Recovery Management Reports

Infographic: 5 cybersecurity predictions for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Cybercrime showed no sign of slowing down in 2021 and enterprises continue to fall victim to cyberattacks, with gangs targeting larger organizations with increasingly large demands. In good news, we can always take stock of the recent past and know what to prepare for. In this infographic, we point out five forecasts for cybersecurity in 2022.
Posted: 06 Jan 2022 | Published: 06 Jan 2022

TechTarget ComputerWeekly.com

The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

TechTarget ANZ Data Reduction E-Book
sponsored by IBM
EBOOK: Few organisations are willing to pay more for storage every year. Data reduction can get you off the treadmill by reducing the amount of data you need to store, backup and manage, and this e-book explains compression, data de-duplication, archiving and several other techniques to achieve this outcome.
Posted: 02 Aug 2010 | Published: 30 Jul 2010

IBM

E-Zine: THE GREEN AND VIRTUAL DATA CENTER - Chapter 4: IT Infrastructure Resource Management
sponsored by TechTarget Storage
EZINE: Best practices, people, processes, and procedures combine with technology tools, hardware, software, networks, services, and facilities to enable a virtual data center. The importance of this chapter is to understand how all these elements coupled with existing and emerging technologies can be applied to improve IT service delivery.
Posted: 21 Aug 2009 | Published: 01 Aug 2009

TechTarget Storage

ST Focus on Better Data Protection with CDP and Deduplication
sponsored by Dell Software
EBOOK: Continuous data protection and deduplication are chief among the technologies that data storage managers are investigating when it comes to improved data backup and storage efficiency. In this expert e-book, learn how CDP and deduplication have evolved, and determine the best implementation strategy for your shop.
Posted: 22 Jun 2011 | Published: 05 Aug 2011

Dell Software

Greenbrier Turns to DocAve® for SharePoint® Data Protection
sponsored by AvePoint, Inc.
CASE STUDY: Greenbrier needed a fast, stable, and scalable SharePoint data protection solution capable of backing up directly to disk, and able to seamlessly integrate with both their existing and intended IT infrastructure. Learn why they turned to AvePoint's DocAve solution for its reliability and modular architecture.
Posted: 04 Feb 2010 | Published: 04 Feb 2010

AvePoint, Inc.

Five Challenges to Continuous PCI DSS Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape.
Posted: 07 Feb 2011 | Published: 07 Feb 2011

Tripwire, Inc.

Demo: Protecting Microsoft SQL Server 2008 Using FalconStor CDP
sponsored by FalconStor Software
PRODUCT DEMO: Watch this video demonstration to see exactly how FalconStor Continuous Data Protector is used to protect and recover your Microsoft SQL Server data.
Posted: 21 Jul 2010 | Premiered: 21 Jul 2010

FalconStor Software

CDP 101: Solving data protection challenges with CDP
sponsored by FalconStor Software
EGUIDE: Early continuous data protection products may not have lived up to the hype when they first debuted a few years ago – but CDP technology now is the future of data backup and recovery. This E-Guide outlines how continuous data protection has evolved over the years and lists 10 popular CDP products available today.
Posted: 17 Jun 2011 | Published: 17 Jun 2011

FalconStor Software

Expert Guide to Data Protection: New Capabilities, Remaining Gaps, and Answers to Customer FAQ
sponsored by Symantec Corporation
EGUIDE: This e-guide follows the evolution of data protection and points out the latest capabilities and remaining gaps in the marketplace. Read on now to find out whether conventional methods are keeping pace and which data protection processes should be treated separately.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

Symantec Corporation