IT Management  >   Systems Operations  >   Storage Management  >   Backups  >  

Continuous Data Protection

RSS Feed    Add to Google    Add to My Yahoo!
ALSO CALLED: Data Protection, CDP, Enterprise Data Backups, Recovery Management, Continuous Backups, Backup and Recovery Management
DEFINITION: Continuous data protection (CDP), also called continuous backup, is a storage system in which all the data in an enterprise is backed up whenever any change is made. In effect, CDP creates an electronic journal of complete storage snapshots, one storage snapshot for every instant in time that data modification occurs.A major advantage of CDP is the fact that it preserves a record of every transaction  … 
Definition continues below.
Continuous Data ProtectionWhite Papers (View All Report Types)
26 - 50 of 162 Matches Previous Page  | Next Page
3 Options for VMware Disaster Recovery and CDP
sponsored by Veeam Software
WHITE PAPER: Continuous data protection (or CDP) has been used by large enterprises for sometime for disaster recovery and to achieve the highest level of business continuity. Read this whitepaper to find out the 5 things you need to know about CDP and 3 options for VMware disaster recovery.
Posted: 16 Aug 2010 | Published: 16 Aug 2010

Veeam Software

New Data Protection Strategies
sponsored by IBM
WHITE PAPER: As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with minimal impact to business.
Posted: 23 Jul 2010 | Published: 20 Jul 2008

IBM

Four Things You Should Know About Cache Battery: Why Cache Battery Life Matters to Your Business
sponsored by CCSS
WHITE PAPER: Cache Battery life may be more important than you think. Learn why cache battery matters to your business, the challenge of cache battery management, the consequences of a failed battery, and the value of cache battery monitoring.
Posted: 27 Apr 2010 | Published: 27 Apr 2010

CCSS

Windows Recovery Solutions for Today’s Environments
sponsored by InMage Systems
WHITE PAPER: This white paper is intended to help you think about that problem with knowledge of pertinent market trends and next generation recovery technologies.
Posted: 23 Apr 2010 | Published: 23 Apr 2010

InMage Systems

Four Steps to Determine When a Standby Generator is Needed for Small Data Centers and Network Rooms
sponsored by APC by Schneider Electric
WHITE PAPER: Small data centers and network rooms vary dramatically in the amount of uninterruptible power supply (UPS) runtime deployed. This paper identifies four steps to identifying if a standby generator is required.
Posted: 01 Apr 2010 | Published: 01 Jul 2007

APC by Schneider Electric

Discovering Improved Data Protection Strategies for the Virtual World
sponsored by NetApp
WHITE PAPER: This report examines the impact that virtualization has on data protection and disaster recovery and the need for highly virtualized servers and storage within this context.
Posted: 24 Mar 2010 | Published: 01 Jan 2010

NetApp

Email Archiving: Common Myths and Misconceptions
sponsored by Dell India
WHITE PAPER: This white paper explores 5 common myths about email archiving, and provides guidance and solutions to solving email management and archiving issues.
Posted: 17 Mar 2010 | Published: 01 Jan 2009

Dell India

Unlocking the Value of Global Deduplication for Enterprise Data Management
sponsored by CommVault Systems, Inc.
WHITE PAPER: The business benefits from deduplication start with lower data protection costs and lead to even better recovery times. The best approaches, such as CommVault® Simpana® software, include deduplication as an integrated component of a complete data management solution.
Posted: 08 Mar 2010 | Published: 08 Mar 2010

CommVault Systems, Inc.

CommVault® Simpana® Backup and Recovery for Enterprise Deployments
sponsored by CommVault Systems, Inc.
WHITE PAPER: CommVault® Simpana® Backup and Recovery software delivers what you really need: reliable data protection, multiple recovery options and sophisticated data retention capabilities, allowing the maximum return on investment that is designed for fast, easy deployment within your existing infrastructure.
Posted: 08 Mar 2010 | Published: 08 Mar 2010

CommVault Systems, Inc.

How Virtualization Cuts CDP Costs by 80%
sponsored by Veeam Software
WHITE PAPER: This white paper compares 3 different options of implementing CDP (continuous data protection) and shows how virtualization-enabled CDP - or Near-CDP - becomes the most affordable and most logical disaster recovery choice for businesses of all sizes.
Posted: 18 Feb 2010 | Published: 17 Feb 2010

Veeam Software

Whitepaper - Merging Backup and DR Processes
sponsored by FalconStor Software
WHITE PAPER: This paper describes how continuous data protection (CDP) technology can bridge various DR methodologies to help organizations overcome the challenges of tape and achieve maximum benefits from their IT investments.
Posted: 15 Feb 2010 | Published: 12 Feb 2010

FalconStor Software

Technical Whitepaper - Using FalconStor CDP with Microsoft Exchange 2007
sponsored by FalconStor Software
WHITE PAPER: This paper illustrates how to use FalconStor CDP to protect a Microsoft® Exchange 2007 server and its email database(s). It also explains how continuous real-time data journaling and periodic snapshots provide simple, rapid, and granular recovery to any point in time.
Posted: 15 Feb 2010 | Published: 28 Oct 2009

FalconStor Software

Whitepaper - Simplifying Disaster Recovery (DR): One-Button Failover/Failback for Combined Physical/Virtual Data Centers
sponsored by FalconStor Software
WHITE PAPER: The FalconStor® Continuous Data Protector (CDP) solution can be deployed in conjunction with VMware vCenter Site Recovery Manager. This unique implementation dramatically speeds both processes and reduces costs while ensuring achievement of recovery time objectives (RTO).
Posted: 15 Feb 2010 | Published: 11 Feb 2010

FalconStor Software

Customer Satisfaction with Email Archiving Systems
sponsored by Sunbelt Software
WHITE PAPER: Email archiving is rapidly becoming a critical best practice for organizations of all sizes and across all industries. This white paper compares Sunbelt Exchange Archiver (SEA) with a cross-section of other email archiving offerings, to help decision makers in the evaluation process.
Posted: 29 Jan 2010 | Published: 29 Jan 2010

Sunbelt Software

A Guide to Messaging Archiving
sponsored by Sunbelt Software
WHITE PAPER: This white paper discusses the several reasons to implement a messaging archiving system and provides an overview of ten vendors whose offerings are focused squarely on the archiving space.
Posted: 29 Jan 2010 | Published: 29 Jan 2010

Sunbelt Software

The Case for Third-Party Archiving in Exchange 2010
sponsored by Sunbelt Software
WHITE PAPER: This white paper will give you a brief overview of Sunbelt Software, while educating decision makers about the important role that email and other content archiving plays in minimizing risk and lowering the cost of doing business, the capabilities of archiving in Exchange 2020, and more.
Posted: 28 Jan 2010 | Published: 28 Jan 2010

Sunbelt Software

Protecting Server Data in Small and Medium-sized Businesses
sponsored by Iron Mountain
WHITE PAPER: Read this white paper to learn how to successfully protect server data outside a centralized data center and focus on specific needs and requirements for SMBs.
Posted: 11 Jan 2010 | Published: 01 Sep 2006

Iron Mountain

Stopping Data Leakage: Making the Most of Your Security Budget
sponsored by Sophos, Inc.
WHITE PAPER: This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefits of encryption in securing data in the event that it does get stolen or lost.
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

Closing the Gaps in Enterprise Data Security: A Model for 360° Protection
sponsored by Sophos, Inc.
WHITE PAPER: This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations worldwide as components of a
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

How to Protect Data Against Theft and Ensure That it Remains Confidential - No Matter Where it is Stored
sponsored by Sophos, Inc.
WHITE PAPER: This white paper introduces SafeGuard Enterprise 5.40, an innovative solution from Sophos that fulfills all the requirements a company could have for protecting confidential data on mobile PCs and data media.
Posted: 19 Nov 2009 | Published: 01 Sep 2009

Sophos, Inc.

Five Cost-Effective Ways to Enable Fast Recovery
sponsored by i365, makers of Evault
WHITE PAPER: This white paper reviews options for a multifaceted recovery strategy, ensuring that your key systems are protected with maximum efficiency at minimal cost.
Posted: 16 Nov 2009 | Published: 16 Nov 2009

i365, makers of Evault

Six Secrets to 24x7 Exchange Availability
sponsored by Marathon Technologies
WHITE PAPER: The following six secrets to 24x7, disaster-tolerant Exchange will show you how to implement an Exchange environment with zero lost data and continuous application availability—with no IT intervention—in the event of a disaster.
Posted: 28 Sep 2009 | Published: 28 Sep 2009

Marathon Technologies

Storage-Based Replication Options: Selecting the Right Replication Method for Optimal Data Protection
sponsored by Dell, Inc.
WHITE PAPER: Backup is the core of data protection because it provides the ability to recover data from either physical disasters or common data loss conditions. But backup can have drawbacks - regular disruption of production applications, long recovery time, and significant data/work loss. Replication technologies were developed to shorten recovery time..
Posted: 08 Sep 2009 | Published: 29 Jul 2009

Dell, Inc.

Disaster Got You Down?
sponsored by CDW Corporation
WHITE PAPER: While trying to predict an outage is impossible, being prepared for one is not. Having the right tools in place to respond to a "disaster" is essential to sustaining a successful organization. A business-continuity / disaster-recovery plan can help you cut costs by avoiding downtime, lost revenue and dissatisfied customers.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

CDW Corporation

Data privacy best practices: time to take action!
sponsored by IBM
WHITE PAPER: This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
Posted: 04 Sep 2009 | Published: 01 Sep 2008

IBM
26 - 50 of 162 Matches Previous Page    1 2 3 4 5    Next Page
 
CONTINUOUS DATA PROTECTION DEFINITION (continued): …  that takes place in the enterprise. In addition, if the system becomes infected with a virus or Trojan, or if a file becomes mutilated or corrupted and the problem is not discovered until some time later, it is always possible to recover the most recent clean copy of the affected file. A CDP system with disk storage offers data recovery in a matter of seconds -- much less time than is the case with tape backups or archives. Installation of CDP hardware and programming is straightforward and simple and does not put existing data at risk.The market for CDP products is expected to grow as businesses … 
Continuous Data Protection definition sponsored by SearchStorage.com, powered by WhatIs.com an online computer dictionary

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement