Hardware  >   Computer Hardware  >   Server Hardware  >  

Backup Hardware

RSS Feed   
Backup Hardware Reports
What's Next For Continuous Data Protection (CDP)
sponsored by Reduxio
RESOURCE: Click inside to read a brief history of how backup has changed over the last 10 years, and learn how one company is taking the next step by integrating secondary storage and data protection directly into the primary storage platform.
Posted: 04 Dec 2017 | Published: 15 Nov 2017


Backup and DRaaS IT Buyer's Guide
sponsored by Unitrends
RESOURCE: Download this backup and DRaaS buyer's guide to simplify the selection process. Included inside are planning checklists, product comparison charts, backup and DRaaS features explained, and more.
Posted: 31 Jan 2018 | Published: 31 Jan 2018


Trends in Server Virtualization
sponsored by arcserve
WHITE PAPER: While virtualization has its benefits such as reduced capital expenditure and operating expenses, it has downsides including server sprawl and risk of single point failure. So is virtualization really worth the fuss? Access this white paper to learn about more benefits and downsides of virtualization and recent advances made to solve these issues.
Posted: 07 Jul 2016 | Published: 06 Jul 2016


Ransomware Recovery Cases: Rebounding After an Attack and the Value of Data Backups
sponsored by Commvault
EGUIDE: In this expert guide, learn how to verify the integrity of your backups in order to thwart, and recover from, potential ransomware attacks. Inside, our writers provide 4 case studies of organizations that were hit then executed a successful ransomware recovery, as well as vendors fighting on the front line of the outbreak.
Posted: 23 Aug 2017 | Published: 22 Aug 2017


Success Stories in Enabling Cloud Mobility and Economic Recovery
sponsored by Rubrik
WHITE PAPER: In this white paper, written in conjunction with our experts and Rubrik, you'll learn from 4 organizations how to successfully navigate cloud migration with an innovative approach to cloud data management. Download now to migrate without burdening your already-stretched IT team, and ensure the right backup policies are in place.
Posted: 26 Jun 2017 | Published: 26 Jun 2017


IT Priorities 2014: UK Europe, France and Germany
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Benchmark your IT spending plans, with our in-depth study of IT spending priorities in the UK, France, Germany, and Europe in 2014.
Posted: 17 Jan 2014 | Published: 17 Jan 2014

TOPICS:  Application Development | Backup for Virtualized Servers | Backup Server Hardware | Backup Software | Backups | Budgeting | Business Continuity Planning | Business Intelligence | Business Process Automation | Business Process Management | Cloud Archive | Cloud Backup | Cloud Computing | Cloud CRM | Cloud Disaster Recovery | Cloud Management | Cloud Security | Cloud Storage | Cloud Storage Services | Cloud Storage Strategy | Compliance Best Practices | CRM | CRM Software | Data Analytics | Data Center Consolidation | Data Center Networking | Data Centers | Data Deduplication | Data Loss Prevention (DLP) | Database Management Software | Desktop Virtualization | Disaster Recovery | ERP | ERP Software | Ethernet Networks | Green Data Center | Green Storage | Hardware | Hybrid clouds | Identity Management | Infrastructure as a Service (IaaS) | ITIL | Mobile CRM | Mobile Device Management | Mobile Device Management Software | Mobile Middleware | Mobile Payments | Mobile Workers | NAS | NAS Software | Network Appliances | Network Architectures | Network Configuration Management | Network Infrastructure | Network Management | Network Monitoring Software | Network Operating Systems | Network Performance Management Software | Network Processors | Network Provisioning | Network Security | Network Security Appliances | Network Security Hardware | Network Security Software | Networking | Networking Hardware | Office Suites | Outsourcing | Platform as a service | Private Cloud | Public Cloud | Remote Access Hardware | Risk Assessment | Risk Management | Security | Security Architectures | Security Audits | Security Best Practices | Security Event Management | Security Hardware | Security Industry | Security Infrastructure | Security Management | Security Managers | Security Policies | Security Software | Security Spending | Security Standards | Security Systems | Security Threats | Security Tokens | Server Appliances | Server Consolidation | Server Hardware | Server Provisioning | Server Software | Server Virtualization | Smart Phones | Social Computing | Software | Software as a Service | Software Implementation | Software Virtualization | Storage Appliances | Storage Architectures | Storage Consolidation | Storage Devices | Storage for File Virtualization/NAS Virtualization | Storage for Virtualized Servers | Storage Hardware | Storage Management | Storage Management Services | Storage Management Software | Storage Media | Storage Resource Management Software | Storage Security | Storage Spending | Storage Switches | Storage Systems | Storage Virtualization | Storage Virtualization Software | Supply Chain Software | Tablet PC | Tape Backups | Testing | Video Services | Videoconferencing Hardware | Videoconferencing Services | Videoconferencing Software | Virtual Desktop Infrastructure | Virtual Machine | Virtualization Security | Vulnerability Management | WAN | WAN Hardware | WAN Switches | WAN Switching | Windows | Windows 7 | Windows Server Software | Windows XP | WLAN | Workforce Management Software

2016 Veeam Availability Report
sponsored by Veeam Software
WHITE PAPER: To satisfy the ever demanding user, businesses must become always-on enterprises with 24/7/265 availability to their users. With hands tied, it's hard for IT managers to achieve this with pressure to perform under tight budgets. Access this white paper to learn about the true scope of these issues and how they should be addressed.
Posted: 02 Jun 2016 | Published: 02 Jun 2016

Veeam Software

ESG Lab Validation Report: Dell PowerVaultDL4000 Appliance
sponsored by Dell Software
WHITE PAPER: IT teams today are faced with swelling data volumes and expanding virtualization, both of which complicate the protection landscape and challenge your staff's resources. The DL4000 protects both physical and virtual servers, nearly eliminating backup windows and providing recovery assurance for data and applications. Read the Report
Posted: 23 Aug 2013 | Published: 31 Jul 2013

Dell Software

The Backup Target Today
sponsored by SearchDataBackup.com
EBOOK: Data backups have evolved dramatically from the days of producing a nightly backup to tape. Modern data protection techniques start with backup targets such as tape libraries and virtual tape libraries to deduplicating disk arrays, integrated backup appliances and the cloud.
Posted: 11 Feb 2014 | Published: 11 Feb 2014


Redefining Tape Backup for the Cloud Era
sponsored by StarWind Software Inc.
WEBCAST: Watch this webcast to learn how you can meet regulatory data archival and retention requirements by adding an AWS cloud storage tier to your existing tape backup system.
Posted: 20 Jun 2017 | Premiered: Jun 15, 2017

StarWind Software Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement