IT Management  >   Systems Operations  >   Storage Management  >   Backups  >  

Data Protection

RSS Feed    Add to Google    Add to My Yahoo!
Data Protection Reports
 
9 Backup Types & Methods: Which is Right for Your Business
sponsored by SonicWALL
EGUIDE: This SearchStorage.com expert EGuide will help you understand the various backup options currently available by outlining what each backup type and technology entails, and showing how to choose the right strategy for your business.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

SonicWALL

Presentation Transcript - Maximizing Enterprise Backup and Dedupe Performance for Greater ROI
sponsored by FalconStor Software
PRESENTATION TRANSCRIPT: Let’s take a look at disk and how it is fundamentally changing data protection. This presentation transcript explains how to leverage the advantages of disk for best possible backup performance and maximum ROI.
Posted: 26 Jan 2010 | Published: 26 Jan 2010

FalconStor Software

Five Cost-Effective Ways to Enable Fast Recovery
sponsored by i365, makers of Evault
WHITE PAPER: This white paper reviews options for a multifaceted recovery strategy, ensuring that your key systems are protected with maximum efficiency at minimal cost.
Posted: 16 Nov 2009 | Published: 16 Nov 2009

i365, makers of Evault

Dealing with Data Growth: Storage and Backup Strategies
sponsored by Simplify IT
EGUIDE: This e-guide, from SearchDataBackup.com, examines how the proliferation of business information has contributed to the current state of data protection.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

Simplify IT

Windows Application and Server Backup 2.0: Chapter 12- Tales from the Trenches: My Life with Backup 2.0
sponsored by Dell AppAssure Backup, Replication and Recovery Software
EBOOK: Read the final chapter of this e-book to explore stories about Backup 2.0 - learn how to save money, time and anguish, and discover how to fit your new backup system into the specific niches of your company.
Posted: 31 May 2012 | Published: 31 May 2012

Dell AppAssure Backup, Replication and Recovery Software

Police Academy of the Netherlands Utilizes DocAve® to Replicate and Protect Mission Critical SharePoint® Data
sponsored by AvePoint, Inc.
CASE STUDY: The IT administrators of the Police Academy of the Netherlands demanded a data protection solution that delivered granular, item-level backup and restore capabilities. In their search, they came to DocAve's Backup and Recovery solution as well as their Replicator solution to meet their backup and data protection needs.
Posted: 04 Feb 2010 | Published: 04 Feb 2010

AvePoint, Inc.

American Equipment, Symantec Technologies and Wasatch Software Success
sponsored by Symantec Corporation
VIDEO: Facing a significant growth in data, American Equipment, Inc. needed to improve its data protection and backup. In this case study learn how Symantec Technologies and Wasatch Software were able to meet these needs with Symantec Backup Exec.
Posted: 05 Jul 2012 | Premiered: 05 Jul 2012

Symantec Corporation

E-Guide: An integrated approach to data storage management
sponsored by Quantum Corporation
EGUIDE: As corporate data continues to grow, data storage management is getting a much needed makeover. This e-guide covers the pros and cons of compression, archiving, deduplication, and continuous data protection, along with suggestions for optimal, integrated use of all four.
Posted: 17 Aug 2011 | Published: 17 Aug 2011

Quantum Corporation

3 Options for VMware Disaster Recovery and CDP
sponsored by Veeam Software
WHITE PAPER: Continuous data protection (or CDP) has been used by large enterprises for sometime for disaster recovery and to achieve the highest level of business continuity. Read this whitepaper to find out the 5 things you need to know about CDP and 3 options for VMware disaster recovery.
Posted: 16 Aug 2010 | Published: 16 Aug 2010

Veeam Software

Disaster Recovery with ETERNUS DX – The Data Safe – and VMware SRM
sponsored by Fujitsu America, Inc.
WHITE PAPER: This paper shows the way to protect data and business, where hardware is only one factor. The other factor is the proof that in a worst case scenario the protection works well. The challenge is to test that protection in near real-life situations but without impact on business production.
Posted: 06 Dec 2010 | Published: 06 Dec 2010

Fujitsu America, Inc.
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement