IT Management  >   Systems Operations  >   Storage Management  >   Backups  >  

Continuous Backups

RSS Feed    Add to Google    Add to My Yahoo!
Continuous Backups White Papers (View All Report Types)
 
Achieving SaaS Security with Connected® Online PC Backup
sponsored by Iron Mountain
WHITE PAPER: This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.
Posted: 23 Sep 2008 | Published: 23 Sep 2008

Iron Mountain

Data privacy best practices: time to take action!
sponsored by IBM
WHITE PAPER: This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
Posted: 04 Sep 2009 | Published: 01 Sep 2008

IBM

Backup Express and Novell Open Enterprise Server: A Business Continuity Model for OES Migration
sponsored by Syncsort
WHITE PAPER: An operating system migration might complicate backup and recovery if you are not cautious. This white paper offers guidelines to assess whether your business-critical data and applications are protected and available during a migration project.
Posted: 28 Mar 2008 | Published: 01 Mar 2008

Syncsort

ExaGrid: A Scalable Approach to Disk-based Backup
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: Looking for a new disk-based backup solution? Download this Taneja Group white paper to learn some key criteria to consider when evaluating disk-based data protection vendors and how one company matches up against these criteria.
Posted: 20 Nov 2008 | Published: 20 Oct 2008

ExaGrid Systems, Inc.

Six Secrets to 24x7 Exchange Availability
sponsored by Marathon Technologies
WHITE PAPER: The following six secrets to 24x7, disaster-tolerant Exchange will show you how to implement an Exchange environment with zero lost data and continuous application availability—with no IT intervention—in the event of a disaster.
Posted: 28 Sep 2009 | Published: 28 Sep 2009

Marathon Technologies

White Paper: Is Online Backup Right for your Business? 8 Reasons to Consider Protecting Your Data in the Cloud
sponsored by Symantec Corporation
WHITE PAPER: Without an effective backup strategy in place you could be at risk for financial loss, legal liability and damage to your reputation. This white paper discusses 8 compelling reasons to consider a cloud-based, online approach to backup. Read now to learn more.
Posted: 02 May 2012 | Published: 31 Dec 2011

Symantec Corporation

3 Options for VMware Disaster Recovery and CDP
sponsored by Veeam Software
WHITE PAPER: Continuous data protection (or CDP) has been used by large enterprises for sometime for disaster recovery and to achieve the highest level of business continuity. Read this whitepaper to find out the 5 things you need to know about CDP and 3 options for VMware disaster recovery.
Posted: 16 Aug 2010 | Published: 16 Aug 2010

Veeam Software

New Data Protection Strategies
sponsored by IBM
WHITE PAPER: As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with minimal impact to business.
Posted: 23 Jul 2010 | Published: 20 Jul 2008

IBM

Next Generation Data Protection for Mid-Sized Companies
sponsored by IBM
WHITE PAPER: This white paper shows how Tivoli Storage Manager (TSM) solutions can solve your data protection and recovery challenges, all at mid-market prices.
Posted: 27 Oct 2008 | Published: 27 Oct 2008

IBM

Best Practices in Data Protection: Encryption, Key Management and Tokenization
sponsored by nuBridges, Inc.
WHITE PAPER: Protecting sensitive and business-critical data is essential to a company’s reputation, profitability and business objectives. This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices.
Posted: 12 Oct 2010 | Published: 12 Oct 2010

nuBridges, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement