IT Management  >   Systems Operations  >   Storage Management  >   Backups  >  

Recovery Management

RSS Feed    Add to Google    Add to My Yahoo!
Recovery Management White Papers (View All Report Types)
 
Data Protection Strategies Leveraging Replication: An In-Depth Look at Evaluation Criteria and Usage Scenarios
sponsored by Double-Take Software
WHITE PAPER: As dependence on continuous access to critical data grows, so does the importance of avoiding service interruption. This paper examines four data protection strategies and compares their merits for the most common business continuance scenarios.
Posted: 01 May 2009 | Published: 29 Feb 2008

Double-Take Software

HP StorageWorks SAN Virtualization Services Platform: Simplifying Heterogeneous Storage Virtualization
sponsored by Hewlett-Packard Company
WHITE PAPER: Read this report and learn the results of ESG Lab testing of the HP StorageWorks SAN Virtualization Services Platform (SVSP) with a focus on the fundamentals of heterogeneous storage virtualization including centralized management, ease of use, thin provisioning, data mobility and capacity-efficient point-in-time snapshots.
Posted: 16 Mar 2009 | Published: 16 Mar 2009

Hewlett-Packard Company

5 Key Backup Features to Ensure a Successful Backup Redesign
sponsored by Idera
WHITE PAPER: Learn the 5 key features every backup software must offer to ensure your backup redesign is a success.
Posted: 13 Jul 2012 | Published: 11 Jul 2012

Idera

Five Challenges to Continuous PCI DSS Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape.
Posted: 07 Feb 2011 | Published: 07 Feb 2011

Tripwire, Inc.

How to Protect Data Against Theft and Ensure That it Remains Confidential - No Matter Where it is Stored
sponsored by Sophos, Inc.
WHITE PAPER: This white paper introduces SafeGuard Enterprise 5.40, an innovative solution from Sophos that fulfills all the requirements a company could have for protecting confidential data on mobile PCs and data media.
Posted: 19 Nov 2009 | Published: 01 Sep 2009

Sophos, Inc.

Protecting Server Data in Small and Medium-sized Businesses
sponsored by Iron Mountain
WHITE PAPER: Read this white paper to learn how to successfully protect server data outside a centralized data center and focus on specific needs and requirements for SMBs.
Posted: 11 Jan 2010 | Published: 01 Sep 2006

Iron Mountain

Six Secrets to 24x7 Exchange Availability
sponsored by Marathon Technologies
WHITE PAPER: The following six secrets to 24x7, disaster-tolerant Exchange will show you how to implement an Exchange environment with zero lost data and continuous application availability—with no IT intervention—in the event of a disaster.
Posted: 28 Sep 2009 | Published: 28 Sep 2009

Marathon Technologies

Reducing Costs and Creating a More Secure IT Environment with a Holistic Approach to Data Protection: An ROI Analysis of FalconStor Storage Management Solutions
sponsored by FalconStor Software
WHITE PAPER: Data protection and disaster recovery continue to be overarching challenges for most firms. To remedy a myriad of problems with data protection as well as operational and disaster recovery, companies are replacing legacy backup methods with new approaches. Read on to learn more.
Posted: 22 Oct 2010 | Published: 22 Oct 2010

FalconStor Software

Data privacy best practices: time to take action!
sponsored by IBM
WHITE PAPER: This white paper explains the steps you need to consider when developing your privacy strategy and implementing your first data privacy project. Find out how you can help your organization implement best practices in privacy protection and make your privacy project successful from start to finish.
Posted: 04 Sep 2009 | Published: 01 Sep 2008

IBM

Fast and Simple Disaster Recovery with Syncsort ExpressDR
sponsored by Syncsort
WHITE PAPER: Traditional approaches to disaster recovery cannot meet today's requirements. Read this white paper to learn about a comprehensive end-to-end enterprise-wide data protection system for Windows and UNIX environments.
Posted: 28 Mar 2008 | Published: 01 Jan 2007

Syncsort
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement