Enterprise Data Backups Reports

The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

4 data privacy predictions for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Over the last two years, businesses and employees saw their workspace change forever with the rise of hybrid and remote work. All of a sudden, data privacy became a top priority for enterprises all over the world. As attention continues to build, here are four data privacy predictions for 2022 and beyond.
Posted: 08 Mar 2022 | Published: 08 Mar 2022

TechTarget ComputerWeekly.com

Disaster Recovery Seminar Presentation Download
sponsored by EMC Backup and Recovery Solutions
PRESENTATION TRANSCRIPT: This presentation is divided into three modules. In the first module, we will examine the three keys to successful disaster recovery planning. In modules two and three, we will analyse data protection techniques and testing techniques.
Posted: 15 Sep 2009 | Published: 15 Sep 2009

EMC Backup and Recovery Solutions

E-Book: IT Handbook - Backup and Recovery
sponsored by Vizioncore Inc.
EBOOK: Before you begin researching all of the available backup and disaster recovery technologies on the market, get a handle on your business needs. Read thisĀ e-book to learn about developing a backup and disaster recovery strategy, implementation guidelines for backup and dr, remote backups, and testing and verifying your backups.
Posted: 30 Apr 2010 | Published: 30 Apr 2010

Vizioncore Inc.

E-Zine: THE GREEN AND VIRTUAL DATA CENTER - Chapter 4: IT Infrastructure Resource Management
sponsored by TechTarget Storage
EZINE: Best practices, people, processes, and procedures combine with technology tools, hardware, software, networks, services, and facilities to enable a virtual data center. The importance of this chapter is to understand how all these elements coupled with existing and emerging technologies can be applied to improve IT service delivery.
Posted: 21 Aug 2009 | Published: 01 Aug 2009

TechTarget Storage

Dealing with Data Growth: Storage and Backup Strategies
sponsored by Simplify IT
EGUIDE: This e-guide, from SearchDataBackup.com, examines how the proliferation of business information has contributed to the current state of data protection.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

Simplify IT

Developing a disaster recovery plan for virtual machines
sponsored by Overland Storage
EBOOK: Virtual machine (VM) disaster recovery (DR) is a multifaceted activity that fails over a VM from a primary site to a remote location. There are a few approaches to facilitating disaster recovery in a virtual machine environment. Learn about look at the various approaches to virtual machine disaster recovery in this tutorial.
Posted: 23 Jul 2009 | Published: 01 Jul 2009

Overland Storage

Data Protection for the Enterprise vs. SMB: Disk, CDP, Cloud and Other Options
sponsored by Axcient
EGUIDE: This E-Guide explores the role that scale plays in determining the impact of a disruption and discusses enterprise data protection requirements that apply to SMBs. Find out why disk, CDP and cloud backup offerings are worth further consideration and learn how hybrid appliances are making DR quick and cost-effective.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

Axcient

The Case for Third-Party Archiving in Exchange 2010
sponsored by Sunbelt Software
WHITE PAPER: This white paper will give you a brief overview of Sunbelt Software, while educating decision makers about the important role that email and other content archiving plays in minimizing risk and lowering the cost of doing business, the capabilities of archiving in Exchange 2020, and more.
Posted: 28 Jan 2010 | Published: 28 Jan 2010

Sunbelt Software

Data Protection: Evaluating Business Requirements & Classifying Your Data
sponsored by BakBone
WHITE PAPER: This paper discusses an approach to evaluating data at a business level, and implementing a data protection strategy that safeguards your organization based on the value of its data.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

BakBone