IT Management  >   Systems Operations  >   Contingency Planning  >  

Data Recovery

RSS Feed   
ALSO CALLED: Restore Deleted, Data-recovery, Disk Recovery, Computer Data Recovery, Disc Recovery
DEFINITION: The restoration of data that has been physically damaged or corrupted.
Data Recovery Reports
1 - 25 of 682 Matches Previous Page  |  Next Page
Unlock Hidden Resources in Your Hybrid Virtualization Infrastructure
sponsored by Quest
WHITE PAPER: Read this white paper for guidance on how to meet the backup and recovery needs of container and hybrid virtualized environments, as well as how to find, and apply, the most suitable and flexible solution.
Posted: 05 Aug 2020 | Published: 05 Aug 2020

Quest

Don't Pay the Bad Guys! Protect Your Data from Ransomware Attacks
sponsored by Bytes Technology Group
RESOURCE: Rubrik is utilizing machine learning to provide instant recovery, immutability, and impact visibility which makes paying ransoms a thing of the past. Access this resource to learn the 5 components of Rubrik’s solution and see for yourself how it compares to traditional backup architectures.
Posted: 20 Jul 2020 | Published: 20 Jul 2020

Bytes Technology Group

Leading Dutch IT Services Provider Gets Complete Office 365 Protection
sponsored by Barracuda
CASE STUDY: After successive failures to protect data with their previous backup provider occurred, Truston knew they needed a more efficient off-site backup solution for their O365 data. Download this case study to discover the results of Truston investing in Barracuda Essentials.
Posted: 16 Jul 2020 | Published: 31 Dec 2017

Barracuda

StorSafe Launch Webinar
sponsored by FalconStor Software
WEBCAST: By leveraging industry-standard container technology to enable persistent long-term archiving, StorSafe improves data portability, accessibility, security, and integrity validation. Tune into this launch webinar to get a more detailed look at the features and functionality of StorSafe.
Posted: 09 Jul 2020 | Premiered: Jul 9, 2020

FalconStor Software

The Age of Data-Centric Archive
sponsored by FalconStor Software
DATA SHEET: This paper highlights a long-term, persistent, containerized archival solution called StorSafe, which provides data preservation that is agnostic, heterogeneous, and highly portable. Read on to learn how your business could benefit from this system.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

FalconStor Software

Backup fundamentals in the age of cloud
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we look at backup fundamentals like choosing incremental or differential backup as well as using snapshots to replace traditional backup. We also provide an overview of strategic considerations for backup in the age of the cloud as well as surveys of the key backup products for SMEs and enterprise deployment.
Posted: 03 Jul 2020 | Published: 03 Jul 2020

ComputerWeekly.com

Why a Backup Strategy for Microsoft Office 365 is Essential for Security, Compliance, and Business Continuity
sponsored by Clumio
ANALYST REPORT: Download this IDC white paper to dig into the O365 backup essentials, including 3 risks of not backing up O365 data and 3 key features to look for in a solution.
Posted: 01 Jul 2020 | Published: 31 Dec 2019

Clumio

Digitally Transforming Enterprises Are Managing to Higher Levels of Storage and Data Availability
sponsored by IBM
WHITE PAPER: With more than 60% of enterprises working to achieve digital transformation, data is becoming an increasingly strategic resource for driving competitive differentiation. IDC research in December 2018 explored data availability targets being set by IT organizations but also how well they are performing in achieving their workload availability goals.
Posted: 12 Jun 2020 | Published: 15 Jun 2020

IBM

5-min demo: Data Security
sponsored by Veeam Software
VIDEO: With modernized data protection, organizations can cut their average ransomware recovery cost down or not pay anything at all. How? Tune into this demo to learn how you can protect your data with immutability from Veeam.
Posted: 08 Jun 2020 | Premiered: 08 Jun 2020

Veeam Software

The Essential Guide to Data Protection & Disaster Recovery
sponsored by Tintri
EBOOK: Download this e-book to understand the storage features that are essential to modern data protection and DR practices and to view specific guidelines on what to look for and how to implement your plan.
Posted: 28 May 2020 | Published: 28 May 2020

Tintri

Alliant Credit Union Achieves Data Recovery 90% Faster with Commvault
sponsored by Commvault
CASE STUDY: Upholding a high standard for delivery and improving RTO means Alliant Credit Union can’t risk services being disrupted by an infrastructure failure. Read this case study to learn how it reduced its RTO from 36 hours to just four with Commvault Complete Backup & Recovery.
Posted: 26 May 2020 | Published: 26 May 2020

Commvault

Yantai Shinho Improves RPO by 84% and Cuts Storage Costs with AWS and Commvault
sponsored by Commvault
CASE STUDY: Access this case study to learn how Yantai Shinho achieved backup for core databases in 30 mins using Commvault Complete Backup & Recovery, including a host of other benefits.
Posted: 26 May 2020 | Published: 26 May 2020

Commvault

Case Study: Astra Daihatsu Motor
sponsored by Commvault
CASE STUDY: Download this case study to find out how Astra Daihatsu overcame their previous issues with assembly line downtime and met regional compliance regulations using Commvault’s Complete Backup & Recovery and the 4 benefits they realized as a result.
Posted: 21 May 2020 | Published: 31 Dec 2019

Commvault

Spectrum Enriches Viewing Experience for 28 Million Customers
sponsored by Commvault
CASE STUDY: Rapid and continuous replication coupled with large volumes of storage was quickly becoming essential to Spectrum. Read this case study to learn how Spectrum was able to achieve their goal and overcome bandwidth issues using Commvault ContinuousDataReplicator (CDR).
Posted: 21 May 2020 | Published: 31 Dec 2019

Commvault

5 Steps to Application-aware Data Protection
sponsored by Commvault
RESOURCE: Read the following blog post to examine 5 steps that will help you achieve application-aware data protection in your organization.
Posted: 21 May 2020 | Published: 21 May 2020

Commvault

Case Study: Orchid Pharma Cuts Hardware Costs with Commvault
sponsored by Commvault
CASE STUDY: Read this case study to learn how Orchid Pharma was able to minimize disk utilization by 96%, lower their annual operating costs, reduce their backup window by 60%, and establish zero backup failure with Commvault Complete Backup & Recovery software.
Posted: 20 May 2020 | Published: 20 May 2020

Commvault

Equifax and the 147 Million: One Individual’s Story from behind the Headlines
sponsored by Auth0
VIDEO: What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.
Posted: 20 May 2020 | Premiered: 30 Mar 2020

Auth0

Case Study: Southern Institute of Technology New Zealand
sponsored by Commvault
CASE STUDY: Southern Institute of Technology (SIT) was contending with 46 terabytes of business-critical data, pushing their existing backup tools over the edge. So how did SIT come out on top and achieve a perfect score with a more suitable backup and recovery solution? Read this case study to find out.
Posted: 20 May 2020 | Published: 20 May 2020

Commvault

Enhance and Extend Your Spectrum Protect
sponsored by Cobalt Iron
WEBCAST: When it comes to finding the right data protection solution, what features should you be looking for? Tune into this webcast to learn 6 of these defining features and discover how Compass from Cobalt Iron leverages them to deliver intelligent data protection.
Posted: 08 May 2020 | Premiered: May 8, 2020

Cobalt Iron

Unleash the Power of NAS Backup
sponsored by Veeam Software
WEBCAST: The following webinar highlights the benefits of Veeam’s NAS backup and compares the solution to others in the market. Tune in to learn more and to view this solution’s key features, like file-level backup capabilities aimed at protecting your file shares, and additional use cases.
Posted: 06 May 2020 | Premiered: Apr 12, 2020

Veeam Software

Protect Your Data Simply with Nutanix Mine and Veeam
sponsored by Veeam Software
WEBCAST: Tune into this webinar to learn how to address the common issues in point solution backups and how the Nutanix Mine with Veeam can simplify your data protection plans and unify backup.
Posted: 06 May 2020 | Premiered: Apr 15, 2020

Veeam Software

Essential BC/DR Planning & Testing Templates
sponsored by TechTarget
RESOURCE: What if you were hit with a ransomware attack or experienced a malfunction in its data center sprinkler system? Whether your company is in the early stages of establishing a DR plan or it's time to retest, we've got you covered: we just released the 2nd edition of our Verified BC/DR Planning Templates! Simply answer a few simple survey questions
Posted: 23 Apr 2020 | Published: 24 Mar 2020

TechTarget

Doppelgangers: The Many Identities of the Modern Data Catalog
sponsored by Alation
ANALYST REPORT: Download this 451 Research report to dig into the ins and outs of data catalogs. The details covered inside include current catalog usage and adoption plans, a view of the data catalog provider and product landscape, and more.
Posted: 23 Apr 2020 | Published: 31 Jan 2020

Alation

In Your Data Archive Strategy, How Long is Long Enough?
sponsored by Beta Systems
EGUIDE: It is important for organizations of all sizes to develop a strong data retention strategy that addresses the entire data lifecycle. Read this e-guide to distinguish which data is worth saving and discover the 5 components of a data strategy and how each component plays an important role in data archiving.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Beta Systems

Navigating Ransomware Recovery
sponsored by Cisco Umbrella
EGUIDE: The decisions and road to recovery will involve several stakeholders and real costs. So, when organizations must make the tough decision of whether to pay a ransom, rebuild the system, or file a report, there are many factors to consider. Use this e-guide to help you plan and map out steps to avoid rushing into bad choices that can’t be reversed.
Posted: 20 Apr 2020 | Published: 11 Feb 2020

Cisco Umbrella
1 - 25 of 682 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info