IT Management  >   Systems Operations  >   Storage Management  >   Backups  >  

Continuous Backups

RSS Feed    Add to Google    Add to My Yahoo!
Continuous Backups White Papers (View All Report Types)
 
NetApp Syncsort Integrated Backup: Advanced Data Protection and Disaster Recovery
sponsored by NetApp
WHITE PAPER: Syncsort’s data protection software has been teamed successfully with NetApp’s SnapMirror and SnapVault technology for some time, creating an integrated disk-based solution for data protection and disaster recovery of mission-critical digital assets.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

NetApp

Comparative Management Cost Survey: Workload Weighting for Mid-range Storage Array Administrators
sponsored by Hewlett-Packard Company
WHITE PAPER: Data center and storage administrators will find this white paper to be a valuable source on the time and cost savings, from a storage administrator's perspective, that can be realized from using StorageWorks EVA as compared to competing solutions from EMC and NetApp.
Posted: 16 Mar 2009 | Published: 23 Feb 2009

Hewlett-Packard Company

Next Generation Data Protection for Mid-Sized Companies
sponsored by IBM
WHITE PAPER: This white paper shows how Tivoli Storage Manager (TSM) solutions can solve your data protection and recovery challenges, all at mid-market prices.
Posted: 27 Oct 2008 | Published: 27 Oct 2008

IBM

Five Challenges to Continuous PCI DSS Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape.
Posted: 07 Feb 2011 | Published: 07 Feb 2011

Tripwire, Inc.

HP StorageWorks tape and disk-to-disk data protection
sponsored by Hewlett Packard Company and Intel
WHITE PAPER: HP protects the integrity of your data and helps you regain access to it. We have a range of change-ready, cost-effective, and trusted solutions that provide the appropriate level of protection based on your specific business requirements.
Posted: 11 Mar 2009 | Published: 03 Nov 2008

Hewlett Packard Company and Intel

Best Practices in Data Protection: Encryption, Key Management and Tokenization
sponsored by nuBridges, Inc.
WHITE PAPER: Protecting sensitive and business-critical data is essential to a company’s reputation, profitability and business objectives. This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices.
Posted: 12 Oct 2010 | Published: 12 Oct 2010

nuBridges, Inc.

Enabling a safer internet: The positive approach to web security
sponsored by Sophos, Inc.
WHITE PAPER: This paper describes today's new web threats, highlights the need for a positive security model to replace yesterday's access-blocking approach, and describes the three pillars of protection organizations need to safeguard their systems and resources.
Posted: 09 Apr 2009 | Published: 08 Apr 2009

Sophos, Inc.

Technical Whitepaper - Using FalconStor CDP with Microsoft Exchange 2007
sponsored by FalconStor Software
WHITE PAPER: This paper illustrates how to use FalconStor CDP to protect a Microsoft® Exchange 2007 server and its email database(s). It also explains how continuous real-time data journaling and periodic snapshots provide simple, rapid, and granular recovery to any point in time.
Posted: 15 Feb 2010 | Published: 28 Oct 2009

FalconStor Software

Disaster Recovery with Sunbelt Exchange Archiver
sponsored by Sunbelt Software
WHITE PAPER: Sunbelt's Exchange Archiver simplifies disaster recovery by using its revolutionary designed Hierarchical Storage Management (HSM). The HSM store is integrated into the SEA server and redirects archived email into various storage media.
Posted: 24 Nov 2008 | Published: 06 Aug 2008

Sunbelt Software

Data privacy best practices: time to take action!
sponsored by IBM
WHITE PAPER: This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
Posted: 04 Sep 2009 | Published: 01 Sep 2008

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement