Recovery Management Reports

7 NAS encryption best practices to protect data
sponsored by TechTarget ComputerWeekly.com
EBOOK: NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

TechTarget ComputerWeekly.com

Achieving SaaS Security with Connected® Online PC Backup
sponsored by Iron Mountain
WHITE PAPER: This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.
Posted: 23 Sep 2008 | Published: 23 Sep 2008

Iron Mountain

ITS Group Consulting Offers "More 9's" and Killer RTO/RPO with Replay AppImage
sponsored by AppAssure Software, Inc.
CASE STUDY: Replay AppImage's ability to restore messages and systems quickly and with little effort allowed ITS Group to grow its customer base while keeping overhead low.
Posted: 20 Apr 2009 | Published: 19 Mar 2009

AppAssure Software, Inc.

Managing Access Control through SAS Zoning
sponsored by PMC-Sierra, Inc.
WHITE PAPER: Serial Attached SCSI (SAS) is gaining popularity in small SAN environments. Read this white paper to learn about SAS zoning and how it helps IT administrators create more flexible, scalable and efficient server networks that meet their business needs.
Posted: 06 Oct 2005 | Published: 01 Sep 2005

PMC-Sierra, Inc.

The IBM Rational AppScan Lifecycle Solution
sponsored by IBM
BROCHURE: IBM Rational® AppScan® is a suite of marketplace-leading Web application security solutions that gives organizations the necessary visibility and control to address various critical challenges.
Posted: 29 Jul 2008 | Published: 01 Jan 2007

IBM

Time-addressable and Event-addressable Storage: Combining Snapshots and Data Journaling for True Continuous Data Protection
sponsored by Excel Meridian Data, Inc.
WHITE PAPER: This paper discusses explains how replication that is both time-stamped and event addressable through the combined technologies of data snapshots and journaling is true CDP that offers complete system data protection.
Posted: 09 Jun 2008 | Published: 01 Jan 2007

Excel Meridian Data, Inc.

MicroScan De-Duplication Minimizes Replication Bandwidth and Storage Requirements
sponsored by FalconStor Software
WHITE PAPER: Read this document to learn how FalconStor's powerful MicroScan technology works to minimize duplicate data and help save considerable bandwidth, storage resources, and overhead.
Posted: 10 Feb 2009 | Published: 10 Feb 2009

FalconStor Software

Integrating HP Data Protector Software with HP Data Deduplication Solutions
sponsored by HP Inc
WHITE PAPER: This white paper will discuss HP Data Protector Software which fully supports HP data deduplication technologies allowing you to recover files more quickly while reducing your data management and storage costs.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

HP Inc

Oracle Real Application Clusters in Oracle VM Environments
sponsored by Oracle Corporation
WHITE PAPER: This white paper explains how to run sophisticated or highly-available applications in virtualized environments by creating a software-based virtualization infrastructure that offers high availability and grid readiness.
Posted: 17 Dec 2008 | Published: 17 Dec 2008

Oracle Corporation

Storage Solutions That Enable Semiconductor Design for Manufacturing (DFM)
sponsored by DataDirect Networks
WHITE PAPER: EDA tools used for DFM are helping overcome the physical challenges associated with producing semiconductors based on complex designs using nanometer technologies.
Posted: 21 Feb 2008 | Published: 01 Jan 2007

DataDirect Networks