CDP

CDP Reports
Digital identity strategies to enhance data privacy and protect networks
sponsored by ComputerWeekly.com
EGUIDE: The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022

ComputerWeekly.com

7 NAS encryption best practices to protect data
sponsored by ComputerWeekly.com
EBOOK: NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

ComputerWeekly.com

Dealing with Data Growth: Storage and Backup Strategies
sponsored by Simplify IT
EGUIDE: This e-guide, from SearchDataBackup.com, examines how the proliferation of business information has contributed to the current state of data protection.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

Simplify IT

4 Backup Technologies to Help Meet Your RTOs
sponsored by EMC Corporation
EGUIDE: This expert E-Guide explores different modern backup technologies that can reduce the amount of data being backed up and help you meet your backup RTOs.
Posted: 09 May 2012 | Published: 09 May 2012

EMC Corporation

IDC Report: An ROI Analysis of FalconStor Storage Management Solutions
sponsored by FalconStor Software
ANALYST REPORT: IDC interviewed eight FalconStor customers that had deployed at least one or a combination of the following FalconStor storage management solutions: Virtual Tape Library (VTL), Network Storage Server (NSS), and Continuous Data Protector (CDP).
Posted: 18 Feb 2010 | Published: 01 Aug 2009

FalconStor Software

The keys to a successful business continuity and DR strategy
sponsored by Citrix
EGUIDE: Developing a business continuity and DR strategy usually involves an extensive amount of information gathering, combined with piecing together products and services that work as a collective. Check out this e-guide to learn the differences between business continuity and DR, discover 4 approaches to a successful combined strategy, and much more.
Posted: 20 Apr 2020 | Published: 20 Apr 2020

Citrix

IDC Report - Reducing Costs and Creating a More Secure IT Environment with a Holistic Approach to Data Protection
sponsored by FalconStor Software
ANALYST REPORT: IDC interviewed eight FalconStor customers that had deployed at least one or a combination of the following FalconStor storage management solutions: Virtual Tape Library (VTL), Network Storage Server (NSS), and Continuous Data Protector (CDP). All customers reported high levels of satisfaction.
Posted: 17 Sep 2009 | Published: 01 Aug 2009

FalconStor Software

Demo: Microsoft Windows 2008 Protection and Recovery Using FalconStor CDP
sponsored by FalconStor Software
PRODUCT DEMO: Access this video demonstration for a detailed look at FalconStor CDP’s ability to protect physical servers and virtual machines, support direct attached storage along with iSCSI and fiber channel SAN connectivity and to work with clustered shared storage.
Posted: 21 Jul 2010 | Premiered: 21 Jul 2010

FalconStor Software

InMage Provides Solid Defense for Tampa Bay Lightning’s Mission-Critical Data and Applications
sponsored by InMage Systems
CASE STUDY: This short case study explores how the pro ice hockey team, Tampa Bay Lightning, easily and affordably implemented one industry-leading backup and recovery software solution that leverages the advantages of disk-based data protection to provided application-aware recovery that can meet both remote and local requirements. Read on to learn more.
Posted: 24 Oct 2013 | Published: 24 Oct 2013

InMage Systems

Agentless Architecture. Agentless Backup is Not A Myth
sponsored by Asigra
WHITE PAPER: Backup and recovery software typically requires agents that are installed onto the host servers that a system administrator wants to back up. The Asigra solution requires no agents, which inherently makes it easier to install and support than legacy backup and recovery solutions. Read this whitepaper to learn more!
Posted: 24 Aug 2010 | Published: 24 Aug 2010

Asigra