CDP Reports

4 data privacy predictions for 2022
sponsored by ComputerWeekly.com
INFOGRAPHIC: Over the last two years, businesses and employees saw their workspace change forever with the rise of hybrid and remote work. All of a sudden, data privacy became a top priority for enterprises all over the world. As attention continues to build, here are four data privacy predictions for 2022 and beyond.
Posted: 08 Mar 2022 | Published: 08 Mar 2022

ComputerWeekly.com

7 NAS encryption best practices to protect data
sponsored by ComputerWeekly.com
EBOOK: NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

ComputerWeekly.com

Focus on Endpoint Data Protection
sponsored by Druva
EGUIDE: Whether it's employee laptops, mobile devices, or remote offices, endpoint data protection is an increasing concern for data storage managers. Find out in this e-guide which approaches and technologies work best when it comes to storing and protecting endpoint data.
Posted: 30 Mar 2011 | Published: 30 Mar 2011

Druva

Simplify Remote Office Data Recovery
sponsored by IBM
WHITE PAPER: This white paper reviews the factors that can make data recovery in remote offices a complicated problem and describes the range of technology options available, explaining the benefits and shortcomings of each in the context of remote offices.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

IBM

Improving Backup Effectiveness and Cost-Efficiency with Deduplication
sponsored by Fujitsu America, Inc.
WHITE PAPER: This paper focuses on the ETERNUS CS800 solution, Fujitsu's new file-, OST-, and VTL-interface disk target solution with deduplication, that is ideally suited for mid-market organizations and remote and branch offices (ROBOs) of larger organizations seeking to reduce or eliminate their dependence on physical tape media for tape backup.
Posted: 06 Dec 2010 | Published: 01 Oct 2010

Fujitsu America, Inc.

Adaptec Zero-Maintenance Cache Protection
sponsored by Adaptec, Inc.
PRODUCT OVERVIEW: Adaptec Series 5Z RAID controllers with Zero-Maintenance Cache Protection (ZMCP - pronounced “zemcap”) provide maximum protection for cached data and eliminate the substantial costs and environmental impact of complex, messy and expensive Lithium Ion batteries, while improving cache protection and cache performance.
Posted: 04 Nov 2009 | Published: 04 Nov 2009

Adaptec, Inc.

How Virtualization Cuts CDP Costs by 80%
sponsored by Veeam Software
WHITE PAPER: This white paper compares 3 different options of implementing CDP (continuous data protection) and shows how virtualization-enabled CDP - or Near-CDP - becomes the most affordable and most logical disaster recovery choice for businesses of all sizes.
Posted: 18 Feb 2010 | Published: 17 Feb 2010

Veeam Software

Disaster Got You Down?
sponsored by CDW Corporation
WHITE PAPER: While trying to predict an outage is impossible, being prepared for one is not. Having the right tools in place to respond to a "disaster" is essential to sustaining a successful organization. A business-continuity / disaster-recovery plan can help you cut costs by avoiding downtime, lost revenue and dissatisfied customers.
Posted: 08 Sep 2009 | Published: 08 Sep 2009

CDW Corporation

American Equipment, Symantec Technologies and Wasatch Software Success
sponsored by Symantec Corporation
VIDEO: Facing a significant growth in data, American Equipment, Inc. needed to improve its data protection and backup. In this case study learn how Symantec Technologies and Wasatch Software were able to meet these needs with Symantec Backup Exec.
Posted: 05 Jul 2012 | Premiered: 05 Jul 2012

Symantec Corporation

Data Protection: Evaluating Business Requirements & Classifying Your Data
sponsored by BakBone
WHITE PAPER: This paper discusses an approach to evaluating data at a business level, and implementing a data protection strategy that safeguards your organization based on the value of its data.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

BakBone