Disk Recovery Reports

A Computer Weekly buyer's guide to data protection
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.
Posted: 08 Feb 2021 | Published: 20 Aug 2019

TechTarget ComputerWeekly.com

Focus: backup, replication and snapshots
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We walk you from the basics of backup methods to the pros and cons of different ways of protecting data and key issues in virtual machine backup.
Posted: 08 Feb 2021 | Published: 27 Jun 2017

TechTarget ComputerWeekly.com

Big Data Begins with Better Backup
sponsored by Symantec Corporation
VIDEO: This video gives insight into one vendor that specializes in maintaining existing infrastructures while complimenting it with Hadoop. This allows customers to bring in new technology without having to worry about lapses in data protection.
Posted: 02 Jun 2014 | Premiered: 02 Jun 2014

Symantec Corporation

Protecting Technology Infrastructure: The Importance of Secure Access and Continuity Solutions
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper investigates mid-market continuity solutions drivers, deployment stages, and benefits and requirements. Its goal is to help IT managers understand the need for continuity solutions, benchmark their continuity journey against their peers, and evaluate how the right continuity solutions can address those needs.
Posted: 06 Jun 2014 | Published: 31 Jan 2014

Hewlett Packard Enterprise

Navigating VMware and Cloud Backups
sponsored by Clumio
EGUIDE: VMware VM backups and cloud backups can improve workload protection by securing data but navigating the tools themselves can be intimidating. Dive into this e-guide to learn 6 VMware VM backup best practices and 3 cloud backup security guidelines to help you navigate this tricky landscape.
Posted: 31 Jan 2020 | Published: 29 Jan 2020

Clumio

Double-Take Availability: Keeping Disaster Recovery Systems Up to Date
sponsored by Vision Solutions
CASE STUDY: Access this exclusive case study to discover how a successful accounting organization accommodated an increase in data into their disaster recovery plan.
Posted: 12 Mar 2014 | Published: 31 Dec 2012

Vision Solutions

Backup target features expand use cases and evolve for better data protection
sponsored by Hedvig Inc
EGUIDE: Disk-based backup targets have evolved to become far more than just cheap disk arrays. It is vital to understand the different capabilities these systems can offer. In this guide discover new features such as in-place recovery - that allows a virtual machine to instantiate its data store directly from an appliance.
Posted: 15 Feb 2017 | Published: 13 Feb 2017

Hedvig Inc

Enterprise Architects Challenged to Manage Data Explosion
sponsored by Red Hat
WHITE PAPER: This whitepaper explains how Red Hat Storage Server allows enterprises to quickly and confidently deliver business applications that minimize cost, complexity, and risk while increasing architectural flexibility.
Posted: 02 Jul 2014 | Published: 29 Nov 2013

Red Hat

Best Practices for Your Disaster Recovery/Business Continuity Plan
sponsored by McKesson Corporation
WHITE PAPER: In this expert guide, discover 10 best practice tips to ensure your disaster recovery/business continuity plan meets your enterprise's data security needs. Also learn how backup and disaster recovery, historically treated as separately, are converging to provide a more cohesive data management plan.
Posted: 13 Sep 2016 | Published: 12 Sep 2016

McKesson Corporation

Video: FUJITSU Storage ETERNUS CS8000 - Unified Data Protection Appliance
sponsored by Fujitsu
WEBCAST: This exclusive webcast examines a unified data protection appliance for the complete consolidation of backup and archiving infrastructures of open systems and mainframes, providing flexible service levels regarding capacity, speed, and costs. Tune in now to learn how this tool can help safeguard your critical information.
Posted: 31 Jan 2014 | Premiered: Jan 31, 2014

Fujitsu