Recovery Management Reports

Digital identity strategies to enhance data privacy and protect networks
sponsored by TechTarget ComputerWeekly.com
EGUIDE: The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.
Posted: 16 Feb 2022 | Published: 16 Feb 2022

TechTarget ComputerWeekly.com

eGuide: Information Security - Buyer's Guide to Messaging Security
sponsored by TechTarget Security
EGUIDE: Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

TechTarget Security

Strategic Brief – HIPAA
sponsored by Alliance Storage Technologies
WHITE PAPER: The Health Insurance Portability and Accountability Act of 1996 (HIPAA) enacted reform and standardization in the healthcare industry to protect patient confidentiality. Continue reading to learn more about the goals of HIPAA.
Posted: 23 Nov 2010 | Published: 23 Nov 2010

Alliance Storage Technologies

Presentation Transcript: How to Get Started with Cloud-based Disaster Recovery: Tips, Tricks and Vendors
sponsored by Dell and VMware
PRESENTATION TRANSCRIPT: What about cloud for disaster recovery? Read this presentation transcript to learn how to set up cloud DR, the strengths and limitations of this technology, a list of vendors currently offering the service and more.
Posted: 25 Apr 2011 | Published: 25 Apr 2011

Dell and VMware

Developing a disaster recovery plan for virtual machines
sponsored by Overland Storage
EBOOK: Virtual machine (VM) disaster recovery (DR) is a multifaceted activity that fails over a VM from a primary site to a remote location. There are a few approaches to facilitating disaster recovery in a virtual machine environment. Learn about look at the various approaches to virtual machine disaster recovery in this tutorial.
Posted: 23 Jul 2009 | Published: 01 Jul 2009

Overland Storage

Greenbrier Turns to DocAve® for SharePoint® Data Protection
sponsored by AvePoint, Inc.
CASE STUDY: Greenbrier needed a fast, stable, and scalable SharePoint data protection solution capable of backing up directly to disk, and able to seamlessly integrate with both their existing and intended IT infrastructure. Learn why they turned to AvePoint's DocAve solution for its reliability and modular architecture.
Posted: 04 Feb 2010 | Published: 04 Feb 2010

AvePoint, Inc.

How to Handle Data Management in the Cloud
sponsored by TechTarget Data Backup
EBOOK: Data management in the cloud enables organizations to manage data between clouds and in conjunction with on-premises storage. Access this handbook to learn 3 cloud-based data management challenges, how to make cloud data work to your benefit, how to use multi-cloud data management and protection, and more.
Posted: 09 Jun 2020 | Published: 09 Jun 2020

TechTarget Data Backup

What are Continuous Data Protection Software's Pros And Cons?
sponsored by Dell EMC and Intel®
EGUIDE: Click inside this expert-guide and learn the pros and cons of continuous data protection software.
Posted: 26 Jun 2017 | Published: 20 Jun 2017

Dell EMC and Intel®

Disaster Recovery Seminar Presentation Download
sponsored by EMC Backup and Recovery Solutions
PRESENTATION TRANSCRIPT: This presentation is divided into three modules. In the first module, we will examine the three keys to successful disaster recovery planning. In modules two and three, we will analyse data protection techniques and testing techniques.
Posted: 15 Sep 2009 | Published: 15 Sep 2009

EMC Backup and Recovery Solutions

Expert Guide to Data Protection: New Capabilities, Remaining Gaps, and Answers to Customer FAQ
sponsored by Symantec Corporation
EGUIDE: This e-guide follows the evolution of data protection and points out the latest capabilities and remaining gaps in the marketplace. Read on now to find out whether conventional methods are keeping pace and which data protection processes should be treated separately.
Posted: 04 Nov 2013 | Published: 04 Nov 2013

Symantec Corporation