IT Management  >   Systems Operations  >   Contingency Planning  >  

Computer Data Recovery

RSS Feed   
Computer Data Recovery Reports
 
A Computer Weekly buyer's guide to data protection
sponsored by ComputerWeekly.com
EGUIDE: Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

ComputerWeekly.com

25 Ways to Restore from Office 365 Backups
sponsored by Veeam Software
DATA SHEET: Veeam Backup for Microsoft Office 365 is a comprehensive solution keeping your data safe across Exchange, SharePoint, OneDrive for Business, and Microsoft Teams. Dive into this dat sheet to learn 25 unique ways Veeam Backup can achieve such holistic coverage.
Posted: 30 Jan 2020 | Published: 30 Jan 2020

Veeam Software

Alliant Credit Union Achieves Data Recovery 90% Faster with Commvault
sponsored by Commvault
CASE STUDY: Upholding a high standard for delivery and improving RTO means Alliant Credit Union can’t risk services being disrupted by an infrastructure failure. Read this case study to learn how it reduced its RTO from 36 hours to just four with Commvault Complete Backup & Recovery.
Posted: 26 May 2020 | Published: 26 May 2020

Commvault

Disaster Recovery Planning Ahead
sponsored by OffSiteDataSync and Veeam
EBOOK: A disaster recovery plan will help your organization resume business operations within an acceptable timeframe should an outage or emergency occur. Access this e-book to learn why disaster recovery plans are necessary for businesses of all sizes and get guidance for putting your plan into action.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

OffSiteDataSync and Veeam

Enhance and Extend Your Spectrum Protect
sponsored by Cobalt Iron
WEBCAST: When it comes to finding the right data protection solution, what features should you be looking for? Tune into this webcast to learn 6 of these defining features and discover how Compass from Cobalt Iron leverages them to deliver intelligent data protection.
Posted: 08 May 2020 | Premiered: May 8, 2020

Cobalt Iron

Enhancing Data Protection in Office 365
sponsored by Commvault
ANALYST REPORT: This Osterman Research white paper explains the Office 365 backup, archiving, and eDiscovery essentials, with a discussion of O365's native data protection limitations. Read it now to put this guidance to work in your organization so you can ensure your data is properly protected from all angles.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

Commvault

StorSafe Launch Webinar
sponsored by FalconStor Software
WEBCAST: By leveraging industry-standard container technology to enable persistent long-term archiving, StorSafe improves data portability, accessibility, security, and integrity validation. Tune into this launch webinar to get a more detailed look at the features and functionality of StorSafe.
Posted: 09 Jul 2020 | Premiered: Jul 9, 2020

FalconStor Software

StrongLink Autonomous Data and Storage Management
sponsored by Fujifilm Recording Media USA, Inc.
DATA SHEET: This resource highlights heterogeneous storage management software that simplifies data management and protection across local, network, and cloud storage. Read on to view its metadata identification and aggregation capabilities, as well.
Posted: 06 Feb 2019 | Published: 31 Dec 2018

Fujifilm Recording Media USA, Inc.

Cloud Archiving for Cold and Not-So-Cold Storage
sponsored by Iron Mountain
EGUIDE: This expert guide delves into the cloud archiving market and discusses 4 aspects enterprises should look into when considering a cloud archive solution. Discover how a cloud provider can help your enterprise meet archive regulatory requirements at the lowest possible cost.
Posted: 04 Aug 2016 | Published: 02 Aug 2016

Iron Mountain

Could the WannaCry Decryptor Work on Other Ransomware Strains?
sponsored by Cisco Umbrella
EGUIDE: After the global outbreak of the WannaCry ransomware, researchers created decryptor tools that could save affected files. In this guide, expert Matthew Pascucci explains how the tools work and if they work on other ransomware strains.
Posted: 01 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info