Disk Recovery Reports

Ransomware Backup Protection Requires a Comprehensive Approach
sponsored by TechTarget
RESOURCE: We've curated the most current and sought-after features from our editorial staff in one, easy-to-digest guide so enterprises like yours have a resource to help them safeguard their backups from ransomware. Simply click claim my guide to access the exclusives inside, including how to operate post-attack and 4 ways to test your recovery plan.
Posted: 08 Feb 2021 | Published: 03 Dec 2019

TechTarget

Cloud backup vs traditional backup
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Cloud backup vs. traditional backup is an important discussion. While the cloud backup market is soaring, traditional backup players may also have much to offer your organisation. In this e-guide we look over the advantages and disadvantages of both backup offers.
Posted: 08 Feb 2021 | Published: 06 Dec 2019

TechTarget ComputerWeekly.com

The changing role of tape: A format that still has more to give
sponsored by Quantum Corporation
WHITE PAPER: This guide explains how tape continues to play an important role in data storage and how it remains the most cost-effective, energy efficient and resilient means to manage the life cycle of stored data.
Posted: 02 Apr 2014 | Published: 31 Oct 2009

Quantum Corporation

SharePoint Object Recovery
sponsored by PHD Virtual
WEBCAST: Watch this webcast that highlights a recovery tool and draws out the steps you need to take to execute a granular level of restoration, including the recovery of lists, libraries and folders on SharePoint.
Posted: 31 Jan 2014 | Premiered: Aug 19, 2013

PHD Virtual

Six Data Protection Tips for SMBs
sponsored by Vision Solutions
WHITE PAPER: Read this exclusive white paper to uncover six game-changing tips for small and midsize organizations to protect critical data, as well as a recovery solution to help tackle downtime and data loss.
Posted: 27 Feb 2014 | Published: 31 Dec 2011

Vision Solutions

Securing Your Organization While Maintaining Here, Near, and Anywhere Data Availability
sponsored by Violin Memory
WHITE PAPER: The right all-flash array based solution provides comprehensive data protection functions to protect against problems in the data center, in a metro environment, and anywhere with different technologies based on the application needs. Read this solution brief to look into the application-specific data protection.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

Violin Memory

Backup to the Cloud is Still Cloudy
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: This informative paper addresses the cloud as it relates to data backup. In all cases, it is assumed that a backup application is in place and that data will be backed up locally and then replicated to the cloud for disaster recovery. Read on now to learn more.
Posted: 18 Dec 2013 | Published: 18 Dec 2013

ExaGrid Systems, Inc.

Data Protection Methods: Mounting Backups vs. Recovering from Backups
sponsored by Veritas
EGUIDE: This e-guide highlights important questions to ask before deciding on a data protection method and discusses the benefits and challenges associated with mounting backup versus recovery. Read on to see how mounting backups can significantly improve your data protection systems.
Posted: 17 Mar 2016 | Published: 16 Mar 2016

Veritas

The Best Network Attached Storage Choice for Database and Software Environments
sponsored by Oracle and IntelĀ®
WHITE PAPER: This white paper explores the benefits and capabilities of a new set of storage appliances from Oracle that deliver enterprise-class network attached storage capabilities with deep Oracle integration and leading simplicity, efficiency, performance and TCO.
Posted: 12 Jun 2014 | Published: 29 Nov 2013

Oracle and IntelĀ®

Data Management Guidelines: Four Records Retention Issues To Address
sponsored by Symantec Corporation
EGUIDE: This e-guide details data management guidelines to help you determine what you should keep when implementing a records retention policy. Learn about four issues that can occur if you retain too much unnecessary data, including access trouble, cost influx, and more.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Symantec Corporation