IT Management  >   Systems Operations  >   Contingency Planning  >  

Computer Data Recovery

RSS Feed    Add to Google    Add to My Yahoo!
Computer Data Recovery Reports
 
Data Protection Strategies in the Era of Flash Storage
sponsored by Rubrik
WHITE PAPER: This white paper looks at some of the operating realities of data protection in an era of flash storage. Uncover some helpful ideas on how IT organizations can evolve their data protection strategies to align with flash's many benefits.
Posted: 11 Oct 2016 | Published: 11 Oct 2016

Rubrik

4 Steps to a Tapeless Backup Environment: A Guide For Data Management Success
sponsored by Iron Mountain
WHITE PAPER: A tapeless environment can enhance data backup, recovery, and disaster recovery and highlights the critical considerations and decisions that should be made to do so. Read on and access a 4 step outline for successful migration to a tapeless strategy.
Posted: 04 Aug 2016 | Published: 31 Dec 2015

Iron Mountain

Granular Recovery of Active Directory Objects
sponsored by Veeam Software
WHITE PAPER: A fixture in corporate environments, Active Directory is powerful but a pain to manage. Even with LDAP protocol, system admins spend a tedious amount of time creating and removing Active Directory objects with the constant possibility of things going wrong.Read this white paper to learn easier methods of recovering Active Directory objects.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Veeam Software

LCL Bulk Transport: The Case Study
sponsored by QuorumLabs Inc.
CASE STUDY: This case study explains how one BDR solution was able to transform two transportation companies. Discover the solution that was suitable for two fast paced transportation companies where downtime just wasn't acceptable.  
Posted: 09 Jan 2017 | Published: 09 Jan 2017

QuorumLabs Inc.

Can Secure Cloud Storage Solve the Long-Term Archiving Dilemma?
sponsored by Iron Mountain
WHITE PAPER: Explore the cloud-based archive solutions market, and discover the benefits of object storage as flexible software construct for digital archives. Together, cloud services and object storage can provide your enterprise with the ability to leverage an object storage repository without building a large infrastructure for it.
Posted: 13 Jul 2016 | Published: 13 Jul 2016

Iron Mountain

Data Exfiltration in Depth
sponsored by Intel Security
WEBCAST: Data exfiltration and data loss prevention experts go in-depth into common data exfiltration techniques and how to detect a possible attack. They'll provide quantitative research about data loss attempts and detail data loss prevention processes and tools.
Posted: 17 May 2016 | Premiered: Apr 1, 2016

Intel Security

Case Study: Texas Tech University Requires Updated Backup & Recovery Software
sponsored by Commvault
CASE STUDY: Check out this informative case study to find out which software Texas Tech University implemented to meet their environments needs.
Posted: 30 Dec 2014 | Published: 07 Jan 2013

Commvault

Best Practices for Your Disaster Recovery/Business Continuity Plan
sponsored by McKesson Corporation
WHITE PAPER: In this expert guide, discover 10 best practice tips to ensure your disaster recovery/business continuity plan meets your enterprise's data security needs. Also learn how backup and disaster recovery, historically treated as separately, are converging to provide a more cohesive data management plan.
Posted: 13 Sep 2016 | Published: 12 Sep 2016

McKesson Corporation

Achieve a Complete Data Protection Strategy in 3 Easy Steps
sponsored by Quantum Corporation
RESOURCE: You can eliminate the challenges of protecting and storing your virtual data by combining a deduplication appliance, tape library, and backup and replication software. Check out this exclusive storage offer for a free tape library today.
Posted: 19 Feb 2016 | Published: 31 Jan 2016

Quantum Corporation

Six Steps to Buying Data Loss Prevention Products
sponsored by Intel Security
EGUIDE: Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement