IT Management  >   Systems Operations  >   Storage Management  >   Backups  >  

Data Protection

RSS Feed    Add to Google    Add to My Yahoo!
Data Protection White Papers (View All Report Types)
SANS: What are their Vulnerabilities? A Survey on Continuous Monitoring
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Continuous monitoring is among the latest approaches to keep your company safe from hackers, but most monitoring systems fall short of what it takes to keep hackers out. Read this SANS survey report to find out why
Posted: 23 Nov 2015 | Published: 31 Oct 2015

Hewlett Packard Enterprise

Closing the Gaps in Enterprise Data Security: A Model for 360° Protection
sponsored by Sophos, Inc.
WHITE PAPER: This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations worldwide as components of a
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

Disaster Recovery with Sunbelt Exchange Archiver
sponsored by Sunbelt Software
WHITE PAPER: Sunbelt's Exchange Archiver simplifies disaster recovery by using its revolutionary designed Hierarchical Storage Management (HSM). The HSM store is integrated into the SEA server and redirects archived email into various storage media.
Posted: 24 Nov 2008 | Published: 06 Aug 2008

Sunbelt Software

Remote Site Business Continuity with Syncsort XRS
sponsored by Syncsort
WHITE PAPER: As companies increasingly migrate to remote areas they face the challenge of how to effectively protect data resources at remote dispersed sites. Read this white paper to learn about a solution that protects data at remote sites with centralized control.
Posted: 28 Mar 2008 | Published: 01 Jan 2007


Six Secrets to 24x7 Exchange Availability
sponsored by Marathon Technologies
WHITE PAPER: The following six secrets to 24x7, disaster-tolerant Exchange will show you how to implement an Exchange environment with zero lost data and continuous application availability—with no IT intervention—in the event of a disaster.
Posted: 28 Sep 2009 | Published: 28 Sep 2009

Marathon Technologies

Solution Brief: Unified Backup and Disaster Recovery (DR) for VMware Environments
sponsored by FalconStor Software
WHITE PAPER: Organizations investing in VMware vSphere can leverage the data protection capabilities and application awareness of FalconStor CDP to protect and maximize their VMware purchases. FalconStor CDP enables flexible, affordable, automated, and dependable backup and DR for any VMware vSphere environment.
Posted: 22 Jul 2011 | Published: 22 Jul 2011

FalconStor Software

Achieve Immediate Returns With Practical Storage Management
sponsored by Northern Parklife
WHITE PAPER: This white paper in an introduction to Northern Storage Suite, a perfect solution for organizations seeking to implement a systematic approach to storage resource management, once and for all reclaiming control over previously ungoverned storage use.
Posted: 12 Feb 2009 | Published: 12 Feb 2009

Northern Parklife

Disaster Recovery Best Practices
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Learn best practices for developing a disaster recovery plan for your organization, including disaster recovery strategies for companies that are using data de-duplication.
Posted: 10 Jun 2008 | Published: 01 Jun 2008

Hewlett Packard Enterprise

Integrating HP Data Protector Software with HP Data Deduplication Solutions
sponsored by HP
WHITE PAPER: This white paper will discuss HP Data Protector Software which fully supports HP data deduplication technologies allowing you to recover files more quickly while reducing your data management and storage costs.
Posted: 10 Dec 2008 | Published: 10 Dec 2008


Time-addressable and Event-addressable Storage: Combining Snapshots and Data Journaling for True Continuous Data Protection
sponsored by Excel Meridian Data, Inc.
WHITE PAPER: This paper discusses explains how replication that is both time-stamped and event addressable through the combined technologies of data snapshots and journaling is true CDP that offers complete system data protection.
Posted: 09 Jun 2008 | Published: 01 Jan 2007

Excel Meridian Data, Inc.
Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement