Backup and Recovery Management Reports

7 NAS encryption best practices to protect data
sponsored by TechTarget ComputerWeekly.com
EBOOK: NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

TechTarget ComputerWeekly.com

Integrated Recovery Solutions: An Emerging Trend in Disaster Recovery
sponsored by InMage Systems
ANALYST REPORT: What if there was one product that could provide all the components needed for a complete disaster recovery solution? IDC sees an emerging trend in the market for this type of solution, one that could be defined as an "integrated recovery solution."
Posted: 20 Apr 2010 | Published: 01 Feb 2010

InMage Systems

Demo: Microsoft Windows 2008 Protection and Recovery Using FalconStor CDP
sponsored by FalconStor Software
PRODUCT DEMO: Access this video demonstration for a detailed look at FalconStor CDP’s ability to protect physical servers and virtual machines, support direct attached storage along with iSCSI and fiber channel SAN connectivity and to work with clustered shared storage.
Posted: 21 Jul 2010 | Premiered: 21 Jul 2010

FalconStor Software

Podcast: Leading Manufacturer of Cleaning Products Reduces Data Recovery Times from Days to Minutes
sponsored by FalconStor Software
PODCAST: Learn how Rug Doctor, a leading manufacturer of cleaning products, improved its RTO/RPO and replaced its tape backup system using FalconStor CDP for fast disaster recovery (DR) in tandem with VMware technology for server virtualization.
Posted: 18 Jul 2011 | Premiered: Jul 18, 2011

FalconStor Software

Five Challenges to Continuous PCI DSS Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape.
Posted: 07 Feb 2011 | Published: 07 Feb 2011

Tripwire, Inc.

Presentation Transcript: Don't Be Left Out of the Cloud: How to Sell Enterprise-Quality Cloud  Services and Data Protection to SMBs
sponsored by KineticD
PRESENTATION TRANSCRIPT: Read this expert transcript to learn why SMBs are adopting cloud services more rapidly than large enterprises and what challenges your clients face in protecting their business critical data in an increasingly mobile world.
Posted: 18 Oct 2010 | Published: 24 Aug 2010

KineticD

The keys to a successful business continuity and DR strategy
sponsored by Citrix
EGUIDE: Developing a business continuity and DR strategy usually involves an extensive amount of information gathering, combined with piecing together products and services that work as a collective. Check out this e-guide to learn the differences between business continuity and DR, discover 4 approaches to a successful combined strategy, and much more.
Posted: 20 Apr 2020 | Published: 20 Apr 2020

Citrix

Data Storage Backup Security tutorial: Tape Encryption and Cloud Backup
sponsored by Quantum Corporation
EBOOK: Data storage backups are a necessary element of data protection plan, but they're often the biggest source of security woes. Learn everything you need to know about keeping your backups secure in this tutorial.
Posted: 19 Aug 2009 | Published: 01 Aug 2009

Quantum Corporation

Storage Magazine: October
sponsored by TechTarget Storage
EZINE: In the October 2013 issue of Storage magazine, our experts explore how to build a better backup with the help of new modern apps, highlight 10 storage tips for virtual desktops and much more!
Posted: 03 Oct 2013 | Published: 03 Oct 2013

TechTarget Storage

eGuide: Information Security - Buyer's Guide to Messaging Security
sponsored by TechTarget Security
EGUIDE: Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

TechTarget Security