CDP Reports

The components and objectives of privacy engineering
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.
Posted: 09 Feb 2022 | Published: 09 Feb 2022

TechTarget ComputerWeekly.com

Understanding Automatic Failover for DR: 6 FAQs
sponsored by FalconStor Software
EGUIDE: Automatic failover involves automatically moving an application to a standby server during a failure or service event to preserve its time. Fortunately, there are a number of approaches available in the market today. Check out this guide to learn the answers to 6 FAQs about automatic failover and disaster recovery automation.
Posted: 19 Jul 2011 | Published: 19 Jul 2011

FalconStor Software

Business Continuity E-Guide
sponsored by Citrix
EGUIDE: Check out this e-guide for an overview of business continuity essentials, including access to a free BC planning template, discussions on how cybersecurity and business continuity can collaborate to simplify recovery, and 10 risks to monitor.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Citrix

Data Protection for the Enterprise vs. SMB: Disk, CDP, Cloud and Other Options
sponsored by Axcient
EGUIDE: This E-Guide explores the role that scale plays in determining the impact of a disruption and discusses enterprise data protection requirements that apply to SMBs. Find out why disk, CDP and cloud backup offerings are worth further consideration and learn how hybrid appliances are making DR quick and cost-effective.
Posted: 23 Apr 2013 | Published: 23 Apr 2013

Axcient

How Virtualization Cuts CDP Costs by 80%
sponsored by Veeam Software
WHITE PAPER: This white paper compares 3 different options of implementing CDP (continuous data protection) and shows how virtualization-enabled CDP - or Near-CDP - becomes the most affordable and most logical disaster recovery choice for businesses of all sizes.
Posted: 18 Feb 2010 | Published: 17 Feb 2010

Veeam Software

eGuide: Information Security - Buyer's Guide to Messaging Security
sponsored by TechTarget Security
EGUIDE: Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

TechTarget Security

PlateSpin Forge: "Plug in and Protect" Disaster Recovery
sponsored by Novell, Inc.
WEBCAST: PlateSpin Forge disaster recovery appliances provide fast out-of-the-box protection for your server workloads. When servers go down, you can quickly recover business-critical workloads and run them on the PlateSpin Forge appliance until they can be restored to your production environment.
Posted: 01 Sep 2009 | Premiered: Sep 1, 2009

Novell, Inc.

Agentless Architecture. Agentless Backup is Not A Myth
sponsored by Asigra
WHITE PAPER: Backup and recovery software typically requires agents that are installed onto the host servers that a system administrator wants to back up. The Asigra solution requires no agents, which inherently makes it easier to install and support than legacy backup and recovery solutions. Read this whitepaper to learn more!
Posted: 24 Aug 2010 | Published: 24 Aug 2010

Asigra

Integrated Recovery Solutions: An Emerging Trend in Disaster Recovery
sponsored by InMage Systems
ANALYST REPORT: What if there was one product that could provide all the components needed for a complete disaster recovery solution? IDC sees an emerging trend in the market for this type of solution, one that could be defined as an "integrated recovery solution."
Posted: 20 Apr 2010 | Published: 01 Feb 2010

InMage Systems

Presentation Transcript: Don't Be Left Out of the Cloud: How to Sell Enterprise-Quality Cloud  Services and Data Protection to SMBs
sponsored by KineticD
PRESENTATION TRANSCRIPT: Read this expert transcript to learn why SMBs are adopting cloud services more rapidly than large enterprises and what challenges your clients face in protecting their business critical data in an increasingly mobile world.
Posted: 18 Oct 2010 | Published: 24 Aug 2010

KineticD