Recovery Management Reports

The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

How Virtualization Cuts CDP Costs by 80%
sponsored by Veeam Software
WHITE PAPER: This white paper compares 3 different options of implementing CDP (continuous data protection) and shows how virtualization-enabled CDP - or Near-CDP - becomes the most affordable and most logical disaster recovery choice for businesses of all sizes.
Posted: 18 Feb 2010 | Published: 17 Feb 2010

Veeam Software

EMC VNXe Series Software Packs: Simple Data Protection and More
sponsored by EMC Computer Systems (UK) Ltd.
PRODUCT OVERVIEW: EMC has packaged unique and powerful add-on storage software into two attractively priced, easy-to-order software packs: Total Value Pack and Total Protection Pack available for the VNXe 3100 and VNXe 3300 respectively, ensuring maximum protection, security, and compliance.
Posted: 11 Feb 2011 | Published: 11 Feb 2011

EMC Computer Systems (UK) Ltd.

Disaster Recovery Seminar Presentation Download
sponsored by EMC Backup and Recovery Solutions
PRESENTATION TRANSCRIPT: This presentation is divided into three modules. In the first module, we will examine the three keys to successful disaster recovery planning. In modules two and three, we will analyse data protection techniques and testing techniques.
Posted: 15 Sep 2009 | Published: 15 Sep 2009

EMC Backup and Recovery Solutions

IDC Report - Reducing Costs and Creating a More Secure IT Environment with a Holistic Approach to Data Protection
sponsored by FalconStor Software
ANALYST REPORT: IDC interviewed eight FalconStor customers that had deployed at least one or a combination of the following FalconStor storage management solutions: Virtual Tape Library (VTL), Network Storage Server (NSS), and Continuous Data Protector (CDP). All customers reported high levels of satisfaction.
Posted: 17 Sep 2009 | Published: 01 Aug 2009

FalconStor Software

Twynham School Relies on DocAve® to Protect Valuable SharePoint Data
sponsored by AvePoint, Inc.
CASE STUDY: Southwest England's Twynham Comprehensive School used AvePoint's DocAve Backup and Restore to provide reliable, granular, and full-fidelity backup and recovery capabilities to protect their over 50GB of data and hundreds of sites stored on its MOSS environment.
Posted: 04 Feb 2010 | Published: 04 Feb 2010

AvePoint, Inc.

Data Protection: Evaluating Business Requirements & Classifying Your Data
sponsored by BakBone
WHITE PAPER: This paper discusses an approach to evaluating data at a business level, and implementing a data protection strategy that safeguards your organization based on the value of its data.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

BakBone

Cloud backup tutorial: How to leverage cloud backup services
sponsored by Iron Mountain
EBOOK: In this tutorial on cloud backup, you will learn the pros and cons cloud backup, how cloud storage is changing data protection and disaster recovery and the differences in the cost of cloud backup vs. traditional backup.
Posted: 27 Jul 2009 | Published: 01 Jul 2009

Iron Mountain

Windows Application and Server Backup 2.0: Chapter 12- Tales from the Trenches: My Life with Backup 2.0
sponsored by Dell AppAssure Backup, Replication and Recovery Software
EBOOK: Read the final chapter of this e-book to explore stories about Backup 2.0 - learn how to save money, time and anguish, and discover how to fit your new backup system into the specific niches of your company.
Posted: 31 May 2012 | Published: 31 May 2012

Dell AppAssure Backup, Replication and Recovery Software

TechTarget ANZ Data Reduction E-Book
sponsored by IBM
EBOOK: Few organisations are willing to pay more for storage every year. Data reduction can get you off the treadmill by reducing the amount of data you need to store, backup and manage, and this e-book explains compression, data de-duplication, archiving and several other techniques to achieve this outcome.
Posted: 02 Aug 2010 | Published: 30 Jul 2010

IBM