IT Management  >   Systems Operations  >   Storage Management  >   Backups  >  

Data Protection

RSS Feed    Add to Google    Add to My Yahoo!
Data Protection White Papers (View All Report Types)
 
Backup Express and Novell Open Enterprise Server: A Business Continuity Model for OES Migration
sponsored by Syncsort
WHITE PAPER: An operating system migration might complicate backup and recovery if you are not cautious. This white paper offers guidelines to assess whether your business-critical data and applications are protected and available during a migration project.
Posted: 28 Mar 2008 | Published: 01 Mar 2008

Syncsort

Remote Site Business Continuity with Syncsort XRS
sponsored by Syncsort
WHITE PAPER: As companies increasingly migrate to remote areas they face the challenge of how to effectively protect data resources at remote dispersed sites. Read this white paper to learn about a solution that protects data at remote sites with centralized control.
Posted: 28 Mar 2008 | Published: 01 Jan 2007

Syncsort

Disaster Recovery with Sunbelt Exchange Archiver
sponsored by Sunbelt Software
WHITE PAPER: Sunbelt's Exchange Archiver simplifies disaster recovery by using its revolutionary designed Hierarchical Storage Management (HSM). The HSM store is integrated into the SEA server and redirects archived email into various storage media.
Posted: 24 Nov 2008 | Published: 06 Aug 2008

Sunbelt Software

How Virtualization Cuts CDP Costs by 80%
sponsored by Veeam Software
WHITE PAPER: This white paper compares 3 different options of implementing CDP (continuous data protection) and shows how virtualization-enabled CDP - or Near-CDP - becomes the most affordable and most logical disaster recovery choice for businesses of all sizes.
Posted: 18 Feb 2010 | Published: 17 Feb 2010

Veeam Software

Neverfail Heartbeat Failover Engine
sponsored by Neverfail
WHITE PAPER: Check out this white paper to explore a business continuity solution that continuously keeps your applications up in the face of any threat to system availability.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

Neverfail

Agentless Architecture: Agentless Backup is Not a Myth
sponsored by Asigra
WHITE PAPER: Agentless backup is NOT a myth. The Asigra solution is proof because it requires no agents, which inherently makes it easier to install and support than legacy backup and recovery solutions. This paper serves as an introduction to Asigra's Hybrid Cloud Backup and Recovery Software.
Posted: 20 Apr 2009 | Published: 20 Apr 2009

Asigra

Stopping Data Leakage: Making the Most of Your Security Budget
sponsored by Sophos, Inc.
WHITE PAPER: This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefits of encryption in securing data in the event that it does get stolen or lost.
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

7 Requirements of Data Loss Prevention
sponsored by Symantec Corporation
WHITE PAPER: This report provides a clear understanding of the capabilities a successful data loss prevention solution must deliver. It also incorporates insight into the capabilities that companies require from their solution.
Posted: 10 Mar 2009 | Published: 10 Mar 2009

Symantec Corporation

Data privacy best practices: time to take action!
sponsored by IBM
WHITE PAPER: This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Using proven data masking techniques can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
Posted: 24 Feb 2009 | Published: 24 Feb 2009

IBM

Streamline Your Storage Usage: 4 Straightforward Ways To True NAS Management
sponsored by Northern Parklife
WHITE PAPER: In a relatively short span of time, Network Attached Storage [NAS] has become a popular, widely implemented technology given its many attractive features and benefits. This whitepaper details four techniques for managing network attached storage, including file management simplification and data access without server intervention.
Posted: 12 Feb 2009 | Published: 12 Feb 2009

Northern Parklife
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement