Research Library

Powered by

Disaster Recovery Research

  • The Path Forward with Cloud-Based Disaster Recovery

    Sponsored by: Dell Software

    In the following video, learn what sets cloud-based disaster recovery apart from conventional on-premises deployments. Tune in now and uncover tips, strategies, and technology considerations to help improve your disaster recovery strategy today.

  • Full, Incremental or Differential: How to Choose the Correct Backup Type

    Sponsored by: DLT & Veritas

    This expert eGuide outlines the difference between incremental and differential backups. Read on to learn which method is best for protecting your data, as well as a new method to improve information governance.

  • Data Backup and Recovery Technology Tutorials

    Sponsored by: DLT & Veritas

    Access this expert eGuide for informative tutorials about the latest in backup and recovery. Read on to learn about the differences between backup and archiving, as well as the benefits of using tape vs. disk for each.

  • Enabling Fast Email Recovery when Something Goes Wrong

    Sponsored by: Dell Software

    This white paper focuses on helping organizations to understand key issues around email governance—the set of activities that range from formal eDiscovery and regulatory compliance to the daily activities that are focused on addressing problems in email environments—and provides guidance around helping overcome their challenges.

  • Bringing Enterprise Backup Features to SMB with Dell Appassure

    Sponsored by: Dell Software

    In the following white paper, learn about a backup and replication system that provides enterprise-class backup, replication, and recovery features for both virtual and physical systems running Microsoft or Linux operating systems.

  • Be Prepared with a Doomsday Disaster Recovery Plan

    Sponsored by: Dell Software

    This paper explores the common causes of IT disasters, outlines best practices for establishing a doomsday disaster recovery plan, and offers two tools that can help you get your business running again quickly after an inadvertent mistake, malicious attack or natural disaster.

  • The False Dilemma: Agentless vs. Agent Based Backup

    Sponsored by: Dell Software

    In the following white paper, uncover the differences between agent based and agentless backup. Inside, learn about each approach's pros, cons, and how they fair against the most important factors of backup.

  • The State of Security Today: What Needs to Change

    Sponsored by: Unisys

    This video discusses the state of security and what needs to change in order to keep our enterprises safe in today's environment. Watch now to learn how micro segmentation can minimize the damage of vicious threats and attacks.

  • Downtime Costs How Much? Calculating the Business Value of Disaster Recovery

    Sponsored by: Dell Software

    In the following white paper, uncover the characteristics of a top-notch disaster recovery strategy and how you can craft your own to ensure the fastest recovery time possible. Access now and learn about the true cost of downtime and why ineffective DR strategies can cause such a large amount of harm to the business.

  • A New DR Strategy: Reducing Downtime to Increase ROI

    Sponsored by: Dell Software

    This white paper provides a step-by-step approach to reduce downtime with data protection and ultimately increase ROI. Read on and also discover how two organizations used this strategy to save costs.

  • End the Firefighting Part 1: Keeping up with Today's Data Protection Requirements

    Sponsored by: Dell Software

    In this white paper, Scott Millis, chief technology officer at CyberadAPT, and Carl Vogel, director of IT for Iowa Select Farms explain how data protection needs have evolved in recent years and recommend strategies for addressing your organization's requirements today.

  • Three Reasons to Include a Plan for Recovery

    Sponsored by: Dell Software

    In the following exclusive white paper, learn about the top three reasons why you need to have a recovery plan when planning out a migration initiative. Inside, find out what a recovery plan should include, discover exactly how it can help mitigate migration faults, and more.

  • The Comprehensive IT Managed Services Guide for Enterprise CIOs

    Sponsored by: Unisys

    In this exclusive e-guide, you will learn how to establish an IT managed services provider strategy to cover new delivery models in your organization. Access this guide to focus your business around a comprehensive DR/BC strategy, as well as access insider tips on outsourcing app development, and more.

  • Beauty & The Backup: Are You Spending Too Much Time on Backup and Recovery?

    Sponsored by: Unitrends

    This white paper highlights the importance of user experience in backup and recovery strategies. Read on to learn about a backup strategy that provides IT staff with an intuitive and interactive dashboard and hundreds of key performance indicators related to backup and recovery operations.

  • Double-Take DR Overview: Top Notch Disaster Recovery for Microsoft Azure

    Sponsored by: Vision Solutions

    In the following white paper, learn about Double-Take DR, an easy-to-use, scalable disaster recovery solution that can protect and recover data and entire servers across physical, virtual, and cloud-based resources in Azure all through a single point of reference.

  • Double-Take® Availability for Microsoft® Azure

    Sponsored by: Vision Solutions

    In the following resource, learn how Microsoft Azure can help you take advantage of the consistency in heterogeneous environments between top-notch Microsoft data centers, hosted data centers and of course your own to ensure the highest disaster recovery standards as well as cloud computing and application performance needs.

  • Performance, Security, Scalability and Interoperability Enhancements to Dell DR Series Appliances

    Sponsored by: Dell, Inc.

    The following white paper documents the testing and auditing of the Dell DR Series storage/deduplication appliance. Access now and learn why so many businesses have decided to go with this system to gain the flexibility and reliability needed in their disaster recovery and backup initiatives in 2015.

  • Real-time Protection for Microsoft Hyper-V

    Sponsored by: Vision Solutions

    This white paper outlines three categories of data protection for Hyper-V. Read on to learn how a replication technology built to protect host-based servers and applications can help you create high availability and disaster recovery solution for virtual servers.

  • It’s Time to Virtualize all your Business-Critical Applications

    Sponsored by: VMware, Inc.

    This trend brief will help you make the business case for virtualizing business-critical applications by preparing for five common questions asked by business managers.

  • Top Data Protection Strategies and Tips

    Sponsored by: Vision Solutions

    This research report delves into top trends on data protection, disaster recovery, data management, and more to give you a closer look into the approaches and techniques your peers are leveraging. Explore statistics, key takeaways, and more.

  • Backup & Data Protection Buyer's Guide: What You Need to Know

    Sponsored by: Unitrends

    Access this essential guide to examine what you need to know about backup and data protection. You'll learn about the benefits and drawbacks of software-managed, hardware-managed, and cloud-managed backup strategies as well as the differences between array- and host-based replication.

  • Bringing Enterprise Backup Features to SMB

    Sponsored by: Dell, Inc.

    Access this report to examine a data protection solution that provides enterprise-class backup, replication, and recovery features for both virtual and physical systems running Microsoft Windows or Linux operating systems and supports a number of hypervisors. You'll learn how this compares to other backup and replication solutions.

  • Building the Business Case for Resiliency

    Sponsored by: IBM

    This white paper highlights a resiliency services framework that helps managers throughout the corporation discuss resiliency operations across seven zones of interdependent IT and business operations. Access now to see how you can build and organize your resiliency programs to meet the challenges of today's threat landscape.

  • Business Continuity Management and Security Can Work Together to Safeguard Data

    Sponsored by: IBM

    This white paper details five approaches to successfully integrating security operations and business continuity management that can improve breach prevention and mitigation. Access now to see how you can improve your business continuity management to lessen the cost and impact of any data breach and reduce the likelihood of one occurring.

  • How to Prevent Active Directory Disasters

    Sponsored by: Dell, Inc.

    This white paper explores how to prevent Active Directory disasters. Read on to discover use cases, best practices, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

What's Popular at Bitpipe? Daily Top 50 Reports | Daily Top 100 Topics | Popular Report Topics Research Library Copyright © 1998-2015 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.