Data Protection Reports

eGuide: Information Security - Buyer's Guide to Messaging Security
sponsored by TechTarget Security
EGUIDE: Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

TechTarget Security

Expert Overview: New Data Protection Strategies and Success Metrics
sponsored by EMC Corporation
EGUIDE: This e-guide explores the basic philosophy behind continuous data protection and how it's making its way into the current backup landscape.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

EMC Corporation

The Case for Third-Party Archiving in Exchange 2010
sponsored by Sunbelt Software
WHITE PAPER: This white paper will give you a brief overview of Sunbelt Software, while educating decision makers about the important role that email and other content archiving plays in minimizing risk and lowering the cost of doing business, the capabilities of archiving in Exchange 2020, and more.
Posted: 28 Jan 2010 | Published: 28 Jan 2010

Sunbelt Software

Case Study: First Trade Union Bank Adds Vault for LAN-Speed Restores and Robust Replication
sponsored by i365, makers of Evault
CASE STUDY: Despite the economic downturn, First Trade Union Bank is continuing to grow... this case study examines the data center challenges the bank faced in the midst of this growth and show's how by working with i365, they were able to create faster backups/restores, in some cases reduce RTO's by up to 98%, enhance DR and protect their virtual servers.
Posted: 30 Jun 2009 | Published: 30 Jun 2009

i365, makers of Evault

Cloud backup tutorial: How to leverage cloud backup services
sponsored by Iron Mountain
EBOOK: In this tutorial on cloud backup, you will learn the pros and cons cloud backup, how cloud storage is changing data protection and disaster recovery and the differences in the cost of cloud backup vs. traditional backup.
Posted: 27 Jul 2009 | Published: 01 Jul 2009

Iron Mountain

Data Protection for the Enterprise vs. SMB: Disk, CDP, Cloud and Other Options
sponsored by Axcient
EGUIDE: This E-Guide explores the role that scale plays in determining the impact of a disruption and discusses enterprise data protection requirements that apply to SMBs. Find out why disk, CDP and cloud backup offerings are worth further consideration and learn how hybrid appliances are making DR quick and cost-effective.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

Axcient

9 Backup Types & Methods: Which is Right for Your Business
sponsored by SonicWALL
EGUIDE: This SearchStorage.com expert EGuide will help you understand the various backup options currently available by outlining what each backup type and technology entails, and showing how to choose the right strategy for your business.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

SonicWALL

4 Backup Technologies to Help Meet Your RTOs
sponsored by EMC Corporation
EGUIDE: This expert E-Guide explores different modern backup technologies that can reduce the amount of data being backed up and help you meet your backup RTOs.
Posted: 09 May 2012 | Published: 09 May 2012

EMC Corporation

Presentation Transcript: Overcoming the Challenges with Tape Backup
sponsored by ExaGrid Systems, Inc.
PRESENTATION TRANSCRIPT: In this presentation transcript, Bill Hobbib, Vice President of marketing at ExaGrid systems, will discuss the typical issues in backup and rapidly give you just a quick overview of what ExaGrid does before moving on to customer case studies. Continue reading to learn five tips for faster more reliable backups.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

ExaGrid Systems, Inc.

Focus on Endpoint Data Protection
sponsored by Druva
EGUIDE: Whether it's employee laptops, mobile devices, or remote offices, endpoint data protection is an increasing concern for data storage managers. Find out in this e-guide which approaches and technologies work best when it comes to storing and protecting endpoint data.
Posted: 30 Mar 2011 | Published: 30 Mar 2011

Druva