IT Management  >   Systems Operations  >   Contingency Planning  >  

Data Recovery

RSS Feed   
ALSO CALLED: Restore Deleted, Data-recovery, Disk Recovery, Computer Data Recovery, Disc Recovery
DEFINITION: The restoration of data that has been physically damaged or corrupted.
Data Recovery Reports
1 - 25 of 721 Matches Previous Page  |  Next Page
University of Canberra saves A 135,000 by eliminating tapes with AWS and Commvault
sponsored by Commvault
CASE STUDY: By implementing a holistic solution that supported the cloud service providers they wanted to use, UC was able to reduce storage overhead by A$135,000 and improve their back up window by 38%. Read this case study to discover the solution UC put in place to transform their storage and to hear the remaining benefits they experienced.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Commvault

Ransomware - Protect Your Data
sponsored by Commvault
WEBCAST: One trend that is gaining popularity in ransomware is a holistic solution because of its ability to align recovery operations to the value of the data. Access this webcast to learn the key takeaways from the Gartner report, analyze real world ransomware case studies, and discover the 4 key elements of a risk mitigation strategy.
Posted: 17 Jan 2020 | Premiered: Jan 17, 2020

Commvault

Cost Efficient Backups for the Enterprise
sponsored by Druva
WHITE PAPER: Access this white paper for a rundown of the pros and cons of each type of deduplication and to view a solution that unifies data protection with global dedupe to break up operational silos and simplify administration.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

Druva

9 Steps to Critical Event Management Improvement
sponsored by EverBridge Inc.
EGUIDE: By leveraging a holistic approach to CEM, organizations can look forward to a more unified, distributed, automated, and collaborative process. Access this white paper to discover an essential 9-step CEM process that organizations can use to improve their responses to critical events.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

EverBridge Inc.

Fraud Detection in Healthcare
sponsored by Dataiku
EGUIDE: There are many AI-based use cases that span the healthcare industry, all with the goal of improving patient care. Access this white paper to learn the 3 basic types of anomalies that may be detected and to learn how to confront the challenges of fraud and anomaly detection with 4 AI and ML-based approaches.
Posted: 14 Jan 2020 | Published: 14 Jan 2020

Dataiku

A Place for Your Stuff: The Need for Cloud Storage for Archival Data
sponsored by Somerville
WHITE PAPER: With a hybrid data protection and archiving strategy, your organization can achieve quick recovery, increase backup performance, and reduce primary disk storage costs. Access this white paper to learn the 4 crucial elements of this hybrid cloud archival strategy and how a multi-tiered approach could benefit your company.
Posted: 13 Jan 2020 | Published: 13 Jan 2020

Somerville

Seagate Enterprise Data Solutions
sponsored by TechData - Seagate
DATA SHEET: The Seagate portfolio of hardware solutions includes cloud building blocks, RAID/data protection, and integrated application platforms meant to help your organization grow. Access this datasheet to learn the 3 main benefits Seagate offers and to see these benefits in action.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

TechData - Seagate

Enterprise Family Guide
sponsored by TechData - Seagate
WHITE PAPER: Access this white paper to learn about a family of vertically integrated Enterprise Data Solutions from Seagate, including the Exos Enterprise Hard Drives and the Nytro Enterprise Solid-State Drives, that are fit to accommodate zettabyte-level data capacity and performance.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

TechData - Seagate

FlexPod: The Converged Infrastructure Swiss Army Knife for Your Data Center
sponsored by NetApp
RESOURCE: According to a recent IDC survey evaluating the usability and market acceptance of converged infrastructure, FlexPod from NetApp and Cisco exceeds the requirements set forth. Access this blog post to learn the 8 most important features for a multi-tool infrastructure like converged.
Posted: 18 Dec 2019 | Published: 08 Aug 2019

NetApp

Protect Your Cloud Journey with Druva and Amazon Web Services (AWS)
sponsored by Druva
WEBCAST: Druva, powered by AWS, utilizes cloud and local data sources to provide data protection, governance, and intelligence, while eliminating the need for silos of storage hardware. Access this webcast to extract the 6 foundational benefits of Druva’s cloud-native SaaS solution and see how your company can benefit.
Posted: 18 Dec 2019 | Premiered: Dec 18, 2019

Druva

Cloud Data Protection for VMware Cloud on AWS
sponsored by Druva
WEBCAST: Organizations can implement Druva and VMware Cloud on AWS to move and protect applications as needed, accelerate and simplify data migration, and utilize robust DR. Watch this webcast to learn how AWS, VMware, and Druva fit together to streamline your data backup and restoration needs.
Posted: 18 Dec 2019 | Premiered: Dec 18, 2019

Druva

Your SAP Applications Belong on NetApp
sponsored by NetApp
DATA SHEET: Read this solution brief to view several storage solutions with which you can boost SAP performance and app efficiency and learn the 10 benefits your organization can realize by partnering with NetApp.
Posted: 18 Dec 2019 | Published: 18 Dec 2019

NetApp

Data Protection in the Cloud: Avoiding Cloud Data Loss
sponsored by Clumio
ANALYST BRIEF: Using a SaaS approach to cloud data protection eliminates the need for user-performed upgrades, enables you to continuously monitor backups for potential problems and more. Read this custom strategy brief from Clumio to learn about the 6 staple cloud backup needs and about the benefits of data protection as a service.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

Clumio

No deal Brexit: Ideal or Ordeal?
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.
Posted: 16 Dec 2019 | Published: 16 Dec 2019

ComputerWeekly.com

Protecting Public Sector Organizations Against Ransomware and Other Cyber Threats
sponsored by Hewlett Packard Enterprise
WEBCAST: In order to protect your company from cyber attackers, you need proper strategies in place that will protect and recover your data, harden systems and environments, and review security policies more than once a year. Watch this webcast from TechTarget, sponsored by HPE, to learn how your organization can defend itself against ransomware attacks.
Posted: 13 Dec 2019 | Premiered: Jan 2, 2020

Hewlett Packard Enterprise

Protect Your Enterprise from Ransomware Attacks with These Four Technologies
sponsored by Cohesity
ANALYST REPORT: As ransomware attacks continue to rise, IT needs to not only ensure that they can recover in a timely manner post-attack, but also that they are recovering from an uninfected copy. Read this report from Forrester Research to learn how you can deploy four key technologies to improve your organization’s resilience against ransomware.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

Cohesity

Buyer's Guide to Modern Backup
sponsored by Cohesity
EBOOK: Read this buyer's guide to understand the key considerations when choosing an enterprise-grade, modern, web-scale backup and recovery solution. Determine the right needs for your organization by learning the fundamental questions to ask about your current environment, the range of backup and recovery issues currently faced by enterprises, and more.
Posted: 11 Dec 2019 | Published: 11 Dec 2019

Cohesity

Conversational Geek: Office 365 Backup
sponsored by Cohesity
EBOOK: Did you know that backing up your data in Office 365 is a shared responsibility? Read this eBook to find out why Office 365 data must be included in your backup, how to avoid lost time and profits caused by major outages, and how to ensure you can recover quickly and keep operations running.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Cohesity

Beyond NAS: A Transformative Approach to Unstructured Data
sponsored by Cohesity
EBOOK: Traditional NAS platforms are not equipped to handle today’s data and application needs. Read this white paper to see why the future of scale-out NAS must begin with a blank sheet of paper that provides a fresh solution that is data-centric, API-driven, software-defined, and provides global space efficiency, along with integrated cybersecurity.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Cohesity

Avoid Ransomware Disasters With a Better Backup and Recovery Strategy
sponsored by Cohesity
ANALYST REPORT: Ransomware attacks will happen. Has your IT team safeguarded backup data copies and prioritized business-critical application recovery? Read this Gartner report to learn how you can use backup and recovery technologies to combat ransomware and evaluate your team’s recovery readiness.
Posted: 10 Dec 2019 | Published: 10 Dec 2019

Cohesity

Mid-Market Finance Firm Uses Optiv’s Incident Response to Recover from Breach
sponsored by Optiv
CASE STUDY: In this case study, discover how a mid-market specialty finance firm in the final recovery stages from a recent security breach partnered with Optiv to deploy incident response (IR) solutions to handle the breach recovery and achieved 24x7x365 security coverage.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Optiv

Cloud backup vs traditional backup
sponsored by ComputerWeekly.com
EGUIDE: Cloud backup vs. traditional backup is an important discussion. While the cloud backup market is soaring, traditional backup players may also have much to offer your organisation. In this e-guide we look over the advantages and disadvantages of both backup offers.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

ComputerWeekly.com

Modernizing Data Protection
sponsored by Pure Storage
EBOOK: This ESG white paper highlights a portfolio that serves this purpose to deliver data continuity with site-to-site sync for failover, in addition to space-efficient snapshots and replication. To read about the 4 benefits of this data protection and management portfolio and how to fulfill critical mandates for IT, access this analyst paper.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Pure Storage

Data Recovery Matters, Even for Noncritical Workloads
sponsored by Pure Storage
ANALYST REPORT: Daily backups alone are not good enough even for noncritical workloads. To read what 451 Research found about the importance of going beyond backup and recovery to improve data availability, and how companies can meet more stringent recovery requirements, access this analyst report.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Pure Storage

Powerprotect DD Series Appliances and Software for Microsoft SQL
sponsored by Dell EMC and Intel®
WHITE PAPER: This resource spotlights the PowerProtect DD Series appliances from Dell EMC that provide an all-encompassing layer of protection for SQL Server environments. To get a complete overview of the 10 reasons PowerProtect can transform the way your organization protects its data, access this white paper
Posted: 03 Dec 2019 | Published: 03 Dec 2019

Dell EMC and Intel®
1 - 25 of 721 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info