IT Management  >   Systems Operations  >   Storage Management  >   Backups  >  

Recovery Management

RSS Feed    Add to Google    Add to My Yahoo!
Recovery ManagementWhite Papers (View All Report Types)
 
A Guide to Messaging Archiving
sponsored by Sunbelt Software
WHITE PAPER: This white paper discusses the several reasons to implement a messaging archiving system and provides an overview of ten vendors whose offerings are focused squarely on the archiving space.
Posted: 29 Jan 2010 | Published: 29 Jan 2010

Sunbelt Software

Beyond Virtual Tape Libraries: End-to-End Data Protection with Syncsort Disk-to-Disk Solutions
sponsored by Syncsort
WHITE PAPER: While VTL data storage has been a popular data protection solution in recent years, the VTL solution may be incomplete for long-term needs. Read this white paper to learn why D2D backup solutions are the ideal data protection technologies for y...
Posted: 28 Mar 2008 | Published: 01 Jan 2007

Syncsort

Taneja Group Solution Brief: High-End Storage For Everyone
sponsored by Exablox
WHITE PAPER: This white paper explores what SMB and departmental storage buyers should both require and expect from storage solutions to meet their business goals, and how traditional mid- market storage based on old technologies can fall short. Dive in to discover real-life experiences, benefits, cost effectiveness and ease of management
Posted: 31 Jul 2013 | Published: 30 Apr 2013

Exablox

Enabling a safer internet: The positive approach to web security
sponsored by Sophos, Inc.
WHITE PAPER: This paper describes today's new web threats, highlights the need for a positive security model to replace yesterday's access-blocking approach, and describes the three pillars of protection organizations need to safeguard their systems and resources.
Posted: 09 Apr 2009 | Published: 08 Apr 2009

Sophos, Inc.

IDC Technology Spotlight: Optimizing Storage to Reduce Data Footprint and Lower Costs
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper examines data deduplication technologies supported by the latest Storage Solutions from HP. Data deduplication is a hot topic in data protection and therefore, also a relevant topic for HP Data Protector software.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Hewlett-Packard Company

New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER: Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

Disaster Recovery with Sunbelt Exchange Archiver
sponsored by Sunbelt Software
WHITE PAPER: Sunbelt's Exchange Archiver simplifies disaster recovery by using its revolutionary designed Hierarchical Storage Management (HSM). The HSM store is integrated into the SEA server and redirects archived email into various storage media.
Posted: 24 Nov 2008 | Published: 06 Aug 2008

Sunbelt Software

HP StorageWorks tape and disk-to-disk data protection
sponsored by Hewlett Packard Company and Intel
WHITE PAPER: HP protects the integrity of your data and helps you regain access to it. We have a range of change-ready, cost-effective, and trusted solutions that provide the appropriate level of protection based on your specific business requirements.
Posted: 11 Mar 2009 | Published: 03 Nov 2008

Hewlett Packard Company and Intel

Agentless Architecture. Agentless Backup is Not A Myth
sponsored by Asigra
WHITE PAPER: Backup and recovery software typically requires agents that are installed onto the host servers that a system administrator wants to back up. The Asigra solution requires no agents, which inherently makes it easier to install and support than legacy backup and recovery solutions. Read this whitepaper to learn more!
Posted: 24 Aug 2010 | Published: 24 Aug 2010

Asigra

Data privacy best practices: time to take action!
sponsored by IBM
WHITE PAPER: This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Using proven data masking techniques can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
Posted: 24 Feb 2009 | Published: 24 Feb 2009

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement