Continuous Backups Reports

In data privacy we trust: building a strong information protection strategy in the hybrid era
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.
Posted: 25 Jan 2022 | Published: 25 Jan 2022

TechTarget ComputerWeekly.com

Five Challenges to Continuous PCI DSS Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape.
Posted: 07 Feb 2011 | Published: 07 Feb 2011

Tripwire, Inc.

Expert Overview: New Data Protection Strategies and Success Metrics
sponsored by EMC Corporation
EGUIDE: This e-guide explores the basic philosophy behind continuous data protection and how it's making its way into the current backup landscape.
Posted: 19 Jul 2013 | Published: 19 Jul 2013

EMC Corporation

Presentation Transcript: The Challenges of Protection and Recovery in a Virtual World
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: Read this presentation transcript to learn the challenges brought about by protection and recovery approaches in virtual environments and what different IT organizations are doing to address them.
Posted: 19 May 2010 | Published: 19 May 2010

Hewlett Packard Enterprise

Integrated Recovery Solutions: An Emerging Trend in Disaster Recovery
sponsored by InMage Systems
ANALYST REPORT: What if there was one product that could provide all the components needed for a complete disaster recovery solution? IDC sees an emerging trend in the market for this type of solution, one that could be defined as an "integrated recovery solution."
Posted: 20 Apr 2010 | Published: 01 Feb 2010

InMage Systems

The Case for Third-Party Archiving in Exchange 2010
sponsored by Sunbelt Software
WHITE PAPER: This white paper will give you a brief overview of Sunbelt Software, while educating decision makers about the important role that email and other content archiving plays in minimizing risk and lowering the cost of doing business, the capabilities of archiving in Exchange 2020, and more.
Posted: 28 Jan 2010 | Published: 28 Jan 2010

Sunbelt Software

VMware and Dell Solutions for Small to Medium Business: Ensuring Rapid, Reliable and Affordable Disaster Recovery
sponsored by Dell and VMware
WHITE PAPER: Affordable high availability and disaster recovery solutions are critical to the survival of all SMBs in the event of a disaster. Building on years of helping SMBs protect their information, VMware and Dell provide cost-effective and robust data protection, disaster recovery, and high availability solutions.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

Dell and VMware

Optimize Business and IT With New Generation Application Lifecycle Management
sponsored by SAP Community Network
WEBCAST: This webcast provides a complete overview of application lifecycle management (ALM) and discusses how SAP's integrated and open approach to ALM can accelerate innovation, ensure business continuity, reduce risk and lower TCO.
Posted: 15 Sep 2009 | Premiered: Sep 30, 2009, 12:00 EDT (16:00 GMT)

SAP Community Network

Disaster Recovery Seminar Presentation Download
sponsored by EMC Backup and Recovery Solutions
PRESENTATION TRANSCRIPT: This presentation is divided into three modules. In the first module, we will examine the three keys to successful disaster recovery planning. In modules two and three, we will analyse data protection techniques and testing techniques.
Posted: 15 Sep 2009 | Published: 15 Sep 2009

EMC Backup and Recovery Solutions

Expert Guide to Data Protection: New Capabilities, Remaining Gaps, and Answers to Customer FAQ
sponsored by Symantec Corporation
EGUIDE: This e-guide follows the evolution of data protection and points out the latest capabilities and remaining gaps in the marketplace. Read on now to find out whether conventional methods are keeping pace and which data protection processes should be treated separately.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

Symantec Corporation