IT Management  >   Systems Operations  >   Storage Management  >   Backups  >  

Backup and Recovery Management

RSS Feed    Add to Google    Add to My Yahoo!
Backup and Recovery Management White Papers (View All Report Types)
 
Effective Risk Management in a Collaboration Driven Enterprise
sponsored by AvePoint, Inc.
WHITE PAPER: How will platform and content access interruptions affect productivity, revenue, and compliance-related exposure? This document will analyze common consequences of such interruptions and discuss why successful SharePoint deployments require effective management, vigorous protection, diligent compliance protocols, and continuous availability.
Posted: 11 Jun 2009 | Published: 01 Aug 2008

AvePoint, Inc.

Five Cost-Effective Ways to Enable Fast Recovery
sponsored by i365, makers of Evault
WHITE PAPER: This white paper reviews options for a multifaceted recovery strategy, ensuring that your key systems are protected with maximum efficiency at minimal cost.
Posted: 16 Nov 2009 | Published: 16 Nov 2009

i365, makers of Evault

Data Protection: Evaluating Business Requirements & Classifying Your Data
sponsored by BakBone
WHITE PAPER: This paper discusses an approach to evaluating data at a business level, and implementing a data protection strategy that safeguards your organization based on the value of its data.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

BakBone

The Costs and Implications of EHR System Downtime on Physician Practices
sponsored by Stratus Technologies
WHITE PAPER: The paper includes calculations showing the cost of downtime expected for a given level of EHR solution uptime in practices of various sizes, as well as products associated with specific uptime levels. The report also includes a “cost per hour” tool that estimates the financial impact of downtime in practices they administer, oversee or assist.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

Stratus Technologies

Data privacy best practices: time to take action!
sponsored by IBM
WHITE PAPER: This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Using proven data masking techniques can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
Posted: 24 Feb 2009 | Published: 24 Feb 2009

IBM

VMware Solutions for Small to Medium Businesses: Ensuring Rapid, Reliable and Affordable Disaster Recovery
sponsored by VMware, Inc.
WHITE PAPER: VMware Infrastructure transforms disaster recovery by providing you fast, reliable and cost-effective disaster recovery. Why suffer from the slow, expensive and unreliable problems associated with traditional disaster recovery solution?
Posted: 20 Nov 2008 | Published: 20 Nov 2008

VMware, Inc.

Keeping the Right People: Making the Right Decisions When It Counts
sponsored by Vurv Technology
WHITE PAPER: The purpose of this Executive White Paper is to help you avoid the pitfalls inherent in by any reduction in (work)force (RIF). It also details a solution that can assist companies in collecting employee data efficiently and keeping it secure.
Posted: 20 May 2008 | Published: 01 May 2008

Vurv Technology

Closing the Gaps in Enterprise Data Security: A Model for 360° Protection
sponsored by Sophos, Inc.
WHITE PAPER: This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations worldwide as components of a
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

Storage-Based Replication Options: Selecting the Right Replication Method for Optimal Data Protection
sponsored by Dell, Inc.
WHITE PAPER: Backup is the core of data protection because it provides the ability to recover data from either physical disasters or common data loss conditions. But backup can have drawbacks - regular disruption of production applications, long recovery time, and significant data/work loss. Replication technologies were developed to shorten recovery time..
Posted: 08 Sep 2009 | Published: 29 Jul 2009

Dell, Inc.

New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER: Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement