IT Management  >   Systems Operations  >   Storage Management  >   Backups  >  

Continuous Backups

RSS Feed    Add to Google    Add to My Yahoo!
Continuous BackupsWhite Papers (View All Report Types)
 
Backup and Recovery for Microsoft Exchange Server - Data Domain Deduplication Storage Best Practices Guide
sponsored by EMC Backup and Recovery Solutions
WHITE PAPER: In many companies, Microsoft Exchange is now commonly viewed as a mission-critical application. Protecting Exchange information is critical and backup is still the primary method used. This paper focuses on the traditional backup and recovery practices for Microsoft Exchange Server along with solutions from Data Domain.
Posted: 08 May 2009 | Published: 08 May 2009

EMC Backup and Recovery Solutions

New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER: Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

Protecting Server Data in Small and Medium-sized Businesses
sponsored by Iron Mountain
WHITE PAPER: Read this white paper to learn how to successfully protect server data outside a centralized data center and focus on specific needs and requirements for SMBs.
Posted: 11 Jan 2010 | Published: 01 Sep 2006

Iron Mountain

VMware Solutions for Small to Medium Businesses: Ensuring Rapid, Reliable and Affordable Disaster Recovery
sponsored by VMware, Inc.
WHITE PAPER: VMware Infrastructure transforms disaster recovery by providing you fast, reliable and cost-effective disaster recovery. Why suffer from the slow, expensive and unreliable problems associated with traditional disaster recovery solution?
Posted: 20 Nov 2008 | Published: 20 Nov 2008

VMware, Inc.

Achieve Immediate Returns With Practical Storage Management
sponsored by Northern Parklife
WHITE PAPER: This white paper in an introduction to Northern Storage Suite, a perfect solution for organizations seeking to implement a systematic approach to storage resource management, once and for all reclaiming control over previously ungoverned storage use.
Posted: 12 Feb 2009 | Published: 12 Feb 2009

Northern Parklife

User Directed Storage Management: How To Make Users Accountable For Responsible Storage Usage
sponsored by Northern Parklife
WHITE PAPER: The accelerated pace of doing business in today's world puts organizations under tremendous pressure. They need to be fleet and flexible, able to rapidly respond to opportunities, make decisions, and deploy resources. Critical to this is the way information is managed and stored.
Posted: 12 Feb 2009 | Published: 12 Feb 2009

Northern Parklife

Merging Backup and Disaster Recovery (DR) Processes
sponsored by FalconStor Software
WHITE PAPER: This paper describes how continuous data protection (CDP) technology can bridge various DR methodologies to help organizations overcome the challenges of tape and achieve maximum benefits from their IT investments.
Posted: 16 Jun 2009 | Published: 16 Jun 2009

FalconStor Software

Five Cost-Effective Ways to Enable Fast Recovery
sponsored by i365, makers of Evault
WHITE PAPER: This white paper reviews options for a multifaceted recovery strategy, ensuring that your key systems are protected with maximum efficiency at minimal cost.
Posted: 16 Nov 2009 | Published: 16 Nov 2009

i365, makers of Evault

Discovering Improved Data Protection Strategies for the Virtual World
sponsored by NetApp
WHITE PAPER: This report examines the impact that virtualization has on data protection and disaster recovery and the need for highly virtualized servers and storage within this context.
Posted: 24 Mar 2010 | Published: 01 Jan 2010

NetApp

Stopping Data Leakage: Making the Most of Your Security Budget
sponsored by Sophos, Inc.
WHITE PAPER: This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefits of encryption in securing data in the event that it does get stolen or lost.
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement