Software  >   Systems Software  >   Storage Management Software  >   Backup Software  >  

Backup and Recovery Management Software

RSS Feed    Add to Google    Add to My Yahoo!
Backup and Recovery Management Software White Papers (View All Report Types)
Data Deduplication Special Report
sponsored by NetApp
WHITE PAPER: Data deduplication is one of the hottest storage topics in storage today. This Special Report highlights how data deduplication products are shaping the marketplace, who the key suppliers are and what you should be aware of when evaluating these products.
Posted: 04 Sep 2007 | Published: 31 Aug 2007


Time-addressable and Event-addressable Storage: Combining Snapshots and Data Journaling for True Continuous Data Protection
sponsored by American Megatrends Inc.
WHITE PAPER: Although there are many different ideas of what CDP is, it is clear that it must protect data in a manner that is both time-addressable and event-addressable. This white paper explains what this means and gives an overview of effective CDP ...
Posted: 04 Apr 2008 | Published: 14 Mar 2008

American Megatrends Inc.

Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies
sponsored by Syncsort
WHITE PAPER: Creating a full physical clone of an Oracle database can cause a number of headaches for Oracle administrators. Read this white paper for tips on how to streamline this process and to help you avoid the headaches.
Posted: 28 Mar 2008 | Published: 01 Jan 2007


3 Options for VMware Disaster Recovery and CDP
sponsored by Veeam Software
WHITE PAPER: Continuous data protection (or CDP) has been used by large enterprises for sometime for disaster recovery and to achieve the highest level of business continuity. Read this whitepaper to find out the 5 things you need to know about CDP and 3 options for VMware disaster recovery.
Posted: 16 Aug 2010 | Published: 16 Aug 2010

Veeam Software

Closing the Gaps in Enterprise Data Security: A Model for 360° Protection
sponsored by Sophos, Inc.
WHITE PAPER: This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations worldwide as components of a
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

Five Steps to Reduce Your Backup Window
sponsored by Overland Storage
WHITE PAPER: Backup windows are a constant headache for storage administrators and they're constantly trying to find new ways to reduce them. This white paper explains 5 easy steps that will help make shorter backup windows a reality. Read this white paper to l...
Posted: 12 Feb 2008 | Published: 01 Feb 2008

Overland Storage

IDC Technology Spotlight: Optimizing Storage to Reduce Data Footprint and Lower Costs
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper examines data deduplication technologies supported by the latest Storage Solutions from HP. Data deduplication is a hot topic in data protection and therefore, also a relevant topic for HP Data Protector software.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Hewlett Packard Enterprise

Disk Assisted Back-Up White Paper: Backup to Disk and How to Implement It with HP Data Protector
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Advancements in technology and price reductions have recently made it possible to use disk together with tape to improve data protection. This white paper discusses the benefits of this technology.
Posted: 31 Mar 2008 | Published: 01 Sep 2006

Hewlett Packard Enterprise

Data Protection Report 2008: Best Practices in Data Backup & Recovery
sponsored by Overland Storage
WHITE PAPER: This white paper outlines the survey results of over 135 storage professionals to understand the top goals, challenges and trends related to data protection in 2008. Read this white paper to learn what's in store for this year.
Posted: 12 Feb 2008 | Published: 01 Jan 2008

Overland Storage

Data Protection Strategies Leveraging Replication: An In-Depth Look at Evaluation Criteria and Usage Scenarios
sponsored by Double-Take Software
WHITE PAPER: As dependence on continuous access to critical data grows, so does the importance of avoiding service interruption. This paper examines four data protection strategies and compares their merits for the most common business continuance scenarios.
Posted: 01 May 2009 | Published: 29 Feb 2008

Double-Take Software
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement