Software  >   Systems Software  >   Storage Management Software  >   Backup Software  >  

Data Protection Software

RSS Feed    Add to Google    Add to My Yahoo!
Data Protection Software White Papers (View All Report Types)
 
Integrating HP Data Protector Software with HP Data Deduplication Solutions
sponsored by HP
WHITE PAPER: This white paper will discuss HP Data Protector Software which fully supports HP data deduplication technologies allowing you to recover files more quickly while reducing your data management and storage costs.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

HP

Closing the Gaps in Enterprise Data Security: A Model for 360° Protection
sponsored by Sophos, Inc.
WHITE PAPER: This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations worldwide as components of a
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

HP StorageWorks tape and disk-to-disk data protection
sponsored by Hewlett Packard Company and Intel
WHITE PAPER: HP protects the integrity of your data and helps you regain access to it. We have a range of change-ready, cost-effective, and trusted solutions that provide the appropriate level of protection based on your specific business requirements.
Posted: 11 Mar 2009 | Published: 03 Nov 2008

Hewlett Packard Company and Intel

Deduplication in Data Protection: Assessing the Benefits
sponsored by Overland Storage
WHITE PAPER: Data deduplication offers the potential for taming the growth of data and delivering increased management efficiency. This white paper by IDC offers a balanced assessment of the benefits and potential disadvantages of deduplication solutions.
Posted: 12 Nov 2007 | Published: 01 Oct 2007

Overland Storage

Data Protection Strategies Leveraging Replication: An In-Depth Look at Evaluation Criteria and Usage Scenarios
sponsored by Double-Take Software
WHITE PAPER: As dependence on continuous access to critical data grows, so does the importance of avoiding service interruption. This paper examines four data protection strategies and compares their merits for the most common business continuance scenarios.
Posted: 01 May 2009 | Published: 29 Feb 2008

Double-Take Software

Innovative Business Continuity Solutions with Syncsort XRS
sponsored by Syncsort
WHITE PAPER: This white paper describes a single, fifth generation data protection model that assures 24 x 7 uninterrupted business continuity for your organization's mission-critical applications in all information-related disaster scenarios.
Posted: 28 Mar 2008 | Published: 01 Jan 2007

Syncsort

Top Reasons to Upgrade to Symantec Backup Exec™ 12.5 and Backup Exec System Recovery 8.5
sponsored by Symantec Corporation
WHITE PAPER: Download this whitepaper to find out the top reasons to upgrade to a more effective backup system and how to get continuous data protection and complete system recovery.
Posted: 02 Oct 2008 | Published: 02 Oct 2008

Symantec Corporation

ENHANCING YOUR IT ENVIRONMENT USING SNAPSHOTS
sponsored by Dell, Inc.
WHITE PAPER: Snapshots help you improve the productivity and reliability of your backups because they are fast, flexible and affordable. Read this white paper to learn more about snapshot technologies and the benefits they deliver.
Posted: 18 Mar 2008 | Published: 17 Mar 2008

Dell, Inc.

Enterprise Backup and Recovery Methodologies for Oracle
sponsored by Datalink Corp
WHITE PAPER: Database data is extremely valuable and Oracle databases host data that is mission critical for business operations. This white paper examines some of the available options and considerations for backing up and recovering Oracle database environments.
Posted: 01 Mar 2007 | Published: 01 Feb 2007

Datalink Corp

Remote Site Business Continuity with Syncsort XRS
sponsored by Syncsort
WHITE PAPER: As companies increasingly migrate to remote areas they face the challenge of how to effectively protect data resources at remote dispersed sites. Read this white paper to learn about a solution that protects data at remote sites with centralized control.
Posted: 28 Mar 2008 | Published: 01 Jan 2007

Syncsort
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement