Recovery Management Reports

In data privacy we trust: building a strong information protection strategy in the hybrid era
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.
Posted: 25 Jan 2022 | Published: 25 Jan 2022

TechTarget ComputerWeekly.com

The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

E-Guide: How to Get Optimal Results with Virtual Data Protection
sponsored by BakBone
EGUIDE: In this e-guide, brought to you by SearchStorage.com, you will learn how to overcome the strategic challenges involved in data recovery in a virtual environment, and explore what backup process is right for your organization.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

BakBone

Demo: Microsoft Windows 2008 Protection and Recovery Using FalconStor CDP
sponsored by FalconStor Software
PRODUCT DEMO: Access this video demonstration for a detailed look at FalconStor CDP’s ability to protect physical servers and virtual machines, support direct attached storage along with iSCSI and fiber channel SAN connectivity and to work with clustered shared storage.
Posted: 21 Jul 2010 | Premiered: 21 Jul 2010

FalconStor Software

Agentless Architecture. Agentless Backup is Not A Myth
sponsored by Asigra
WHITE PAPER: Backup and recovery software typically requires agents that are installed onto the host servers that a system administrator wants to back up. The Asigra solution requires no agents, which inherently makes it easier to install and support than legacy backup and recovery solutions. Read this whitepaper to learn more!
Posted: 24 Aug 2010 | Published: 24 Aug 2010

Asigra

Presentation Transcript: The Challenges of Protection and Recovery in a Virtual World
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: Read this presentation transcript to learn the challenges brought about by protection and recovery approaches in virtual environments and what different IT organizations are doing to address them.
Posted: 19 May 2010 | Published: 19 May 2010

Hewlett Packard Enterprise

The keys to a successful business continuity and DR strategy
sponsored by Citrix
EGUIDE: Developing a business continuity and DR strategy usually involves an extensive amount of information gathering, combined with piecing together products and services that work as a collective. Check out this e-guide to learn the differences between business continuity and DR, discover 4 approaches to a successful combined strategy, and much more.
Posted: 20 Apr 2020 | Published: 20 Apr 2020

Citrix

Presentation Transcript: Don't Be Left Out of the Cloud: How to Sell Enterprise-Quality Cloud  Services and Data Protection to SMBs
sponsored by KineticD
PRESENTATION TRANSCRIPT: Read this expert transcript to learn why SMBs are adopting cloud services more rapidly than large enterprises and what challenges your clients face in protecting their business critical data in an increasingly mobile world.
Posted: 18 Oct 2010 | Published: 24 Aug 2010

KineticD

Case Study: First Trade Union Bank Adds Vault for LAN-Speed Restores and Robust Replication
sponsored by i365, makers of Evault
CASE STUDY: Despite the economic downturn, First Trade Union Bank is continuing to grow... this case study examines the data center challenges the bank faced in the midst of this growth and show's how by working with i365, they were able to create faster backups/restores, in some cases reduce RTO's by up to 98%, enhance DR and protect their virtual servers.
Posted: 30 Jun 2009 | Published: 30 Jun 2009

i365, makers of Evault

Protecting Server Data in Small and Medium-sized Businesses
sponsored by Iron Mountain
WHITE PAPER: Read this white paper to learn how to successfully protect server data outside a centralized data center and focus on specific needs and requirements for SMBs.
Posted: 11 Jan 2010 | Published: 01 Sep 2006

Iron Mountain