IT Management  >   Systems Operations  >   Storage Management  >   Backups  >  

CDP

RSS Feed    Add to Google    Add to My Yahoo!
CDP Reports
 
How to Protect Data Against Theft and Ensure That it Remains Confidential - No Matter Where it is Stored
sponsored by Sophos, Inc.
WHITE PAPER: This white paper introduces SafeGuard Enterprise 5.40, an innovative solution from Sophos that fulfills all the requirements a company could have for protecting confidential data on mobile PCs and data media.
Posted: 19 Nov 2009 | Published: 01 Sep 2009

Sophos, Inc.

3 Options for VMware Disaster Recovery and CDP
sponsored by Veeam Software
WHITE PAPER: Continuous data protection (or CDP) has been used by large enterprises for sometime for disaster recovery and to achieve the highest level of business continuity. Read this whitepaper to find out the 5 things you need to know about CDP and 3 options for VMware disaster recovery.
Posted: 16 Aug 2010 | Published: 16 Aug 2010

Veeam Software

Solution Brief: Unified Backup and Disaster Recovery (DR) for VMware Environments
sponsored by FalconStor Software
WHITE PAPER: Organizations investing in VMware vSphere can leverage the data protection capabilities and application awareness of FalconStor CDP to protect and maximize their VMware purchases. FalconStor CDP enables flexible, affordable, automated, and dependable backup and DR for any VMware vSphere environment.
Posted: 22 Jul 2011 | Published: 22 Jul 2011

FalconStor Software

E-Guide: Backing up Your Virtual Server
sponsored by Symantec Corporation
EGUIDE: Backing up virtual machines is tougher than you think; and the fact of the matter is it’s not a straightforward process! This guide will walk you through how to determine which method is best for your storage requirement.
Posted: 06 Dec 2010 | Published: 06 Dec 2010

Symantec Corporation

Five Cost-Effective Ways to Enable Fast Recovery
sponsored by i365, makers of Evault
WHITE PAPER: This white paper reviews options for a multifaceted recovery strategy, ensuring that your key systems are protected with maximum efficiency at minimal cost.
Posted: 16 Nov 2009 | Published: 16 Nov 2009

i365, makers of Evault

E-Guide: An integrated approach to data storage management
sponsored by Quantum Corporation
EGUIDE: As corporate data continues to grow, data storage management is getting a much needed makeover. This e-guide covers the pros and cons of compression, archiving, deduplication, and continuous data protection, along with suggestions for optimal, integrated use of all four.
Posted: 17 Aug 2011 | Published: 17 Aug 2011

Quantum Corporation

Disaster Recovery Today: Top 3 Vendors and 2 New Tactics
sponsored by EMC & Arrow
EGUIDE: This E-Guide examines the factors driving the recent focus on data protection and points out the top three vendors they are turning to as they evaluate and invest in new recovery software.
Posted: 08 Jul 2013 | Published: 08 Jul 2013

EMC & Arrow

Twynham School Relies on DocAve® to Protect Valuable SharePoint Data
sponsored by AvePoint, Inc.
CASE STUDY: Southwest England's Twynham Comprehensive School used AvePoint's DocAve Backup and Restore to provide reliable, granular, and full-fidelity backup and recovery capabilities to protect their over 50GB of data and hundreds of sites stored on its MOSS environment.
Posted: 04 Feb 2010 | Published: 04 Feb 2010

AvePoint, Inc.

Best Practices in Data Protection: Encryption, Key Management and Tokenization
sponsored by nuBridges, Inc.
WHITE PAPER: Protecting sensitive and business-critical data is essential to a company’s reputation, profitability and business objectives. This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices.
Posted: 12 Oct 2010 | Published: 12 Oct 2010

nuBridges, Inc.

Stopping Data Leakage: Making the Most of Your Security Budget
sponsored by Sophos, Inc.
WHITE PAPER: This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefits of encryption in securing data in the event that it does get stolen or lost.
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.
Browse by Report Type:
CDP White Papers | CDP Multimedia | CDP IT Downloads

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement