Recovery Management Reports

Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022

TechTarget ComputerWeekly.com

In data privacy we trust: building a strong information protection strategy in the hybrid era
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.
Posted: 25 Jan 2022 | Published: 25 Jan 2022

TechTarget ComputerWeekly.com

The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

Presentation Transcript: Online Backup FAQ
sponsored by i365, makers of Evault
PRESENTATION TRANSCRIPT: Trying to decide if online backup, or backup as a service, will be beneficial to your small or midsized business? Check out this presentation transcript, where you’ll learn the benefits and drawbacks of online backup, the major players in online backup today, what to look for when evaluating online backup options, and more.
Posted: 10 Nov 2009 | Published: 09 Nov 2009

i365, makers of Evault

E-Book: IT Handbook - Backup and Recovery
sponsored by Vizioncore Inc.
EBOOK: Before you begin researching all of the available backup and disaster recovery technologies on the market, get a handle on your business needs. Read this e-book to learn about developing a backup and disaster recovery strategy, implementation guidelines for backup and dr, remote backups, and testing and verifying your backups.
Posted: 30 Apr 2010 | Published: 30 Apr 2010

Vizioncore Inc.

Developing a disaster recovery plan for virtual machines
sponsored by Overland Storage
EBOOK: Virtual machine (VM) disaster recovery (DR) is a multifaceted activity that fails over a VM from a primary site to a remote location. There are a few approaches to facilitating disaster recovery in a virtual machine environment. Learn about look at the various approaches to virtual machine disaster recovery in this tutorial.
Posted: 23 Jul 2009 | Published: 01 Jul 2009

Overland Storage

Taneja Group Solution Brief: High-End Storage For Everyone
sponsored by Exablox
WHITE PAPER: This white paper explores what SMB and departmental storage buyers should both require and expect from storage solutions to meet their business goals, and how traditional mid- market storage based on old technologies can fall short. Dive in to discover real-life experiences, benefits, cost effectiveness and ease of management
Posted: 31 Jul 2013 | Published: 30 Apr 2013

Exablox

Reducing Costs and Creating a More Secure IT Environment with a Holistic Approach to Data Protection: An ROI Analysis of FalconStor Storage Management Solutions
sponsored by FalconStor Software
WHITE PAPER: Data protection and disaster recovery continue to be overarching challenges for most firms. To remedy a myriad of problems with data protection as well as operational and disaster recovery, companies are replacing legacy backup methods with new approaches. Read on to learn more.
Posted: 22 Oct 2010 | Published: 22 Oct 2010

FalconStor Software

The ABCs of CDP: What you need to know
sponsored by FalconStor Software
EGUIDE: The Storage Networking Industry Association (SNIA) defines CDP as "a class of mechanisms that continuously capture or track data modifications enabling recovery to previous points in time." In part two of this tutorial on continuous data protection backup, learn how CDP is being used today, and about the latest CDP products.
Posted: 17 Jun 2011 | Published: 17 Jun 2011

FalconStor Software

Demo: Microsoft Windows 2008 Protection and Recovery Using FalconStor CDP
sponsored by FalconStor Software
PRODUCT DEMO: Access this video demonstration for a detailed look at FalconStor CDP’s ability to protect physical servers and virtual machines, support direct attached storage along with iSCSI and fiber channel SAN connectivity and to work with clustered shared storage.
Posted: 21 Jul 2010 | Premiered: 21 Jul 2010

FalconStor Software