critical steps to keep your facility up and running during and after a disaster. Today's fast-growing highly mobile workforce is placing new demands on IT. As data growth increases, and that data increasingly finds its way onto laptops, the threats of data loss and security breaches have also increased. To guard corporate data on endpoints at all times, companies can follow a number of data protection and data security best practices. Incorporating these best practices can help you control sensitive information to mitigate the risk of regulatory and financial exposure and keep IT costs in check. Read more about how to define security policies for laptops, how to enforce endpoint controls and how to ensure employee adoption - all while keeping costs in check.
Best Practices for Protecting Laptop Data
Sponsored by EVAULT
Today's fast-growing highly mobile workforce is placing new demands on IT. As data growth increases, and that data increasingly finds its way onto laptops, the threats of data loss and security breaches have also increased. To guard corporate data on endpoints at all times, companies can follow a number of data protection and data security best practices. Incorporating these best practices can help you control sensitive information to mitigate the risk of regulatory and financial exposure and keep IT costs in check. Read more about how to define security policies for laptops, how to enforce endpoint controls and how to ensure employee adoption - all while keeping costs in check.
12 Best Practices for Data Backup and Recovery
Sponsored by EVAULT
This whitepaper covers the 12 Best Practices your company needs to know when choosing a data backup and recovery solution including security, reliability, compliance and more. Consider this your checklist when reviewing your current solution or when you are researching options.
Deduplication and Beyond-Optimizing Performance for Backup and Recovery
Sponsored by EVAULT
With cost cutting so important for most organizations, data deduplication— and the allure of significantly reduced storage and bandwidth usage—has become the hot topic in data protection circles. But deduplication is just one component of performance optimization for data protection systems. This paper describes the benefits and potential risks of three optimization technologies commonly used for disk-based backup and recovery, enabling you to more confidently optimize your own data protection environment.
The Dollars and Sense of Online Backup
Sponsored by EVAULT
Businesses today face unrelenting data growth. IT staffs are struggling to ensure data availability under tight fiscal constraints. The unreliability and intensive management of traditional tape-based backup has forced backup administrators to create manual, error-prone processes in order to protect their data. Consequently, other critical objectives, such as supporting distributed environments and complying with regulatory requirements, are not being adequately met. Read this paper to see how using online backup can answer these challenges by leveraging cloud-based technology to securely protect your company against data loss.
Cloud Connected Backup and Recovery Delivers a Command Performance
Sponsored by EVAULT
There is a fundamental shift taking place in data protection. More and more companies are turning to cloud-based solutions to provide a more secure and even more simplified method of storing and access business-critical information. This whitepaper will cover:
-
The essentials of guarding your company's digital assets: dealing with the explosive growth of data, outages, theft and human error, threat of disaster, regulatory compliance and litigation issues.
-
The challenges of business continuity with multiple platforms and multiple sites
-
The challenges and dangers of being in a tape environment
-
How to set up a failsafe plan that gives your institution flexible protection in all scenarios
-
And more
Seven Ways to Control the Cost of Data Growth
Sponsored by EVAULT
The incredible growth in the amount of electronic data generated for both business and personal use has resulted in higher costs for data storage and backup. Several factors have lead to these spiraling cost increases, including storage of larger files such as video and audio, multiple backups of the same files, and enforcement of industry compliance regulations. This paper will cover seven cost management techniques that will help your company optimize your storage and backup strategy.
Trusted Data Assurance in the Cloud
Sponsored by EVAULT
The move to cloud-based services is being largely driven by the high cost of regulatory compliance. This is especially true for small and mid-size companies with information security budgets that are non-existent, small, or shrinking. But moving to the cloud can be daunting. So here's the good news: Recent protection controls and audit initiatives are giving cloud consumers the Trusted Data Assurance they need to adopt cloud-based services. Read our new EVault® ebook, by Felix A. Santos, EVault Director of Information Security and Compliance, to gain valuable information about cloud information security and data protection. You will learn:
-
What is Trusted Data Assurance—and why it's so important to cloud consumers
-
What your data privacy rights are and who owns your data
-
Why regulations and standards are driving increased data security in the cloud
-
How to prepare your data for the cloud
-
How to evaluate data protection cloud providers
Strategies for Cloud Storage, Data Protection, and Disaster Recovery by Realtime Publishers
Sponsored by EVAULT
This eBook will cover what cloud storage can really do for your company including the business needs your current storage plan doesn't meet. It will also cover the business drivers for storage, data protection and disaster recovery, how to plan for cloud storage and fit cloud storage into your infrastructure and special considerations for a cloud-based backup and recovery plan.
Security Matters: Every Layer of Protection Counts
Sponsored by Send Word Now
At Send Word Now, we take security very seriously, and we approach all aspects of our infrastructure and services with this in mind. Whether it concerns the location of our equipment, the method of firewall changes, or our process management, we manage every detail in order to properly safeguard our customers' data on a platform that is secure, reliable, and resilient. Our goal is to provide the most secure notification platform in the industry and offer our customers a system that they can trust.
Successfully Managing Emergency Operations in a Distributed Environment
Sponsored by MissionMode
Many organizations treat a crisis as a series of tactical issues affecting operational silos, rather than reviewing the needs of the crisis response at the organizational and strategic level. Organizations need a strategic view of crisis management that encompasses the whole enterprise. This white paper examines how to create that strategic view while reducing threats and deriving value from the distributed nature of the organization.
New Ways to Streamline Crisis Management
Sponsored by MissionMode
Large, complex plans often prove ineffective during a crisis. In this free white paper, a prominent crisis management expert describes a new way to streamline crisis management and focus on the key aspects of the response. By using operational and communication plans, coupled with a crisis support system, an organization can react and recover more quickly.
Disaster Recovery with the Public Cloud and Whitewater Cloud Storage Gateways
Sponsored by Riverbed
The explosion of 24x7 connectivity, combined with the growing demand for wherever-whenever data availability, has exposed serious shortcomings in how data is protected and managed. This paper examines various disaster recovery (DR) planning strategies, and details different approaches as well as the benefits of deploying Riverbed® Whitewater® cloud storage gateways to provide fast recovery should the unexpected occur. Download the white paper to learn more.
Managing Recovery
Sponsored by Sungard
Most organizations lack three fundamental components essential to managing recovery from a disaster: continually updated recovery processes, staff availability for test and recovery, and on-staff recovery expertise. Finding the right service provider with the experience necessary to deliver effective recovery management cover that gap effectively and efficiently.
Best Cloud Practices For Cloud-Based Recovery
Sponsored by Sungard
Managing recovery effectively is complex. A fully managed recovery solution removes the burden of that complexity from an IT organization. And when the recovery solution leverages modernized data movement technologies and a range of secure cloud and virtual infrastructures, the advantages are significant: higher availability, better performance, and lower cost.
Five Things You Need to Know Today About Disaster Recovery Planning
Sponsored by Novell
As a busy data center manager, you might be struggling to keep up with the challenge of continually doing more with fewer resources. IT has become an integral part of business operation; in fact, most, if not all of the infrastructure you support is critical for keeping your company up and running. However, despite being asked to do more with less, you probably haven't gotten any more budget or team members, so you may have been forced to put some projects on the back burner. Chances are disaster recovery is one of those projects you'd like to bring to the front of the priority queue, and for good reason. It's nearly impossible to turn on the news without being bombarded by all the potential risk out in the world. Whether it is turbulent weather, natural disasters or man-made accidents, something bad seems to always be happening. When is the last time you took a look at your disaster recovery planning? What do you expect would happen if the ceiling collapsed in your data center?
Realizing the Benefits of Integrating Cloud Backup and Recovery
Sponsored by Recovery Point
"Cloud computing" is today's hottest topic in IT. Cloud backup has already become a thriving category; now larger-scale cloud recovery is emerging as the next logical extension of that service. But what do these terms mean? Do customers' assumptions about the cloud in general, and backup and recovery in particular, match the services that providers are actually offering? More importantly, can cloud backup and recovery improve the effectiveness and efficiency of disaster recovery efforts, simplify processes and reduce cost ?
Using Incident Notification in a Disaster
Sponsored by Everbridge
Disaster Planning and Business Continuity are two of the fastest growing fields in both the commercial and government sectors. Analysis of past disasters has shown that communications are a major limiting factor in disaster response. This paper examines the many historical reasons communications might fail during emergencies, and then directly applies the dynamic technology of mass notification as a remedy to many of those failures.
10 Reasons to Deploy WAN Optimization for Disaster Recovery (DR)
Sponsored by Riverbed
Data protection is simple: take everything and copy it somewhere far enough away so that you'll have it when you need it — in an emergency. The challenge is how to do this in the most efficient and reliable way. Deploying WAN optimization solutions from Riverbed can help you protect more, recover faster, reduce risk and save money. Get the facts about how Riverbed optimizes disaster recovery across the widest range of backup mechanisms, with no changes to your software or storage now.
A Practical Guide to Cost-effective Disaster Recovery Planning
Sponsored by Novell
The global recession, increased competition requiring just-in-time processes, squeezed information technology (IT) budgets, explosive data growth, and new regulatory requirements have all increased the importance of disaster recovery (DR). As a result, organizations are now under pressure to create, re-evaluate and update their disaster recovery plans. Looking across the DR industry today, there are hundreds of solutions whose value should be measured in three ways: cost, performance and risk.
Top 10 Questions to Ask Emergency Notification System Vendors
Sponsored by Everbridge
This white paper outlines ten major questions to ask every vendor you evaluate to help cut through sales pitches and marketing noise so you can get to the fundamentals of each system and its fit within your organization.
The ROI of Mass Notification
Sponsored by Everbridge
A mass notification system is an integral component of an organization's emergency and routine communications capabilities. While these systems are most often associated with emergency notification for contacting employees during and after a disaster, mass notification dramatically improves an organization's operational efficiency and bottom line when implemented for day-to-day operations. Just a few common examples include alerting supply chain members about a needed change in delivery schedules; reminding employees about policy changes, deadlines, and other time-sensitive information; and mobilizing IT staff more quickly after a server goes down all make an organization and its employees more efficient and competitive.
Message Mapping: Communication During the Six Stages of a Crisis
Sponsored by Everbridge
Do you know what you will say in the critical first minutes after receiving reports of an active shooter on campus? How about six hours into the incident? What will you tell people when your county issues a flood watch or the power in your building goes out at 10:00 a.m. on a Monday?
Getting your Program Off the Ground
Sponsored by Avalution
What's the "typical" background of someone responsible for a business continuity (BC) program? What's a "typical" BC program structure? What deliverables should I expect after a business continuity planning project? The answer to all three questions is simple – "it depends." Business continuity programs are unique to each organization, and the background of the business continuity professional is diverse. Due to the unique nature of business continuity programs and their assigned professionals, getting a business continuity program off the ground can be challenging. This "side" of the brochure will assist you, the newly named business continuity owner, in determining your future business continuity program's key characteristics, with the objective of designing and implementing an efficient and effective risk management strategy.
Planning to Return to Business As Usual
Sponsored by eBRP
Every organization must choose its own objectives, but if the goal of your organization's BCM program is assuring the ability to survive any disruption.
Are you getting value from your BIA?
Sponsored by eBRP
If a BIA is a fundamental part of BCM, the underlying cost may simply be a necessary evil. But, when a BIA is a one-time 'project' – as in many organizations – is the cost realistically proportional to its value?
Streamlined Data Protection
Sponsored by Riverbed
Wide area network (WAN)-based approaches to data backup are dramatically influenced by WAN bandwidth limitations and network latency. Without significant, costly WAN bandwidth upgrades this can make WAN-based backup impossible for large remote offices with significant data stores. Riverbed makes network-based backup feasible, in many cases through use of existing WAN links, without the need for bandwidth upgrades. Our intelligent, storage-specific optimizations yield higher data reduction ratios for the common enterprise workloads seen in SRDF/A environments at both the network and application level, enabling enterprises to realize up to a 30:1 compression while maintaining a high throughput. Download this paper and learn more about this strategy today.
Data Storage in the Cloud – Can you Afford Not To?
Sponsored by Riverbed
Storing data in the cloud using a Whitewater™ cloud storage gateway from Riverbed Technology overcomes what is becoming a serious challenge for IT departments: how to manage the vast, and ever-growing, amount of data that must be protected. Whitewater eliminates concerns about data security, data transmission speeds over the Internet, and data availability, while providing great flexibility and a favorable return on investment. Moving data to the cloud replaces the high costs of tape and disk storage systems with a pay-as-you-go cloud storage tier. This paper makes the business case for cloud storage, outlining where capital and operational costs can be eliminated or avoided by using the cloud for backup and archive storage.
The Lightweight Solution to Heavy Risk
Sponsored by Send Word Now
MIDTOWN, New York City - When a steam pipe burst at East 41st and Lexington during the afternoon rush hour on July 18, 2007, a rust-colored geyser of near-boiling water erupted nearly 100 feet into the air, causing cars to flip and commuters to flee for their lives. The blast of steam and the resulting shower of debris continued for two hours, raising fears of asbestos contamination in the neighborhood, and forcing authorities to cut off access to the affected streets. One death and over 30 injuries were reported on the day of the accident, but the effects of the crisis continued even after the streets were cleared. It was estimated that the financial losses in the frozen zone surrounding Grand Central Station reached upwards of $30MM, and impacted over 100 businesses in the area. In the aftermath of unexpected incidents such as this one, a business can suffer tremendous losses very quickly, especially if it's not prepared. And, as we will see in this paper, even proper planning is not sufficient without the ability to implement and carry out a business continuity plan both quickly and easily.
Benefits of Native Mobile Applications
Hot News & Press Releases
Press Releases
- Ensure Your IT Backups Actually Work, Warns the Remark Group
- RMC Solutions Improves Proper Risk Transfer with GG-One Insurance Certificate Tracking Software
- RMC Solutions Improves Proper Risk Transfer with GG-One Insurance Certificate Tracking Software
- Lone Star Corporate Services Achieves Momentous Milestone, Reaching 100 SMEs Supporting Carrier Clients Across the Globe
- Global Capacity Enhances LATTIS, the De Facto Database of Local Tariff Rates
- TELEHOUSE America and Seccuris Form Strategic Alliance to Offer Cloud Security Services
- Hibernia Networks Celebrates Its 10-year Anniversary
- Colleges and Universities Increasingly Choosing ExaGrid to Achieve Better Backups
- Emerson Network Power Identifies Vital Signs of a Healthy Data Center
- Emerson Network Power Outlines Best Practices for Building a More Profitable Colocation Environment
- Managed service provider Oxford Networks implements STORServer MSP Appliance to provide data protection as a service
- Continuity Software’s 2013 Financial Services Availability Benchmark Study Reveals Almost Half of Respondents Not Meeting Service Availability Goals
- Pitney Bowes Climbs to No. 11 in Rankings Among IAOP’s 2013 Global Outsourcing 100®
- OfficeBook Ups the Value of Its Cloud-Based ERP Software Suite With Affordable Customization
- FEMA Announces 2012 Community Resilience Innovation Challenge Recipients
- Liberty Utilities Selects Schneider Electric for Weather Forecasting Solutions
- Hetzner Online Deploys ADVA 100G Core to Answer Enormous Data Growth
- ViaWest and Wayin Join Forces to Promote Colorado-Based Business Leadership in Cloud Computing and Social Engagement
- National Planning Frameworks: How We Work Together to Build, Sustain, and Deliver Capabilities to Ensure a Secure and Resilient Nation
- SunGard Availability Services Building Momentum in Managed IT Services
- Beware of Post-Disaster Fraud
- Despite Recent Disasters, Survey Shows Most Small Business Owners Still Not Getting Prepared
- Survey Reveals More than Half of Real Estate Companies Lack Business Continuity and Disaster Recover
- Disaster Recovery Plans Help Businesses Protect Lives And Property
- Human infection with avian influenza A(H7N9) virus
- FEMA and Premiere Networks Work Together to Increase Preparedness
- Graybar Opens New Branch in Binghamton, N.Y.
- Is Your Organization Protected Against the Risks of Technology?
- RFID Journal, Microelectronics Technology Inc. and Enso Detego Introduce Mobile Inventory Solution FiND-iT RFID
- Scarinci Hollenbeck Acknowledges Increasing Risk of Cyber Crime with Launch of New Cyber Security & Data Protection Practice
- Sirius Integrator announces the SiriusPower 500w Propane Fuel Cell System
- FEMA and Premiere Networks Work Together to Increase Preparedness
- Information Systems Associates Announces Increased Revenues for the First Quarter
- Epic From Real-Time Technology Group Delivers An Unprecedented Credentialing Solution For First Responders
- 30-day Countdown to the 2013 Hurricane Season Begins May 2
- Seven Threats That Could End the World As We Know It
- QuorumSoft Changes Name to Quadric Software as Part of Strategy to Expand into Hyper-V
- Study Finds Enterprise Reliance on ‘Always On’ Systems Necessary to Ensure Continual Business Operations
- SpatialTEQ Releases MapBusinessOnline.com 3.0, Enhanced Territory Mapping Software and Multi-Stop Routing Navigation Tools for Sales and Marketing Professionals
- Atlantic Metro Expands Managed Network Services to TELEHOUSE New York Chelsea
Events Schedule and Archive
Archived Events
DRJ has sponsored conferences for more than 20 years. The shows have grown from a small gathering of planners in the early years to more than 1500 onsite at today’s shows. To view information on our past shows, click the brochures below. Session and speaker information is included, as well as conference events
Below is a listing of the past DRJ Event Brochures (PDF Format)
- Spring World 2013 - Orlando, FL - March 17-20, 2013
- Fall World 2012 - San Diego, CA - September 9 - 12 2012
- Spring World 2012 - Orlando, FL - March 25 - 28, 2012
- Fall World 2011 - San Diego, CA - September 9 - 11 2011
- Spring World 2011 - Orlando, FL - March 27 - 30, 2011
- Fall World 2010 - San Diego, CA - March 21 - 24, 2010
- Spring World 2010 - Orlando, FL - March 21 - 24, 2010
- Fall World 2009 - San Diego, CA - September 13-16, 2009
- Spring World 2009 - Orlando, FL - March 29 - April 1, 2009
- Fall World 2008 - San Diego, CA - September 14-17, 2008
- Spring World 2008 - Orlando, FL - March 30 - April 2, 2008
- Fall World 2007 - San Diego, CA - September 16-19, 2007
- Spring World 2007 - Orlando, FL - March 25-28, 2007
- Fall World 2006 - San Diego, CA - September 17-20, 2006
- Spring World 2006 - Orlando, FL - March 26-29, 2006
- Fall World 2005 - San Diego, CA - September 18-21, 2005
- Spring World 2005 - Orlando, FL - March 6-9, 2005
#H7N9 – Death rate seems to have settled at 20%. Yikes! 102 cases 20 deaths…still no ID of source
As of 21 April, there were 102 cases and 20 deaths. No additional provinces have been added and no clearer picture about the source of infection. What happens next?!? Who knows! Virus reproduction and replication will continue and if the “right” random event occurs things could really change…otherwise, this could go on for who knows how long or it could fizzle out.
Viewpoint: When it comes to enterprise security, is it better to focus on compliance or risk?
A CIO once quipped, "Security isn't hard, compliance is." And in fact many companies focus their security efforts on meeting compliance requirements. But if you are audit compliant, have you in fact addressed all of your risks, or are you just kidding yourself? Is it better to focus on the risks presuming that doing so will cover you off on the compliance side? Network World Editor in Chief put the question to two practitioners, both of whom come down on the side of risk.
Business skills key to CISO’s survival
Business skills are key components of any chief information security officer (CISO), says Paul Swarbrick, CISO at aeronautical information service, NATS.
“After 25 years in information assurance, I am convinced that in the modern era that the role is not about technical expertise, but about being a business expert,” he told Computer Weekly.
http://www.computerweekly.com/news/2240182100/Business-skills-key-to-CISOs-survival
Companies in 2013 Are Less Prepared for Major Risks Than They Were in 2011
Gloomy news: Companies across the world are now less prepared to deal with risks than they were two years ago. Even worse: Though companies have had nearly five years to respond to the global economic slowdown — which they cite as as the biggest risk to business — they are increasingly unable to confront the revenue problems it has created.
9 Things to Consider with BCM / DR and the Use of Manual Processes
When teams are determining and developing their Business (unit) Continuity Plan (BCP) the fact that manual procedures will be used, often crops up. ‘What will you do in a DR situation?’ they’re asked and the answer all too often – and quickly – comes back as “we’ll do ‘x’ manually.” Really, is it that easy to do; just revert to a manual process for what normally includes many checks and balances and possibly varying numbers of applications?
Observations on the 2013 Verizon Data Breach Investigations Report
I was very excited to finally get a copy of the much-anticipated 2013 Verizon Data Breach Investigations Report (DBIR.) I have found the report to be valuable year after year. This is the 6th iteration and this year’s report includes 621 confirmed data breaches, as well as over 47,000 reported security incidents. 18 organizations from across the globe contributed to the report this year. The full report is 63 pages, and I have to say that Wade Baker and company did a great job making it an enjoyable read. I enjoyed the tone, and I found myself laughing several times as I read through it (Laughing and infosec aren't commonly said in the same breath.) There are tons of great references as well, ranging from NASCAR, to Biggie Smalls, the Violent Femmes and more. The mantra of this year’s report is “Understand Your Adversary’ is Critical to Effective Defense and Response.”








