Backup and Recovery Management Reports

The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

Developing a disaster recovery plan for virtual machines
sponsored by Overland Storage
EBOOK: Virtual machine (VM) disaster recovery (DR) is a multifaceted activity that fails over a VM from a primary site to a remote location. There are a few approaches to facilitating disaster recovery in a virtual machine environment. Learn about look at the various approaches to virtual machine disaster recovery in this tutorial.
Posted: 23 Jul 2009 | Published: 01 Jul 2009

Overland Storage

Expert Overview: New Data Protection Strategies and Success Metrics
sponsored by EMC Corporation
EGUIDE: This e-guide explores the basic philosophy behind continuous data protection and how it's making its way into the current backup landscape.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

EMC Corporation

Continuous Availability for Virtualized Servers
sponsored by Overland Storage
PRODUCT LITERATURE: REO Business Continuity Appliance (BCA) meets the challenge in providing an enterprise-class single solution for both continuous local backup and disaster recovery with full support for virtualized environments.
Posted: 06 Jul 2009 | Published: 06 Jul 2009

Overland Storage

Presentation Transcript: Don't Be Left Out of the Cloud: How to Sell Enterprise-Quality Cloud  Services and Data Protection to SMBs
sponsored by KineticD
PRESENTATION TRANSCRIPT: Read this expert transcript to learn why SMBs are adopting cloud services more rapidly than large enterprises and what challenges your clients face in protecting their business critical data in an increasingly mobile world.
Posted: 18 Oct 2010 | Published: 24 Aug 2010

KineticD

E-Guide: How to Get Optimal Results with Virtual Data Protection
sponsored by BakBone
EGUIDE: In this e-guide, brought to you by SearchStorage.com, you will learn how to overcome the strategic challenges involved in data recovery in a virtual environment, and explore what backup process is right for your organization.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

BakBone

Presentation Transcript: Overcoming the Challenges with Tape Backup
sponsored by ExaGrid Systems, Inc.
PRESENTATION TRANSCRIPT: In this presentation transcript, Bill Hobbib, Vice President of marketing at ExaGrid systems, will discuss the typical issues in backup and rapidly give you just a quick overview of what ExaGrid does before moving on to customer case studies. Continue reading to learn five tips for faster more reliable backups.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

ExaGrid Systems, Inc.

Myth Busted: Affordable, Easy to Manage Virtualization with High-Availability is a Reality
sponsored by Stratus Technologies
WHITE PAPER: SMBs want to take advantage of the benefits of virtualization but it can be costly to manage if they do not have the required skills in-house. Dan Kusnetzky takes a deep look at all of the benefits as well as the issues these businesses are facing, including the requirement to use automated systems, reducing complexity and maintaining availability.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

Stratus Technologies

Disaster Recovery Today: Top 3 Vendors and 2 New Tactics
sponsored by EMC & Arrow
EGUIDE: This E-Guide examines the factors driving the recent focus on data protection and points out the top three vendors they are turning to as they evaluate and invest in new recovery software.
Posted: 08 Jul 2013 | Published: 08 Jul 2013

EMC & Arrow

Focus on Endpoint Data Protection
sponsored by Druva
EGUIDE: Whether it's employee laptops, mobile devices, or remote offices, endpoint data protection is an increasing concern for data storage managers. Find out in this e-guide which approaches and technologies work best when it comes to storing and protecting endpoint data.
Posted: 30 Mar 2011 | Published: 30 Mar 2011

Druva