IT Management  >   Systems Operations  >   Storage Management  >   Backups  >  

Recovery Management

RSS Feed    Add to Google    Add to My Yahoo!
Recovery ManagementWhite Papers (View All Report Types)
 
Data Protection Options for Virtualized Servers: Demystifying Virtual Server Data Protection - Best Practices and Technologies
sponsored by Quantum Corporation
WHITE PAPER: Virtualized server environments or infrastructures have varying functionalities and interfaces for application aware integration to enable complete and comprehensive data protection with data and transactional integrity.
Posted: 19 Jun 2008 | Published: 01 Jun 2008

Quantum Corporation

Achieve Immediate Returns With Practical Storage Management
sponsored by Northern Parklife
WHITE PAPER: This white paper in an introduction to Northern Storage Suite, a perfect solution for organizations seeking to implement a systematic approach to storage resource management, once and for all reclaiming control over previously ungoverned storage use.
Posted: 12 Feb 2009 | Published: 12 Feb 2009

Northern Parklife

Technical Whitepaper - Using FalconStor CDP with Microsoft Exchange 2007
sponsored by FalconStor Software
WHITE PAPER: This paper illustrates how to use FalconStor CDP to protect a Microsoft® Exchange 2007 server and its email database(s). It also explains how continuous real-time data journaling and periodic snapshots provide simple, rapid, and granular recovery to any point in time.
Posted: 15 Feb 2010 | Published: 28 Oct 2009

FalconStor Software

Disk-Based Backup and Recovery: Making Sense of Your Options
sponsored by Datalink Corp
WHITE PAPER: This white paper details four enhanced data recovery (disk-based backup) architectures and provides guidance on how to determine whether or not those architectures would be an overall fit within the IT infrastructure.
Posted: 01 Apr 2008 | Published: 01 Sep 2007

Datalink Corp

Best Practices in Data Protection: Encryption, Key Management and Tokenization
sponsored by nuBridges, Inc.
WHITE PAPER: Protecting sensitive and business-critical data is essential to a company’s reputation, profitability and business objectives. This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices.
Posted: 12 Oct 2010 | Published: 12 Oct 2010

nuBridges, Inc.

Disaster Got You Down?
sponsored by CDW Corporation
WHITE PAPER: While trying to predict an outage is impossible, being prepared for one is not. Having the right tools in place to respond to a "disaster" is essential to sustaining a successful organization. A business-continuity / disaster-recovery plan can help you cut costs by avoiding downtime, lost revenue and dissatisfied customers.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

CDW Corporation

Closing the Gaps in Enterprise Data Security: A Model for 360° Protection
sponsored by Sophos, Inc.
WHITE PAPER: This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations worldwide as components of a
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.

IDC: Maintaining Business Continuity with Disk-Based Backup and Recovery Solutions
sponsored by Hewlett-Packard Company
WHITE PAPER: This IDC white paper describes the growing need for data backup and recovery solutions, the advantages of disk-based systems and the software required to manage these systems. Read this white paper to learn more.
Posted: 02 Apr 2008 | Published: 01 Mar 2008

Hewlett-Packard Company

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
sponsored by Aladdin Knowledge Systems
WHITE PAPER: Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
Posted: 28 Jul 2008 | Published: 11 Jun 2008

Aladdin Knowledge Systems

vPower: Virtualization - Powered Data Protection
sponsored by Veeam Software
WHITE PAPER: Learn about Veeam Software's vPower: Virtualization-Powered Data Protection solution as well as read their "How Virtualization Cuts CDP Costs by 80%" white paper that compares the 3 different options of implementing CDP.
Posted: 25 Aug 2010 | Published: 25 Aug 2010

Veeam Software
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement