Recovery Management Reports

Agentless Architecture. Agentless Backup is Not A Myth
sponsored by Asigra
WHITE PAPER: Backup and recovery software typically requires agents that are installed onto the host servers that a system administrator wants to back up. The Asigra solution requires no agents, which inherently makes it easier to install and support than legacy backup and recovery solutions. Read this whitepaper to learn more!
Posted: 24 Aug 2010 | Published: 24 Aug 2010

Asigra

The keys to a successful business continuity and DR strategy
sponsored by Citrix
EGUIDE: Developing a business continuity and DR strategy usually involves an extensive amount of information gathering, combined with piecing together products and services that work as a collective. Check out this e-guide to learn the differences between business continuity and DR, discover 4 approaches to a successful combined strategy, and much more.
Posted: 20 Apr 2020 | Published: 20 Apr 2020

Citrix

Solution Brief: Unified Backup and Disaster Recovery (DR) for VMware Environments
sponsored by FalconStor Software
WHITE PAPER: Organizations investing in VMware vSphere can leverage the data protection capabilities and application awareness of FalconStor CDP to protect and maximize their VMware purchases. FalconStor CDP enables flexible, affordable, automated, and dependable backup and DR for any VMware vSphere environment.
Posted: 22 Jul 2011 | Published: 22 Jul 2011

FalconStor Software

Exchange Insider E-Zine - Volume 5: When Disaster Strikes in Exchange Server 2010
sponsored by Google
EZINE: Volume 5 of the Exchange Insider e-zine looks at how Exchange Server 2010’s database availability groups can ease an administrator’s backup and disaster recovery stress. Also learn how Forefront Protection 2010 can help defend Exchange 2010 servers from spam and malware attacks, and best practices for email archiving and e-discovery.
Posted: 27 Oct 2010 | Published: 27 Oct 2010

Google

E-Zine: THE GREEN AND VIRTUAL DATA CENTER - Chapter 4: IT Infrastructure Resource Management
sponsored by TechTarget Storage
EZINE: Best practices, people, processes, and procedures combine with technology tools, hardware, software, networks, services, and facilities to enable a virtual data center. The importance of this chapter is to understand how all these elements coupled with existing and emerging technologies can be applied to improve IT service delivery.
Posted: 21 Aug 2009 | Published: 01 Aug 2009

TechTarget Storage

Continuous Availability for Virtualized Servers
sponsored by Overland Storage
PRODUCT LITERATURE: REO Business Continuity Appliance (BCA) meets the challenge in providing an enterprise-class single solution for both continuous local backup and disaster recovery with full support for virtualized environments.
Posted: 06 Jul 2009 | Published: 06 Jul 2009

Overland Storage

Data Protection: Evaluating Business Requirements & Classifying Your Data
sponsored by BakBone
WHITE PAPER: This paper discusses an approach to evaluating data at a business level, and implementing a data protection strategy that safeguards your organization based on the value of its data.
Posted: 10 Jan 2011 | Published: 10 Jan 2011

BakBone

Integrated Recovery Solutions: An Emerging Trend in Disaster Recovery
sponsored by InMage Systems
ANALYST REPORT: What if there was one product that could provide all the components needed for a complete disaster recovery solution? IDC sees an emerging trend in the market for this type of solution, one that could be defined as an "integrated recovery solution."
Posted: 20 Apr 2010 | Published: 01 Feb 2010

InMage Systems

Virtual Data Center E-Zine - Volume 23: Backup Strategies for Virtual Servers
sponsored by TechTarget Data Center
EZINE: With the number of virtual machines increasing in the data center, backing up servers today has become much more than just copying data files. Take a look at how virtualization technologies have changed traditional backup strategies and examine some of the approaches that protect against issues like accidental file loss and server crashes.
Posted: 01 Jun 2010 | Published: 01 Jun 2010

TechTarget Data Center

eGuide: Information Security - Buyer's Guide to Messaging Security
sponsored by TechTarget Security
EGUIDE: Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

TechTarget Security