IT Management  >   Systems Operations  >   Storage Management  >   Backups  >  

Continuous Backups

RSS Feed    Add to Google    Add to My Yahoo!
Continuous Backups Reports
 
Exchange Insider E-Zine - Volume 5: When Disaster Strikes in Exchange Server 2010
sponsored by Google
EZINE: Volume 5 of the Exchange Insider e-zine looks at how Exchange Server 2010’s database availability groups can ease an administrator’s backup and disaster recovery stress. Also learn how Forefront Protection 2010 can help defend Exchange 2010 servers from spam and malware attacks, and best practices for email archiving and e-discovery.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google

3 Options for VMware Disaster Recovery and CDP
sponsored by Veeam Software
WHITE PAPER: Continuous data protection (or CDP) has been used by large enterprises for sometime for disaster recovery and to achieve the highest level of business continuity. Read this whitepaper to find out the 5 things you need to know about CDP and 3 options for VMware disaster recovery.
Posted: 16 Aug 2010 | Published: 16 Aug 2010

Veeam Software

Video: Getting started: EMC NetWorker is quicker and easier than ever before
sponsored by EMC Corporation
VIDEO: Getting started with EMC NetWorker is quicker and easier than ever before. Michael Wilke, Director, Software Marketing with EMC, introduces the availability of a full-version NetWorker for midsize organizations in a simple to order and easy to implement package with attractive pricing.
Posted: 15 Dec 2009 | Premiered: 15 Dec 2009

EMC Corporation

Best Practices in Data Protection: Encryption, Key Management and Tokenization
sponsored by nuBridges, Inc.
WHITE PAPER: Protecting sensitive and business-critical data is essential to a company’s reputation, profitability and business objectives. This white paper describes best practices in encryption, key management and tokenization and how an integrated, multi-level solution can effectively meet these best practices.
Posted: 12 Oct 2010 | Published: 12 Oct 2010

nuBridges, Inc.

What are Continuous Data Protection Software's Pros And Cons?
sponsored by Dell EMC and Intel®
EGUIDE: Click inside this expert-guide and learn the pros and cons of continuous data protection software.
Posted: 26 Jun 2017 | Published: 20 Jun 2017

Dell EMC and Intel®

Podcast: Leading Manufacturer of Cleaning Products Reduces Data Recovery Times from Days to Minutes
sponsored by FalconStor Software
PODCAST: Learn how Rug Doctor, a leading manufacturer of cleaning products, improved its RTO/RPO and replaced its tape backup system using FalconStor CDP for fast disaster recovery (DR) in tandem with VMware technology for server virtualization.
Posted: 18 Jul 2011 | Premiered: Jul 18, 2011

FalconStor Software

Demo: Microsoft Windows 2008 Protection and Recovery Using FalconStor CDP
sponsored by FalconStor Software
PRODUCT DEMO: Access this video demonstration for a detailed look at FalconStor CDP’s ability to protect physical servers and virtual machines, support direct attached storage along with iSCSI and fiber channel SAN connectivity and to work with clustered shared storage.
Posted: 21 Jul 2010 | Premiered: 21 Jul 2010

FalconStor Software

Integrated Recovery Solutions: An Emerging Trend in Disaster Recovery
sponsored by InMage Systems
ANALYST REPORT: What if there was one product that could provide all the components needed for a complete disaster recovery solution? IDC sees an emerging trend in the market for this type of solution, one that could be defined as an "integrated recovery solution."
Posted: 20 Apr 2010 | Published: 01 Feb 2010

InMage Systems

NetApp Syncsort Integrated Backup: Advanced Data Protection and Disaster Recovery
sponsored by NetApp
WHITE PAPER: Syncsort’s data protection software has been teamed successfully with NetApp’s SnapMirror and SnapVault technology for some time, creating an integrated disk-based solution for data protection and disaster recovery of mission-critical digital assets.
Posted: 05 Jan 2012 | Published: 05 Jan 2012

NetApp

Stopping Data Leakage: Making the Most of Your Security Budget
sponsored by Sophos
WHITE PAPER: This paper demonstrates the need for a high-profile acceptable use policy to prevent data leakage, gives practical guidance on how to use your security budget effectively to protect data at the gateway and endpoint, and highlights the benefits of encryption in securing data in the event that it does get stolen or lost.
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement