IT Management  >   Systems Operations  >   Contingency Planning  >  

Recovery Procedures

RSS Feed    Add to Google    Add to My Yahoo!
Recovery Procedures White Papers (View All Report Types)
 
Full Database Protection Without the Full Backup Plan
sponsored by Oracle Corporation
WHITE PAPER: This white paper explores a recovery appliance that ensures data protection in real-time, at scale, for thousands of databases. Read now to see how this approach can eliminate the need for traditional batch window backups and provide your enterprise with immediate backup copies to recover from failures, corruption, and other potential disasters.
Posted: 26 Jan 2016 | Published: 31 Dec 2015

Oracle Corporation

The Multiple Cloud Connectivity and Recovery Options of Dell Data Protection
sponsored by Dell, Inc.
WHITE PAPER: This white paper compares two backup and recovery platforms and how they differ in support for connectivity to cloud providers, physical and virtual restore capabilities, hardware appliances, and more.
Posted: 02 Mar 2016 | Published: 30 Oct 2015

Dell, Inc.

Data Restoration Services: Vendor Guide for IT
sponsored by Iron Mountain
WHITE PAPER: Discover a data restoration solution that eliminates resource-consuming legacy systems while still providing access to archived data. Access now to discover the benefits this solution can provide to your enterprise, including reduced data center power/cooling costs, faster responses to restore requests, consolidated silos of tape, and more.
Posted: 13 May 2016 | Published: 13 May 2016

Iron Mountain

Consolidating and Protecting Virtualized Enterprise Applications with EMC XtremIO
sponsored by EMC XtremIO
WHITE PAPER: This white paper describes the components, design, functionality, and advantages of hosting a VMware-based, multi-site virtual server infrastructure consisting of consolidated, virtualized enterprise applications on the EMC XtremIO All-Flash array.
Posted: 22 Mar 2016 | Published: 22 Mar 2016

EMC XtremIO

Build and Maintain Secondary Data Centers with DRaaS
sponsored by Veeam Software
WHITE PAPER: This white paper details how cloud-based DR can overcome the limitations of traditional secondary sites by providing the necessary resources for failover operations – without any capital costs or the burden of designing, deploying and managing the DR site daily. Read on to examine an overview of a cloud-based DR solution.
Posted: 08 Feb 2016 | Published: 31 Dec 2015

Veeam Software

How to Enable an Analytics-Driven Approach to Backup and Recovery
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This white paper discusses an analytics-driven solution that supports mission-critical data backup and recovery. Read on to see how this approach can address the dynamic nature of today's data center.
Posted: 04 Nov 2015 | Published: 04 Nov 2015

Hewlett-Packard Enterprise

A Guide to Improving Disaster Recovery With Virtualized Storage
sponsored by IBM
WHITE PAPER: This white paper shows you how to make your disaster recovery as effective possible by implementing storage virtualization.
Posted: 25 Jun 2015 | Published: 25 Jun 2015

IBM

MIMIX Availability: The easy way to protect the availability of even the most complex IBM i environments
sponsored by Vision Solutions
WHITE PAPER: In this white paper, you will learn about a simple, yet robust protection platform that efficiently backs up business applications in the event of a production server failure. Access now for 24/7 availability and storage of all your organization's application data.
Posted: 13 Apr 2016 | Published: 31 Jan 2016

Vision Solutions

How Can I Become an Always-On Business?
sponsored by IBM
WHITE PAPER: This white paper details the 3 prevailing strategies to being an always-on organization to address security threats and protect data without downtime.
Posted: 07 Dec 2015 | Published: 25 Nov 2015

IBM

How Business Continuity Management Can Improve Risk Exposure
sponsored by IBM
WHITE PAPER: This expert resource discusses the key elements that your business continuity strategy needs in order to minimize the cost of security incidents. Read on to discover how to lower the probability of a data breach and reduce the impact if a breach occurs.
Posted: 04 Dec 2015 | Published: 26 Nov 2015

IBM
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement