Disk Recovery Reports

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

Backup target features expand use cases and evolve for better data protection
sponsored by Hedvig Inc
EGUIDE: Disk-based backup targets have evolved to become far more than just cheap disk arrays. It is vital to understand the different capabilities these systems can offer. In this guide discover new features such as in-place recovery - that allows a virtual machine to instantiate its data store directly from an appliance.
Posted: 15 Feb 2017 | Published: 13 Feb 2017

Hedvig Inc

Backup Solutions for Today’s SMB
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper explores a continuum of solutions, including advances in both tape and disk technologies, that allow SMBs to proactively and systematically backup their data affordably, without disrupting day-to-day operations.
Posted: 27 Nov 2013 | Published: 30 Sep 2013

Hewlett Packard Enterprise

Best Practices for Your Disaster Recovery/Business Continuity Plan
sponsored by McKesson Corporation
WHITE PAPER: In this expert guide, discover 10 best practice tips to ensure your disaster recovery/business continuity plan meets your enterprise's data security needs. Also learn how backup and disaster recovery, historically treated as separately, are converging to provide a more cohesive data management plan.
Posted: 13 Sep 2016 | Published: 12 Sep 2016

McKesson Corporation

A Computer Weekly buyer’s guide to data protection
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

TechTarget ComputerWeekly.com

The changing role of tape: A format that still has more to give
sponsored by Quantum Corporation
WHITE PAPER: This guide explains how tape continues to play an important role in data storage and how it remains the most cost-effective, energy efficient and resilient means to manage the life cycle of stored data.
Posted: 02 Apr 2014 | Published: 31 Oct 2009

Quantum Corporation

What to Look For In a Backup Solution to Deliver Improved Business Continuity
sponsored by Datto, Inc.
WHITE PAPER: This expert guide provides tips on building a holistic backup solution that protects your business from potentially devastating downtime, no matter what the cause. Access now to learn how you can implement a successful business continuity plan and give your enterprise a competitive edge.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Datto, Inc.

How to Tune Oracle Instance Recovery
sponsored by Dell Software
EGUIDE: Access this expert e-guide to learn more about the best practices for tuning Oracle instance recovery.
Posted: 30 May 2014 | Published: 30 May 2014

Dell Software

The HP Solution to Backup Complexity and Scale
sponsored by HPE and Intel®
WHITE PAPER: This report discusses a key vendor that is significantly changing the BURA (Backup, Recovery, and Archiving) marketplace. Read on to find out why this complete BURA solution can be more flexibly deployed to meet backup challenges than any other solution in the market today.
Posted: 19 Jun 2014 | Published: 31 May 2014

HPE and Intel®

Recovering from Ransomware: Data Protection Strategy Guide
sponsored by Citrix
EGUIDE: With a constantly evolving IT landscape, the nature of disaster recovery planning is changing rapidly. Now, rather than just preparing for a natural disaster or manmade event, IT professionals must also be prepared to recover from ransomware and other cyberattacks. In this e-guide you will learn 2 quick steps for recovering from ransomware.
Posted: 12 Dec 2016 | Published: 07 Dec 2016

Citrix