Software  >   Systems Software  >   Storage Management Software  >   Backup Software  >  

Data Protection Software

RSS Feed    Add to Google    Add to My Yahoo!
Data Protection SoftwareReports
 
How Snapshot and CDP Integrate with Data Backup
sponsored by SearchStorage.com
EBOOK: This Handbook explores why one expert believes replication, CDP and snapshots are keys to a successful data backup strategy; how virtualization gives CDP a big boost; and the many types of snapshots available today.
Posted: 26 Aug 2013 | Published: 26 Aug 2013

SearchStorage.com

Five Steps to Reduce Your Backup Window
sponsored by Overland Storage
WHITE PAPER: Backup windows are a constant headache for storage administrators and they're constantly trying to find new ways to reduce them. This white paper explains 5 easy steps that will help make shorter backup windows a reality. Read this white paper to l...
Posted: 12 Feb 2008 | Published: 01 Feb 2008

Overland Storage

Near-Instant Oracle Cloning with Syncsort AdvancedClient Technologies
sponsored by Syncsort
WHITE PAPER: Creating a full physical clone of an Oracle database can cause a number of headaches for Oracle administrators. Read this white paper for tips on how to streamline this process and to help you avoid the headaches.
Posted: 28 Mar 2008 | Published: 01 Jan 2007

Syncsort

Hitachi Storage Solutions at Work
sponsored by Hitachi Data Systems
CASE STUDY: This white paper highlights how a financial organization was able to secure their banking and transaction data with Hitachi Storage Solutions. Read this white paper to learn how they did it and how they overcame many of their storage challenges.
Posted: 29 Oct 2007 | Published: 01 Jun 2006

Hitachi Data Systems

HP Data Protector Software Advanced Backup to Disk Integration with Virtual Tape Libraries White Paper
sponsored by Hewlett-Packard Company
WHITE PAPER: This white paper provides a better understanding of the integration of HP Data Protector Software with Virtual Tape Libraries by utilizing the Advanced Backup to Disk functionality available with the HP Data Protector Software.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Hewlett-Packard Company

High Availability Solutions in Exchange Server 2007 That Eliminate the Need for Disaster Recovery
sponsored by Marathon Technologies
PRESENTATION TRANSCRIPT: In this transcript featuring Exchange expert Peter Bruzzese, learn how to utilize tools for high availability (HA) that can eliminate the need for disaster recovery in Exchange Server 2007 environments. Find out how to ensure optimal uptime, availability and recovery in your Exchange environment.
Posted: 15 Feb 2010 | Published: 15 Feb 2010

Marathon Technologies

ExaGrid: A Scalable Approach to Disk-based Backup
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: Looking for a new disk-based backup solution? Download this Taneja Group white paper to learn some key criteria to consider when evaluating disk-based data protection vendors and how one company matches up against these criteria.
Posted: 20 Nov 2008 | Published: 20 Oct 2008

ExaGrid Systems, Inc.

Data Loss Prevention from the Inside Out
sponsored by Cisco Systems, Inc.
VIDEOCAST: In this Techwise TV episode learn about data loss prevention and the three primary loss vectors that you must assess for your organization.
Posted: 08 Jul 2008 | Premiered: Jun 26, 2008

Cisco Systems, Inc.

InMage Provides Solid Defense for Tampa Bay Lightning’s Mission-Critical Data and Applications
sponsored by InMage Systems
CASE STUDY: This short case study explores how the pro ice hockey team, Tampa Bay Lightning, easily and affordably implemented one industry-leading backup and recovery software solution that leverages the advantages of disk-based data protection to provided application-aware recovery that can meet both remote and local requirements. Read on to learn more.
Posted: 24 Oct 2013 | Published: 24 Oct 2013

InMage Systems

Closing the Gaps in Enterprise Data Security: A Model for 360° Protection
sponsored by Sophos, Inc.
WHITE PAPER: This paper examines the primary data threats that currently concern chief security officers (CSOs) and IT security management within enterprises, and recommends best-practice techniques to minimize and overcome risks to data security. These best practices have been successfully implemented and deployed in organizations worldwide as components of a
Posted: 19 Nov 2009 | Published: 19 Nov 2009

Sophos, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement