Backup and Recovery Management Reports

Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022

TechTarget ComputerWeekly.com

Building a Better Data Backup Plan: This year's hottest backup trends
sponsored by NETGEAR Inc.
EGUIDE: To help you build the best backup plan for the new year, read this special report by features writer Carol Sliwa on the hottest backup trends. Learn about what's new in backup software, backup hardware and backup outsourcing. Read on to learn more.
Posted: 10 Aug 2011 | Published: 10 Aug 2011

NETGEAR Inc.

New Data Protection Strategies
sponsored by IBM
WHITE PAPER: As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with minimal impact to business.
Posted: 23 Jul 2010 | Published: 20 Jul 2008

IBM

Focus on Endpoint Data Protection
sponsored by Druva
EGUIDE: Whether it's employee laptops, mobile devices, or remote offices, endpoint data protection is an increasing concern for data storage managers. Find out in this e-guide which approaches and technologies work best when it comes to storing and protecting endpoint data.
Posted: 30 Mar 2011 | Published: 30 Mar 2011

Druva

Social Security Administration Deploys DocAve to Protect Mission-Critical SharePoint Deployment
sponsored by AvePoint, Inc.
CASE STUDY: In early 2008, the Social Security administration they deployed their pilot SharePoint deployment that was accessible to all agency staff. After evaluating several backup solutions, SSA administrators chose AvePoint Doc Ave Backup and Recovery for their SharePoint environment. Read this case study to learn why.
Posted: 04 Feb 2010 | Published: 04 Feb 2010

AvePoint, Inc.

InMage Provides Solid Defense for Tampa Bay Lightning’s Mission-Critical Data and Applications
sponsored by InMage Systems
CASE STUDY: This short case study explores how the pro ice hockey team, Tampa Bay Lightning, easily and affordably implemented one industry-leading backup and recovery software solution that leverages the advantages of disk-based data protection to provided application-aware recovery that can meet both remote and local requirements. Read on to learn more.
Posted: 24 Oct 2013 | Published: 24 Oct 2013

InMage Systems

Data Protection: Evaluating Business Requirements & Classifying Your Data
sponsored by BakBone
WHITE PAPER: This paper discusses an approach to evaluating data at a business level, and implementing a data protection strategy that safeguards your organization based on the value of its data.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

BakBone

IDC Report: An ROI Analysis of FalconStor Storage Management Solutions
sponsored by FalconStor Software
ANALYST REPORT: IDC interviewed eight FalconStor customers that had deployed at least one or a combination of the following FalconStor storage management solutions: Virtual Tape Library (VTL), Network Storage Server (NSS), and Continuous Data Protector (CDP).
Posted: 18 Feb 2010 | Published: 01 Aug 2009

FalconStor Software

What are Continuous Data Protection Software's Pros And Cons?
sponsored by Dell EMC and Intel®
EGUIDE: Click inside this expert-guide and learn the pros and cons of continuous data protection software.
Posted: 26 Jun 2017 | Published: 20 Jun 2017

Dell EMC and Intel®

Business Continuity E-Guide
sponsored by Citrix
EGUIDE: Check out this e-guide for an overview of business continuity essentials, including access to a free BC planning template, discussions on how cybersecurity and business continuity can collaborate to simplify recovery, and 10 risks to monitor.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Citrix