ComputerWeekly.com Research Library

Powered by Bitpipe.com

Continuous Data Protection Research

  • Presentation Transcript: Email Archiving, Ediscovery, Compliance, Storage Management

    Sponsored by: Symantec Corporation

    Email archiving is a burgeoning market at a time when many storage pros are faced with increasing ediscovery requests and compliance regulations. Listen to this podcast to find out the latest developments in email archiving.

  • Effective Risk Management in a Collaboration Driven Enterprise

    Sponsored by: AvePoint, Inc.

    How will platform and content access interruptions affect productivity, revenue, and compliance-related exposure? This document will analyze common consequences of such interruptions and discuss why successful SharePoint deployments require effective management, vigorous protection, diligent compliance protocols, and continuous availability.

  • Hitchcock Schools Protects SQL Servers and Data with Replay AppImage

    Sponsored by: AppAssure Software, Inc.

    The IT group at Hitchcock is responsible for all the end-user devices, network equipment, and servers that support students, teachers, administrators, and education programs. Central to their mission is protecting data that resides on SQL servers. That would be a much bigger worry if it weren't for Replay AppImage.

  • VMware and Dell Solutions for Small to Medium Business: Ensuring Rapid, Reliable and Affordable Disaster Recovery

    Sponsored by: Dell and VMware

    Affordable high availability and disaster recovery solutions are critical to the survival of all SMBs in the event of a disaster. Building on years of helping SMBs protect their information, VMware and Dell provide cost-effective and robust data protection, disaster recovery, and high availability solutions.

  • Storage magazine Online June 2009: Heal Thyself

    Sponsored by: TechTarget Storage

    A trend in storage product messaging these days is the theme of self-healing storage - the ability of a system to detect and repair hard disk problems automatically. In this month's cover story, independent storage expert Marc Staimer explains how and how well they work. This electronic issue also includes features on storage efficiency...

  • TechTalk: Stop Malware at the Web Gateway

    Sponsored by: BlueCoat

    Safeguarding your data from malware and other Web threats takes a layered approach. In this TechTalk webinar Blue Coat Technical Marketing Engineers will lead a discussion on how the Blue Coat ProxyAV works with the ProxySG to create a community-watch based security.

  • Backup and Recovery for Microsoft Exchange Server - Data Domain Deduplication Storage Best Practices Guide

    Sponsored by: EMC Backup and Recovery Solutions

    In many companies, Microsoft Exchange is now commonly viewed as a mission-critical application. Protecting Exchange information is critical and backup is still the primary method used. This paper focuses on the traditional backup and recovery practices for Microsoft Exchange Server along with solutions from Data Domain.

  • Continuous Data Protection

    Sponsored by: FalconStor Software

    If your company seeks to eliminate or drastically reduce backup windows to create faster point-in-time recoveries for more mission-critical apps, CDP software is a viable alternative to traditional backup software. Take a few minutes to read this presentation transcript to learn more about the technology.

  • Storage Magazine Online May 2009: Put Dedupe to the Test

    Sponsored by: TechTarget Storage

    In this month's Storage Magazine Online cover story, our resident backup expert, W. Curtis Preston, shows how to test various systems against your data so you can make the right decisions. Plus, check out features on recession-proof storage tips, four-tier storage design, and Continuous Data Protection (CDP).

  • Data Protection Strategies Leveraging Replication: An In-Depth Look at Evaluation Criteria and Usage Scenarios

    Sponsored by: Double-Take Software

    As dependence on continuous access to critical data grows, so does the importance of avoiding service interruption. This paper examines four data protection strategies and compares their merits for the most common business continuance scenarios.

  • ITS Group Consulting Offers "More 9's" and Killer RTO/RPO with Replay AppImage

    Sponsored by: AppAssure Software, Inc.

    Replay AppImage's ability to restore messages and systems quickly and with little effort allowed ITS Group to grow its customer base while keeping overhead low.

  • Agentless Architecture: Agentless Backup is Not a Myth

    Sponsored by: Asigra

    Agentless backup is NOT a myth. The Asigra solution is proof because it requires no agents, which inherently makes it easier to install and support than legacy backup and recovery solutions. This paper serves as an introduction to Asigra's Hybrid Cloud Backup and Recovery Software.

  • BACKUP REDESIGN: Do More with Less ... Really!

    Sponsored by: AppAssure Software, Inc.

    The call to protect corporate data in less time and for less money has inspired a whole new way of thinking about backup - a complete backup redesign. This paper explores a better way to backup and protect data and applications - disk-based application.

  • Presentation Transcript: Changing the Rules of Backup and Disaster Recovery

    Sponsored by: FalconStor Software

    Join Independent Backup Expert W. Curtis Preston and Falconstor's Product Marketing Manager Peter Eichers as they explore common data protection challenges and what technologies can be used to address them.

  • FalconStor Continuous Data Protector

    Sponsored by: FalconStor Software

    Enter the HP Solutions Demo portal for an interactive flash demo and overview on FalconStor CDP with HP Solutions.

  • Cisco Continuous Data Protection for Files

    Sponsored by: Cisco Systems, Inc.

    Most analysts, including Enterprise Strategy Group, agree that performing only a periodic backup leaves data at risk, and they find that this is a major concern among the IT professionals they survey. The answer to this concern is Cisco Small Business Network Storage Systems (NSS) and Cisco Continuous Data Protection (CDP) for Files software.

  • Iron Mountain Digital Virtual File Store Service: Trusted, Secure, Cost-Effective Cloud-Based Storage

    Sponsored by: Iron Mountain

    To help companies reduce the costs of storing and managing inactive data, Iron Mountain has created an enterprise-class cloud-based storage archive service, the Virtual File Store (VFS). The VFS service is part of Iron Mountain's Storage-as-a-Service portfolio, which includes email management/archiving, eDiscovery, and data backup/recovery.

  • HP StorageWorks tape and disk-to-disk data protection

    Sponsored by: Hewlett Packard Company and Intel

    HP protects the integrity of your data and helps you regain access to it. We have a range of change-ready, cost-effective, and trusted solutions that provide the appropriate level of protection based on your specific business requirements.

  • 7 Requirements of Data Loss Prevention

    Sponsored by: Symantec Corporation

    This report provides a clear understanding of the capabilities a successful data loss prevention solution must deliver. It also incorporates insight into the capabilities that companies require from their solution.

  • Fusion-io ioDrive Data Sheet

    Sponsored by: Fusion-IO

    Designed around a revolutionary silicon-based storage architecture known as ioMemory, the ioDrive is the world's most advanced NAND clustering technology with performance comparable to DRAM and storage capacity on par with today's hard disks, giving you the power to improve both memory capacity and storage performance by up to one thousand times.

  • Taming The Power Hungry Data Center

    Sponsored by: Fusion-IO

    The widening disparity between CPU performance and that of storage subsystems has spawned numerous solutions that do not fix the problem. This white paper exposes this fundamental flaw and introduces the means available today to substantively reduce power consumption while improving performance: Fusion-io's flash memory-based storage technology.

  • User Directed Storage Management: How To Make Users Accountable For Responsible Storage Usage

    Sponsored by: Northern Parklife

    The accelerated pace of doing business in today's world puts organizations under tremendous pressure. They need to be fleet and flexible, able to rapidly respond to opportunities, make decisions, and deploy resources. Critical to this is the way information is managed and stored.

  • Streamline Your Storage Usage: 4 Straightforward Ways To True NAS Management

    Sponsored by: Northern Parklife

    In a relatively short span of time, Network Attached Storage [NAS] has become a popular, widely implemented technology given its many attractive features and benefits. This whitepaper details four techniques for managing network attached storage, including file management simplification and data access without server intervention.

  • MicroScan De-Duplication Minimizes Replication Bandwidth and Storage Requirements

    Sponsored by: FalconStor Software

    Read this document to learn how FalconStor's powerful MicroScan technology works to minimize duplicate data and help save considerable bandwidth, storage resources, and overhead.

  • New Insider Threat Emerges in the New Economy

    Sponsored by: Lumension

    Learn how employees and partners are engaging with IT assets and intellectual property.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.