Data Protection Reports

Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022

TechTarget ComputerWeekly.com

In data privacy we trust: building a strong information protection strategy in the hybrid era
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.
Posted: 25 Jan 2022 | Published: 25 Jan 2022

TechTarget ComputerWeekly.com

Storage-Based Replication Options: Selecting the Right Replication Method for Optimal Data Protection
sponsored by DellEMC and IntelĀ®
WHITE PAPER: Backup is the core of data protection because it provides the ability to recover data from either physical disasters or common data loss conditions. But backup can have drawbacks - regular disruption of production applications, long recovery time, and significant data/work loss. Replication technologies were developed to shorten recovery time..
Posted: 08 Sep 2009 | Published: 29 Jul 2009

DellEMC and IntelĀ®

E-Guide: How to Get Optimal Results with Virtual Data Protection
sponsored by BakBone
EGUIDE: In this e-guide, brought to you by SearchStorage.com, you will learn how to overcome the strategic challenges involved in data recovery in a virtual environment, and explore what backup process is right for your organization.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

BakBone

How to Handle Data Management in the Cloud
sponsored by TechTarget Data Backup
EBOOK: Data management in the cloud enables organizations to manage data between clouds and in conjunction with on-premises storage. Access this handbook to learn 3 cloud-based data management challenges, how to make cloud data work to your benefit, how to use multi-cloud data management and protection, and more.
Posted: 09 Jun 2020 | Published: 09 Jun 2020

TechTarget Data Backup

Demo: Microsoft Windows 2008 Protection and Recovery Using FalconStor CDP
sponsored by FalconStor Software
PRODUCT DEMO: Access this video demonstration for a detailed look at FalconStor CDP’s ability to protect physical servers and virtual machines, support direct attached storage along with iSCSI and fiber channel SAN connectivity and to work with clustered shared storage.
Posted: 21 Jul 2010 | Premiered: 21 Jul 2010

FalconStor Software

Twynham School Relies on DocAve® to Protect Valuable SharePoint Data
sponsored by AvePoint, Inc.
CASE STUDY: Southwest England's Twynham Comprehensive School used AvePoint's DocAve Backup and Restore to provide reliable, granular, and full-fidelity backup and recovery capabilities to protect their over 50GB of data and hundreds of sites stored on its MOSS environment.
Posted: 04 Feb 2010 | Published: 04 Feb 2010

AvePoint, Inc.

Dealing with Data Growth: Storage and Backup Strategies
sponsored by Simplify IT
EGUIDE: This e-guide, from SearchDataBackup.com, examines how the proliferation of business information has contributed to the current state of data protection.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

Simplify IT

Expert Overview: New Data Protection Strategies and Success Metrics
sponsored by EMC Corporation
EGUIDE: This e-guide explores the basic philosophy behind continuous data protection and how it's making its way into the current backup landscape.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

EMC Corporation

New Data Protection Strategies
sponsored by IBM
WHITE PAPER: As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with minimal impact to business.
Posted: 23 Jul 2010 | Published: 20 Jul 2008

IBM