Continuous Backups Reports

The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

E-Guide: Three Ways to Reduce Backup Windows on a Budget
sponsored by Acronis NEMEA
EGUIDE: One of the biggest problems plaguing backup administrators is the volume of data that must be backed up each night is steadily increasing, but the amount of time allotted for the nightly backup remains constant. There are better ways- Read on to learn more.
Posted: 03 Aug 2011 | Published: 03 Aug 2011

Acronis NEMEA

CDP 101: Solving data protection challenges with CDP
sponsored by FalconStor Software
EGUIDE: Early continuous data protection products may not have lived up to the hype when they first debuted a few years ago – but CDP technology now is the future of data backup and recovery. This E-Guide outlines how continuous data protection has evolved over the years and lists 10 popular CDP products available today.
Posted: 17 Jun 2011 | Published: 17 Jun 2011

FalconStor Software

E-Guide: Backing up Your Virtual Server
sponsored by Symantec Corporation
EGUIDE: Backing up virtual machines is tougher than you think; and the fact of the matter is it’s not a straightforward process! This guide will walk you through how to determine which method is best for your storage requirement.
Posted: 06 Dec 2010 | Published: 06 Dec 2010

Symantec Corporation

Storage-Based Replication Options: Selecting the Right Replication Method for Optimal Data Protection
sponsored by DellEMC and Intel®
WHITE PAPER: Backup is the core of data protection because it provides the ability to recover data from either physical disasters or common data loss conditions. But backup can have drawbacks - regular disruption of production applications, long recovery time, and significant data/work loss. Replication technologies were developed to shorten recovery time..
Posted: 08 Sep 2009 | Published: 29 Jul 2009

DellEMC and Intel®

Disaster Recovery Seminar Presentation Download
sponsored by EMC Backup and Recovery Solutions
PRESENTATION TRANSCRIPT: This presentation is divided into three modules. In the first module, we will examine the three keys to successful disaster recovery planning. In modules two and three, we will analyse data protection techniques and testing techniques.
Posted: 15 Sep 2009 | Published: 15 Sep 2009

EMC Backup and Recovery Solutions

Demo: Protecting Microsoft SQL Server 2008 Using FalconStor CDP
sponsored by FalconStor Software
PRODUCT DEMO: Watch this video demonstration to see exactly how FalconStor Continuous Data Protector is used to protect and recover your Microsoft SQL Server data.
Posted: 21 Jul 2010 | Premiered: 21 Jul 2010

FalconStor Software

Presentation Transcript: Don't Be Left Out of the Cloud: How to Sell Enterprise-Quality Cloud  Services and Data Protection to SMBs
sponsored by KineticD
PRESENTATION TRANSCRIPT: Read this expert transcript to learn why SMBs are adopting cloud services more rapidly than large enterprises and what challenges your clients face in protecting their business critical data in an increasingly mobile world.
Posted: 18 Oct 2010 | Published: 24 Aug 2010

KineticD

Five Challenges to Continuous PCI DSS Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape.
Posted: 07 Feb 2011 | Published: 07 Feb 2011

Tripwire, Inc.

eGuide: Information Security - Buyer's Guide to Messaging Security
sponsored by TechTarget Security
EGUIDE: Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

TechTarget Security