IT Management  >   Systems Operations  >   Contingency Planning  >  

Disc Recovery

RSS Feed   
Disc Recovery Reports
 
In Your Data Archive Strategy, How Long is Long Enough?
sponsored by Beta Systems
EGUIDE: It is important for organizations of all sizes to develop a strong data retention strategy that addresses the entire data lifecycle. Read this e-guide to distinguish which data is worth saving and discover the 5 components of a data strategy and how each component plays an important role in data archiving.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Beta Systems

The Role of Cloud Backup and Recovery in Protecting Against Ransomware Attacks
sponsored by Rubrik
EBOOK: Neither traditional nor native no relational database tools deliver the necessary backup and recovery capabilities required to protect against ransomware. Dive into this ebook to research a solution meant to work with non-relational databases and applications while filling in 5 key gaps left by traditional backup and scripted solutions.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Rubrik

Enhancing Data Protection in Office 365
sponsored by Commvault
ANALYST REPORT: This Osterman Research white paper explains the Office 365 backup, archiving, and eDiscovery essentials, with a discussion of O365's native data protection limitations. Read it now to put this guidance to work in your organization so you can ensure your data is properly protected from all angles.
Posted: 29 Aug 2019 | Published: 29 Aug 2019

Commvault

Seamless Workload Data Protection On-Premises and Cloud
sponsored by Druva
RESOURCE: As companies look to reduce costs, increase agility and improve the efficiency of their data center operations, they are selectively moving workloads to the cloud. The result has been the creation of a new business model known as hybrid cloud.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

TOPICS:  Data Recovery
Druva

Backup fundamentals in the age of cloud
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we look at backup fundamentals like choosing incremental or differential backup as well as using snapshots to replace traditional backup. We also provide an overview of strategic considerations for backup in the age of the cloud as well as surveys of the key backup products for SMEs and enterprise deployment.
Posted: 29 May 2019 | Published: 29 May 2019

ComputerWeekly.com

Backup fundamentals in the age of cloud
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide we look at backup fundamentals like choosing incremental or differential backup as well as using snapshots to replace traditional backup. We also provide an overview of strategic considerations for backup in the age of the cloud as well as surveys of the key backup products for SMEs and enterprise deployment.
Posted: 03 Jul 2020 | Published: 03 Jul 2020

ComputerWeekly.com

Recovering from Ransomware: Data Protection Strategy Guide
sponsored by Citrix
EGUIDE: With a constantly evolving IT landscape, the nature of disaster recovery planning is changing rapidly. Now, rather than just preparing for a natural disaster or manmade event, IT professionals must also be prepared to recover from ransomware and other cyberattacks. In this e-guide you will learn 2 quick steps for recovering from ransomware.
Posted: 12 Dec 2016 | Published: 07 Dec 2016

Citrix

Securing Your Organization While Maintaining Here, Near, and Anywhere Data Availability
sponsored by Violin Memory
WHITE PAPER: The right all-flash array based solution provides comprehensive data protection functions to protect against problems in the data center, in a metro environment, and anywhere with different technologies based on the application needs. Read this solution brief to look into the application-specific data protection.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

Violin Memory

Data Protection Methods: Mounting Backups vs. Recovering from Backups
sponsored by Veritas
EGUIDE: This e-guide highlights important questions to ask before deciding on a data protection method and discusses the benefits and challenges associated with mounting backup versus recovery. Read on to see how mounting backups can significantly improve your data protection systems.
Posted: 17 Mar 2016 | Published: 16 Mar 2016

Veritas

Wherever It Goes, Data on Employee Endpoint Devices Demands Corporate Protection
sponsored by Code42
WHITE PAPER: BYOD offers a lot of benefits in terms of productivity and mobility, but it also presents a number of challenges when it comes to protection for endpoint data. This white paper highlights a cloud-powered data protection and management platform built to handle these challenges.
Posted: 11 Jun 2014 | Published: 30 May 2014

Code42
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info