ComputerWeekly.com Research Library

Powered by Bitpipe.com

Continuous Data Protection Research

  • 7 NAS encryption best practices to protect data

    Sponsored by: TechTarget ComputerWeekly.com

    NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.

  • 4 data privacy predictions for 2022

    Sponsored by: TechTarget ComputerWeekly.com

    Over the last two years, businesses and employees saw their workspace change forever with the rise of hybrid and remote work. All of a sudden, data privacy became a top priority for enterprises all over the world. As attention continues to build, here are four data privacy predictions for 2022 and beyond.

  • Digital identity strategies to enhance data privacy and protect networks

    Sponsored by: TechTarget ComputerWeekly.com

    The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.

  • The components and objectives of privacy engineering

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.

  • In data privacy we trust: building a strong information protection strategy in the hybrid era

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.

  • Infographic: 5 cybersecurity predictions for 2022

    Sponsored by: TechTarget ComputerWeekly.com

    Cybercrime showed no sign of slowing down in 2021 and enterprises continue to fall victim to cyberattacks, with gangs targeting larger organizations with increasingly large demands. In good news, we can always take stock of the recent past and know what to prepare for. In this infographic, we point out five forecasts for cybersecurity in 2022.

  • Protecting Server Data in Small and Medium-sized Businesses

    Sponsored by: Iron Mountain

    Read this white paper to learn how to successfully protect server data outside a centralized data center and focus on specific needs and requirements for SMBs.

  • Cloud backup tutorial: How to leverage cloud backup services

    Sponsored by: Iron Mountain

    In this tutorial on cloud backup, you will learn the pros and cons cloud backup, how cloud storage is changing data protection and disaster recovery and the differences in the cost of cloud backup vs. traditional backup.

  • Developing a disaster recovery plan for virtual machines

    Sponsored by: Overland Storage

    Virtual machine (VM) disaster recovery (DR) is a multifaceted activity that fails over a VM from a primary site to a remote location. There are a few approaches to facilitating disaster recovery in a virtual machine environment. Learn about look at the various approaches to virtual machine disaster recovery in this tutorial.

  • Continuous Availability for Virtualized Servers

    Sponsored by: Overland Storage

    REO Business Continuity Appliance (BCA) meets the challenge in providing an enterprise-class single solution for both continuous local backup and disaster recovery with full support for virtualized environments.

  • Case Study: First Trade Union Bank Adds Vault for LAN-Speed Restores and Robust Replication

    Sponsored by: i365, makers of Evault

    Despite the economic downturn, First Trade Union Bank is continuing to grow... this case study examines the data center challenges the bank faced in the midst of this growth and show's how by working with i365, they were able to create faster backups/restores, in some cases reduce RTO's by up to 98%, enhance DR and protect their virtual servers.

  • Presentation Transcript: Email Archiving, Ediscovery, Compliance, Storage Management

    Sponsored by: Symantec Corporation

    Email archiving is a burgeoning market at a time when many storage pros are faced with increasing ediscovery requests and compliance regulations. Listen to this podcast to find out the latest developments in email archiving.

  • Effective Risk Management in a Collaboration Driven Enterprise

    Sponsored by: AvePoint, Inc.

    How will platform and content access interruptions affect productivity, revenue, and compliance-related exposure? This document will analyze common consequences of such interruptions and discuss why successful SharePoint deployments require effective management, vigorous protection, diligent compliance protocols, and continuous availability.

  • Hitchcock Schools Protects SQL Servers and Data with Replay AppImage

    Sponsored by: AppAssure Software, Inc.

    The IT group at Hitchcock is responsible for all the end-user devices, network equipment, and servers that support students, teachers, administrators, and education programs. Central to their mission is protecting data that resides on SQL servers. That would be a much bigger worry if it weren't for Replay AppImage.

  • VMware and Dell Solutions for Small to Medium Business: Ensuring Rapid, Reliable and Affordable Disaster Recovery

    Sponsored by: Dell and VMware

    Affordable high availability and disaster recovery solutions are critical to the survival of all SMBs in the event of a disaster. Building on years of helping SMBs protect their information, VMware and Dell provide cost-effective and robust data protection, disaster recovery, and high availability solutions.

  • Storage magazine Online June 2009: Heal Thyself

    Sponsored by: TechTarget Storage

    A trend in storage product messaging these days is the theme of self-healing storage - the ability of a system to detect and repair hard disk problems automatically. In this month's cover story, independent storage expert Marc Staimer explains how and how well they work. This electronic issue also includes features on storage efficiency...

  • TechTalk: Stop Malware at the Web Gateway

    Sponsored by: BlueCoat

    Safeguarding your data from malware and other Web threats takes a layered approach. In this TechTalk webinar Blue Coat Technical Marketing Engineers will lead a discussion on how the Blue Coat ProxyAV works with the ProxySG to create a community-watch based security.

  • Backup and Recovery for Microsoft Exchange Server - Data Domain Deduplication Storage Best Practices Guide

    Sponsored by: EMC Backup and Recovery Solutions

    In many companies, Microsoft Exchange is now commonly viewed as a mission-critical application. Protecting Exchange information is critical and backup is still the primary method used. This paper focuses on the traditional backup and recovery practices for Microsoft Exchange Server along with solutions from Data Domain.

  • Continuous Data Protection

    Sponsored by: FalconStor Software

    If your company seeks to eliminate or drastically reduce backup windows to create faster point-in-time recoveries for more mission-critical apps, CDP software is a viable alternative to traditional backup software. Take a few minutes to read this presentation transcript to learn more about the technology.

  • Storage Magazine Online May 2009: Put Dedupe to the Test

    Sponsored by: TechTarget Storage

    In this month's Storage Magazine Online cover story, our resident backup expert, W. Curtis Preston, shows how to test various systems against your data so you can make the right decisions. Plus, check out features on recession-proof storage tips, four-tier storage design, and Continuous Data Protection (CDP).

  • Data Protection Strategies Leveraging Replication: An In-Depth Look at Evaluation Criteria and Usage Scenarios

    Sponsored by: Double-Take Software

    As dependence on continuous access to critical data grows, so does the importance of avoiding service interruption. This paper examines four data protection strategies and compares their merits for the most common business continuance scenarios.

  • ITS Group Consulting Offers "More 9's" and Killer RTO/RPO with Replay AppImage

    Sponsored by: AppAssure Software, Inc.

    Replay AppImage's ability to restore messages and systems quickly and with little effort allowed ITS Group to grow its customer base while keeping overhead low.

  • Agentless Architecture: Agentless Backup is Not a Myth

    Sponsored by: Asigra

    Agentless backup is NOT a myth. The Asigra solution is proof because it requires no agents, which inherently makes it easier to install and support than legacy backup and recovery solutions. This paper serves as an introduction to Asigra's Hybrid Cloud Backup and Recovery Software.

  • BACKUP REDESIGN: Do More with Less ... Really!

    Sponsored by: AppAssure Software, Inc.

    The call to protect corporate data in less time and for less money has inspired a whole new way of thinking about backup - a complete backup redesign. This paper explores a better way to backup and protect data and applications - disk-based application.

  • Presentation Transcript: Changing the Rules of Backup and Disaster Recovery

    Sponsored by: FalconStor Software

    Join Independent Backup Expert W. Curtis Preston and Falconstor's Product Marketing Manager Peter Eichers as they explore common data protection challenges and what technologies can be used to address them.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.