Software  >   Systems Software  >   Storage Management Software  >   Backup Software  >  

Continuous Backup Software

RSS Feed    Add to Google    Add to My Yahoo!
Continuous Backup SoftwareWhite Papers (View All Report Types)
 
ExaGrid: A Scalable Approach to Disk-based Backup
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: Looking for a new disk-based backup solution? Download this Taneja Group white paper to learn some key criteria to consider when evaluating disk-based data protection vendors and how one company matches up against these criteria.
Posted: 20 Nov 2008 | Published: 20 Oct 2008

ExaGrid Systems, Inc.

New Data Protection Strategies
sponsored by IBM
WHITE PAPER: As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with minimal impact to business.
Posted: 23 Jul 2010 | Published: 20 Jul 2008

IBM

Deduplication in Data Protection: Assessing the Benefits
sponsored by Overland Storage
WHITE PAPER: Data deduplication offers the potential for taming the growth of data and delivering increased management efficiency. This white paper by IDC offers a balanced assessment of the benefits and potential disadvantages of deduplication solutions.
Posted: 12 Nov 2007 | Published: 01 Oct 2007

Overland Storage

Integrating HP Data Protector Software with HP Data Deduplication Solutions
sponsored by HP
WHITE PAPER: This white paper will discuss HP Data Protector Software which fully supports HP data deduplication technologies allowing you to recover files more quickly while reducing your data management and storage costs.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

HP

Data Deduplication Special Report
sponsored by NetApp
WHITE PAPER: Data deduplication is one of the hottest storage topics in storage today. This Special Report highlights how data deduplication products are shaping the marketplace, who the key suppliers are and what you should be aware of when evaluating these products.
Posted: 04 Sep 2007 | Published: 31 Aug 2007

NetApp

Time-addressable and Event-addressable Storage: Combining Snapshots and Data Journaling for True Continuous Data Protection
sponsored by American Megatrends Inc.
WHITE PAPER: Although there are many different ideas of what CDP is, it is clear that it must protect data in a manner that is both time-addressable and event-addressable. This white paper explains what this means and gives an overview of effective CDP ...
Posted: 04 Apr 2008 | Published: 14 Mar 2008

American Megatrends Inc.

New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER: Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

HP StorageWorks tape and disk-to-disk data protection
sponsored by Hewlett Packard Company and Intel
WHITE PAPER: HP protects the integrity of your data and helps you regain access to it. We have a range of change-ready, cost-effective, and trusted solutions that provide the appropriate level of protection based on your specific business requirements.
Posted: 11 Mar 2009 | Published: 03 Nov 2008

Hewlett Packard Company and Intel

Data Protection Strategies Leveraging Replication: An In-Depth Look at Evaluation Criteria and Usage Scenarios
sponsored by Double-Take Software
WHITE PAPER: As dependence on continuous access to critical data grows, so does the importance of avoiding service interruption. This paper examines four data protection strategies and compares their merits for the most common business continuance scenarios.
Posted: 01 May 2009 | Published: 29 Feb 2008

Double-Take Software

Closing the Gaps in Enterprise Data Security: A Model for 360° Protection
sponsored by Sophos, Inc.
WHITE PAPER: This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations worldwide as components of a
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement