Continuous Backups Reports

4 data privacy predictions for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Over the last two years, businesses and employees saw their workspace change forever with the rise of hybrid and remote work. All of a sudden, data privacy became a top priority for enterprises all over the world. As attention continues to build, here are four data privacy predictions for 2022 and beyond.
Posted: 08 Mar 2022 | Published: 08 Mar 2022

TechTarget ComputerWeekly.com

Presentation Transcript: Don't Be Left Out of the Cloud: How to Sell Enterprise-Quality Cloud  Services and Data Protection to SMBs
sponsored by KineticD
PRESENTATION TRANSCRIPT: Read this expert transcript to learn why SMBs are adopting cloud services more rapidly than large enterprises and what challenges your clients face in protecting their business critical data in an increasingly mobile world.
Posted: 18 Oct 2010 | Published: 24 Aug 2010

KineticD

Understanding Automatic Failover for DR: 6 FAQs
sponsored by FalconStor Software
EGUIDE: Automatic failover involves automatically moving an application to a standby server during a failure or service event to preserve its time. Fortunately, there are a number of approaches available in the market today. Check out this guide to learn the answers to 6 FAQs about automatic failover and disaster recovery automation.
Posted: 19 Jul 2011 | Published: 19 Jul 2011

FalconStor Software

Simplify Remote Office Data Recovery
sponsored by IBM
WHITE PAPER: This white paper reviews the factors that can make data recovery in remote offices a complicated problem and describes the range of technology options available, explaining the benefits and shortcomings of each in the context of remote offices.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

IBM

Storage-Based Replication Options: Selecting the Right Replication Method for Optimal Data Protection
sponsored by DellEMC and Intel®
WHITE PAPER: Backup is the core of data protection because it provides the ability to recover data from either physical disasters or common data loss conditions. But backup can have drawbacks - regular disruption of production applications, long recovery time, and significant data/work loss. Replication technologies were developed to shorten recovery time..
Posted: 08 Sep 2009 | Published: 29 Jul 2009

DellEMC and Intel®

Dealing with Data Growth: Storage and Backup Strategies
sponsored by Simplify IT
EGUIDE: This e-guide, from SearchDataBackup.com, examines how the proliferation of business information has contributed to the current state of data protection.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

Simplify IT

IDC Report - Reducing Costs and Creating a More Secure IT Environment with a Holistic Approach to Data Protection
sponsored by FalconStor Software
ANALYST REPORT: IDC interviewed eight FalconStor customers that had deployed at least one or a combination of the following FalconStor storage management solutions: Virtual Tape Library (VTL), Network Storage Server (NSS), and Continuous Data Protector (CDP). All customers reported high levels of satisfaction.
Posted: 17 Sep 2009 | Published: 01 Aug 2009

FalconStor Software

Backup Basics: Disk, CDP and Cloud
sponsored by Barracuda Networks
EGUIDE: Check out this exclusive SearchDataBackup.com E-Guide for an expert look at backup approaches including continuous data protection (CDP), cloud and disk.
Posted: 28 Mar 2013 | Published: 28 Mar 2013

Barracuda Networks

E-Guide: Continuous Data Protection Backup Tutorial on CDP Tools, Part 2
sponsored by FalconStor Software
EGUIDE: The Storage Networking Industry Association (SNIA) defines CDP as "a class of mechanisms that continuously capture or track data modifications enabling recovery to previous points in time." In part two of this tutorial on continuous data protection backup, learn how CDP is being used today, and about the latest CDP products.
Posted: 20 May 2011 | Published: 20 May 2011

FalconStor Software

eGuide: Information Security - Buyer's Guide to Messaging Security
sponsored by TechTarget Security
EGUIDE: Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

TechTarget Security