Backup and Recovery Management Reports

In data privacy we trust: building a strong information protection strategy in the hybrid era
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.
Posted: 25 Jan 2022 | Published: 25 Jan 2022

TechTarget ComputerWeekly.com

The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

Presentation Transcript: Overcoming the Challenges with Tape Backup
sponsored by ExaGrid Systems, Inc.
PRESENTATION TRANSCRIPT: In this presentation transcript, Bill Hobbib, Vice President of marketing at ExaGrid systems, will discuss the typical issues in backup and rapidly give you just a quick overview of what ExaGrid does before moving on to customer case studies. Continue reading to learn five tips for faster more reliable backups.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

ExaGrid Systems, Inc.

Optimize Business and IT With New Generation Application Lifecycle Management
sponsored by SAP Community Network
WEBCAST: This webcast provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
Posted: 15 Sep 2009 | Premiered: Sep 30, 2009, 12:00 EDT (16:00 GMT)

SAP Community Network

Storage-Based Replication Options: Selecting the Right Replication Method for Optimal Data Protection
sponsored by DellEMC and Intel®
WHITE PAPER: Backup is the core of data protection because it provides the ability to recover data from either physical disasters or common data loss conditions. But backup can have drawbacks - regular disruption of production applications, long recovery time, and significant data/work loss. Replication technologies were developed to shorten recovery time..
Posted: 08 Sep 2009 | Published: 29 Jul 2009

DellEMC and Intel®

Windows Recovery Solutions for Today’s Environments
sponsored by InMage Systems
WHITE PAPER: This white paper is intended to help you think about that problem with knowledge of pertinent market trends and next generation recovery technologies.
Posted: 23 Apr 2010 | Published: 23 Apr 2010

InMage Systems

E-Guide: Three Ways to Reduce Backup Windows on a Budget
sponsored by Acronis NEMEA
EGUIDE: One of the biggest problems plaguing backup administrators is the volume of data that must be backed up each night is steadily increasing, but the amount of time allotted for the nightly backup remains constant. There are better ways- Read on to learn more.
Posted: 03 Aug 2011 | Published: 03 Aug 2011

Acronis NEMEA

E-Guide: Backing up Your Virtual Server
sponsored by Symantec Corporation
EGUIDE: Backing up virtual machines is tougher than you think; and the fact of the matter is it’s not a straightforward process! This guide will walk you through how to determine which method is best for your storage requirement.
Posted: 06 Dec 2010 | Published: 06 Dec 2010

Symantec Corporation

Demo: Protecting Microsoft SQL Server 2008 Using FalconStor CDP
sponsored by FalconStor Software
PRODUCT DEMO: Watch this video demonstration to see exactly how FalconStor Continuous Data Protector is used to protect and recover your Microsoft SQL Server data.
Posted: 21 Jul 2010 | Premiered: 21 Jul 2010

FalconStor Software

eGuide: Information Security - Buyer's Guide to Messaging Security
sponsored by TechTarget Security
EGUIDE: Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

TechTarget Security