IT Management  >   Systems Operations  >   Contingency Planning  >  

Recovery Procedures

RSS Feed    Add to Google    Add to My Yahoo!
Recovery Procedures White Papers (View All Report Types)
 
Technology in Action: Kingston Tech Migrates to a Broadband WAN
sponsored by Silver Peak
WHITE PAPER: Access this white paper and see how Kingston Technology implemented a software-defined WAN to reduce costs and complexity while streamlining data replication efforts.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

Silver Peak

Automated Cloud Migration and DR for Multi-tier, Physical and Virtual Production Apps
sponsored by CloudVelox
WHITE PAPER: There is a hybrid cloud tool that not only covers all of the processes in involved in cloud migration, but automates them as well. Access this white paper to take a quick look at One Hybrid Cloud software and see what hybrid cloud is capable of.
Posted: 24 Feb 2017 | Published: 30 Dec 2016

CloudVelox

5 Ways to Get Control of Your Backup and Recovery in Today's Environment
sponsored by Commvault
WHITE PAPER: This white paper explores the idea of a single, integrated data backup, recovery, retention, search, and access platform that's designed from the beginning to be holistic. Discover 5 ways it can improve data management and help you unlock efficiency without adding complexity.
Posted: 13 Oct 2016 | Published: 13 Oct 2016

Commvault

DR-to-the-Cloud Best Practices
sponsored by Rackspace
WHITE PAPER: This exclusive white paper will provide you with a set of best practices for disaster recovery in the cloud.
Posted: 18 Jun 2014 | Published: 18 Jun 2014

Rackspace

5 Reasons Your Storage Snapshots Aren't Working
sponsored by Commvault
WHITE PAPER: View this white paper to discover the secret 5 reasons your storage snapshots don't perform properly. Read on to learn about how a solution automates complex recovery processes and provides you with a granular recovery system.
Posted: 26 Nov 2014 | Published: 22 Oct 2014

Commvault

Cost of Data Breach Study: Global Analysis
sponsored by IBM
WHITE PAPER: This white paper presents IBM and Ponemon Institute's 2015 Cost of Data Breach Study, and explains the 3 major reasons contributing to a higher cost of data breach in 2015. Read on here to access the key findings from the report.
Posted: 04 Sep 2015 | Published: 04 Sep 2015

IBM

A New Approach to Remote Replications
sponsored by IBM
WHITE PAPER: This resource examines the steps organizations can take in order to improve network utilization and speed up data transfer for more effective remote replication.
Posted: 01 Apr 2015 | Published: 01 Apr 2015

IBM

Virtual Server Protection: A Buyer's Checklist
sponsored by Commvault
WHITE PAPER: Read this list of key features you need in a virtual server protection solution so you can protect your mission-critical data in any infrastructure.
Posted: 04 Dec 2014 | Published: 04 Dec 2014

Commvault

Forrester on: The State of Business Technology Resiliency, Q2 2014
sponsored by Dell, Inc. and Intel
WHITE PAPER: Discover the six trends that describe the state of resiliency today, and learn why companies are looking to the cloud and co-location for failover sites.
Posted: 24 Jun 2014 | Published: 12 May 2014

Dell, Inc. and Intel

Hybrid Storage Arrays: Solution Overview
sponsored by Microsoft
WHITE PAPER: This white paper uncovers a hybrid storage array that automates time-consuming data protection and storage capacity scaling so that you can spend less time tending to your storage infrastructures. Read on to learn the benefits this array can provide for your storage.
Posted: 14 Dec 2015 | Published: 31 Jul 2014

Microsoft
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement