Continuous Data Protection Reports

7 NAS encryption best practices to protect data
sponsored by TechTarget ComputerWeekly.com
EBOOK: NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

TechTarget ComputerWeekly.com

4 data privacy predictions for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Over the last two years, businesses and employees saw their workspace change forever with the rise of hybrid and remote work. All of a sudden, data privacy became a top priority for enterprises all over the world. As attention continues to build, here are four data privacy predictions for 2022 and beyond.
Posted: 08 Mar 2022 | Published: 08 Mar 2022

TechTarget ComputerWeekly.com

Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022

TechTarget ComputerWeekly.com

The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

In data privacy we trust: building a strong information protection strategy in the hybrid era
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.
Posted: 25 Jan 2022 | Published: 25 Jan 2022

TechTarget ComputerWeekly.com

Infographic: 5 cybersecurity predictions for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Cybercrime showed no sign of slowing down in 2021 and enterprises continue to fall victim to cyberattacks, with gangs targeting larger organizations with increasingly large demands. In good news, we can always take stock of the recent past and know what to prepare for. In this infographic, we point out five forecasts for cybersecurity in 2022.
Posted: 06 Jan 2022 | Published: 06 Jan 2022

TechTarget ComputerWeekly.com

Protecting Server Data in Small and Medium-sized Businesses
sponsored by Iron Mountain
WHITE PAPER: Read this white paper to learn how to successfully protect server data outside a centralized data center and focus on specific needs and requirements for SMBs.
Posted: 11 Jan 2010 | Published: 01 Sep 2006

Iron Mountain

Cloud backup tutorial: How to leverage cloud backup services
sponsored by Iron Mountain
EBOOK: In this tutorial on cloud backup, you will learn the pros and cons cloud backup, how cloud storage is changing data protection and disaster recovery and the differences in the cost of cloud backup vs. traditional backup.
Posted: 27 Jul 2009 | Published: 01 Jul 2009

Iron Mountain

Developing a disaster recovery plan for virtual machines
sponsored by Overland Storage
EBOOK: Virtual machine (VM) disaster recovery (DR) is a multifaceted activity that fails over a VM from a primary site to a remote location. There are a few approaches to facilitating disaster recovery in a virtual machine environment. Learn about look at the various approaches to virtual machine disaster recovery in this tutorial.
Posted: 23 Jul 2009 | Published: 01 Jul 2009

Overland Storage

Continuous Availability for Virtualized Servers
sponsored by Overland Storage
PRODUCT LITERATURE: REO Business Continuity Appliance (BCA) meets the challenge in providing an enterprise-class single solution for both continuous local backup and disaster recovery with full support for virtualized environments.
Posted: 06 Jul 2009 | Published: 06 Jul 2009

Overland Storage

Case Study: First Trade Union Bank Adds Vault for LAN-Speed Restores and Robust Replication
sponsored by i365, makers of Evault
CASE STUDY: Despite the economic downturn, First Trade Union Bank is continuing to grow... this case study examines the data center challenges the bank faced in the midst of this growth and show's how by working with i365, they were able to create faster backups/restores, in some cases reduce RTO's by up to 98%, enhance DR and protect their virtual servers.
Posted: 30 Jun 2009 | Published: 30 Jun 2009

i365, makers of Evault

Presentation Transcript: Email Archiving, Ediscovery, Compliance, Storage Management
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT: Email archiving is a burgeoning market at a time when many storage pros are faced with increasing ediscovery requests and compliance regulations. Listen to this podcast to find out the latest developments in email archiving.
Posted: 29 Jun 2009 | Published: 29 Jun 2009

Symantec Corporation

Effective Risk Management in a Collaboration Driven Enterprise
sponsored by AvePoint, Inc.
WHITE PAPER: How will platform and content access interruptions affect productivity, revenue, and compliance-related exposure? This document will analyze common consequences of such interruptions and discuss why successful SharePoint deployments require effective management, vigorous protection, diligent compliance protocols, and continuous availability.
Posted: 11 Jun 2009 | Published: 01 Aug 2008

AvePoint, Inc.

Hitchcock Schools Protects SQL Servers and Data with Replay AppImage
sponsored by AppAssure Software, Inc.
CASE STUDY: The IT group at Hitchcock is responsible for all the end-user devices, network equipment, and servers that support students, teachers, administrators, and education programs. Central to their mission is protecting data that resides on SQL servers. That would be a much bigger worry if it weren't for Replay AppImage.
Posted: 09 Jun 2009 | Published: 01 Jun 2009

AppAssure Software, Inc.

VMware and Dell Solutions for Small to Medium Business: Ensuring Rapid, Reliable and Affordable Disaster Recovery
sponsored by Dell and VMware
PRODUCT OVERVIEW: Affordable high availability and disaster recovery solutions are critical to the survival of all SMBs in the event of a disaster. Building on years of helping SMBs protect their information, VMware and Dell provide cost-effective and robust data protection, disaster recovery, and high availability solutions.
Posted: 01 Jun 2009 | Published: 01 Feb 2009

Dell and VMware

Storage magazine Online June 2009: Heal Thyself
sponsored by TechTarget Storage
EZINE: A trend in storage product messaging these days is the theme of self-healing storage - the ability of a system to detect and repair hard disk problems automatically. In this month's cover story, independent storage expert Marc Staimer explains how and how well they work. This electronic issue also includes features on storage efficiency...
Posted: 28 May 2009 | Published: 28 May 2009

TechTarget Storage

TechTalk: Stop Malware at the Web Gateway
sponsored by BlueCoat
WEBCAST: Safeguarding your data from malware and other Web threats takes a layered approach. In this TechTalk webinar Blue Coat Technical Marketing Engineers will lead a discussion on how the Blue Coat ProxyAV works with the ProxySG to create a community-watch based security.
Posted: 14 May 2009 | Premiered: Mar 24, 2009

BlueCoat

Backup and Recovery for Microsoft Exchange Server - Data Domain Deduplication Storage Best Practices Guide
sponsored by EMC Backup and Recovery Solutions
WHITE PAPER: In many companies, Microsoft Exchange is now commonly viewed as a mission-critical application. Protecting Exchange information is critical and backup is still the primary method used. This paper focuses on the traditional backup and recovery practices for Microsoft Exchange Server along with solutions from Data Domain.
Posted: 08 May 2009 | Published: 08 May 2009

EMC Backup and Recovery Solutions

Continuous Data Protection
sponsored by FalconStor Software
PRESENTATION TRANSCRIPT: If your company seeks to eliminate or drastically reduce backup windows to create faster point-in-time recoveries for more mission-critical apps, CDP software is a viable alternative to traditional backup software. Take a few minutes to read this presentation transcript to learn more about the technology.
Posted: 06 May 2009 | Published: 28 Apr 2009

FalconStor Software

Storage Magazine Online May 2009: Put Dedupe to the Test
sponsored by TechTarget Storage
EZINE: In this month's Storage Magazine Online cover story, our resident backup expert, W. Curtis Preston, shows how to test various systems against your data so you can make the right decisions. Plus, check out features on recession-proof storage tips, four-tier storage design, and Continuous Data Protection (CDP).
Posted: 05 May 2009 | Published: 01 May 2009

TechTarget Storage

Data Protection Strategies Leveraging Replication: An In-Depth Look at Evaluation Criteria and Usage Scenarios
sponsored by Double-Take Software
WHITE PAPER: As dependence on continuous access to critical data grows, so does the importance of avoiding service interruption. This paper examines four data protection strategies and compares their merits for the most common business continuance scenarios.
Posted: 01 May 2009 | Published: 29 Feb 2008

Double-Take Software

ITS Group Consulting Offers "More 9's" and Killer RTO/RPO with Replay AppImage
sponsored by AppAssure Software, Inc.
CASE STUDY: Replay AppImage's ability to restore messages and systems quickly and with little effort allowed ITS Group to grow its customer base while keeping overhead low.
Posted: 20 Apr 2009 | Published: 19 Mar 2009

AppAssure Software, Inc.

Agentless Architecture: Agentless Backup is Not a Myth
sponsored by Asigra
WHITE PAPER: Agentless backup is NOT a myth. The Asigra solution is proof because it requires no agents, which inherently makes it easier to install and support than legacy backup and recovery solutions. This paper serves as an introduction to Asigra's Hybrid Cloud Backup and Recovery Software.
Posted: 20 Apr 2009 | Published: 20 Apr 2009

Asigra

BACKUP REDESIGN: Do More with Less ... Really!
sponsored by AppAssure Software, Inc.
WHITE PAPER: The call to protect corporate data in less time and for less money has inspired a whole new way of thinking about backup - a complete backup redesign. This paper explores a better way to backup and protect data and applications - disk-based application.
Posted: 10 Apr 2009 | Published: 10 Apr 2009

AppAssure Software, Inc.

Presentation Transcript: Changing the Rules of Backup and Disaster Recovery
sponsored by FalconStor Software
PRESENTATION TRANSCRIPT: Join Independent Backup Expert W. Curtis Preston and Falconstor's Product Marketing Manager Peter Eichers as they explore common data protection challenges and what technologies can be used to address them.
Posted: 07 Apr 2009 | Published: 07 Apr 2009

FalconStor Software