Data Protection Reports

7 NAS encryption best practices to protect data
sponsored by TechTarget ComputerWeekly.com
EBOOK: NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

TechTarget ComputerWeekly.com

Infographic: 5 cybersecurity predictions for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Cybercrime showed no sign of slowing down in 2021 and enterprises continue to fall victim to cyberattacks, with gangs targeting larger organizations with increasingly large demands. In good news, we can always take stock of the recent past and know what to prepare for. In this infographic, we point out five forecasts for cybersecurity in 2022.
Posted: 06 Jan 2022 | Published: 06 Jan 2022

TechTarget ComputerWeekly.com

Continuous Availability for Virtualized Servers
sponsored by Overland Storage
PRODUCT LITERATURE: REO Business Continuity Appliance (BCA) meets the challenge in providing an enterprise-class single solution for both continuous local backup and disaster recovery with full support for virtualized environments.
Posted: 06 Jul 2009 | Published: 06 Jul 2009

Overland Storage

E-Guide: Continuous Data Protection Backup Tutorial on CDP Tools, Part 1
sponsored by FalconStor Software
EGUIDE: In part one of this tutorial on continuous data protection backup, learn about the latest CDP tools, how CDP has grown over the past few years, and the history of CDP tools and how they are evolving.
Posted: 20 May 2011 | Published: 20 May 2011

FalconStor Software

E-Guide: Best Practices for Data Protection and Recovery in Virtual Environments
sponsored by EMC Backup and Recovery Solutions
EGUIDE: Data backup is a top priority at most organizations, but data protection in virtual environments can be especially complicated. In this expert eguide from SearchVirtualDataCentre.co.uk, get tips for doing just that. Find out how you can enhance your data protection strategy without compromising your virtual infrastructure.
Posted: 16 Jul 2010 | Published: 16 Jul 2010

EMC Backup and Recovery Solutions

Presentation Transcript: Optimize Business and IT with New Generation Application Lifecycle
sponsored by SAP Community Network
PRESENTATION TRANSCRIPT: This transcript provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
Posted: 26 Oct 2009 | Published: 26 Oct 2009

SAP Community Network

Social Security Administration Deploys DocAve to Protect Mission-Critical SharePoint Deployment
sponsored by AvePoint, Inc.
CASE STUDY: In early 2008, the Social Security administration they deployed their pilot SharePoint deployment that was accessible to all agency staff. After evaluating several backup solutions, SSA administrators chose AvePoint Doc Ave Backup and Recovery for their SharePoint environment. Read this case study to learn why.
Posted: 04 Feb 2010 | Published: 04 Feb 2010

AvePoint, Inc.

eGuide: Information Security - Buyer's Guide to Messaging Security
sponsored by TechTarget Security
EGUIDE: Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

TechTarget Security

10 Pro Tips for Storage Performance Efficiency
sponsored by NetApp
EGUIDE: Check out this expert E-Guide for 10 key tips to find out how things like continuous data protection, active multi-pathing and sometimes simply questioning the number of queries users submit can make a difference in your shop.
Posted: 26 Jun 2012 | Published: 26 Jun 2012

NetApp

Presentation Transcript: The Challenges of Protection and Recovery in a Virtual World
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: Read this presentation transcript to learn the challenges brought about by protection and recovery approaches in virtual environments and what different IT organizations are doing to address them.
Posted: 19 May 2010 | Published: 19 May 2010

Hewlett Packard Enterprise