Backup and Recovery Management Reports

7 NAS encryption best practices to protect data
sponsored by TechTarget ComputerWeekly.com
EBOOK: NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

TechTarget ComputerWeekly.com

Integrating HP Data Protector Software with HP Data Deduplication Solutions
sponsored by HP Inc
WHITE PAPER: This white paper will discuss HP Data Protector Software which fully supports HP data deduplication technologies allowing you to recover files more quickly while reducing your data management and storage costs.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

HP Inc

Time-addressable and Event-addressable Storage: Combining Snapshots and Data Journaling for True Continuous Data Protection
sponsored by American Megatrends Inc.
WHITE PAPER: Although there are many different ideas of what CDP is, it is clear that it must protect data in a manner that is both time-addressable and event-addressable. This white paper explains what this means and gives an overview of effective CDP ...
Posted: 04 Apr 2008 | Published: 14 Mar 2008

American Megatrends Inc.

An Overview of Data Replication
sponsored by Overland Storage
WHITE PAPER: There are many forms of data replication, each with its own features, value and shortcomings. This white paper details the types of data replication and alternative data protection options to help you find the right solution for your business a...
Posted: 30 Jul 2007 | Published: 01 Feb 2007

Overland Storage

Case Study: First Trade Union Bank Adds Vault for LAN-Speed Restores and Robust Replication
sponsored by i365, makers of Evault
CASE STUDY: Despite the economic downturn, First Trade Union Bank is continuing to grow... this case study examines the data center challenges the bank faced in the midst of this growth and show's how by working with i365, they were able to create faster backups/restores, in some cases reduce RTO's by up to 98%, enhance DR and protect their virtual servers.
Posted: 30 Jun 2009 | Published: 30 Jun 2009

i365, makers of Evault

Continuous Data Protection
sponsored by FalconStor Software
PRESENTATION TRANSCRIPT: If your company seeks to eliminate or drastically reduce backup windows to create faster point-in-time recoveries for more mission-critical apps, CDP software is a viable alternative to traditional backup software. Take a few minutes to read this presentation transcript to learn more about the technology.
Posted: 06 May 2009 | Published: 28 Apr 2009

FalconStor Software

Dual Mode Fibre Channel and iSCSI SAN - The Best of Both SAN Storage Worlds
sponsored by Dell | EMC
WHITE PAPER: Discover how you can get the best of both SAN storage worlds. Download this white paper to learn about a solution that brings together the high performance and reliability of Fibre Channel and the low cost and versatility of iSCSI.
Posted: 16 Aug 2007 | Published: 10 Aug 2007

Dell | EMC

TechTalk: Stop Malware at the Web Gateway
sponsored by BlueCoat
WEBCAST: Safeguarding your data from malware and other Web threats takes a layered approach. In this TechTalk webinar Blue Coat Technical Marketing Engineers will lead a discussion on how the Blue Coat ProxyAV works with the ProxySG to create a community-watch based security.
Posted: 14 May 2009 | Premiered: Mar 24, 2009

BlueCoat

HP Data Protector Software Advanced Backup to Disk Integration with Virtual Tape Libraries White Paper
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper provides a better understanding of the integration of HP Data Protector Software with Virtual Tape Libraries by utilizing the Advanced Backup to Disk functionality available with the HP Data Protector Software.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Hewlett Packard Enterprise

Data Protection Strategies Leveraging Replication: An In-Depth Look at Evaluation Criteria and Usage Scenarios
sponsored by Double-Take Software
WHITE PAPER: As dependence on continuous access to critical data grows, so does the importance of avoiding service interruption. This paper examines four data protection strategies and compares their merits for the most common business continuance scenarios.
Posted: 01 May 2009 | Published: 29 Feb 2008

Double-Take Software