Enterprise Data Backup Software Reports

InMage Provides Solid Defense for Tampa Bay Lightning’s Mission-Critical Data and Applications
sponsored by InMage Systems
CASE STUDY: This short case study explores how the pro ice hockey team, Tampa Bay Lightning, easily and affordably implemented one industry-leading backup and recovery software solution that leverages the advantages of disk-based data protection to provided application-aware recovery that can meet both remote and local requirements. Read on to learn more.
Posted: 24 Oct 2013 | Published: 24 Oct 2013

InMage Systems

High Availability Solutions in Exchange Server 2007 That Eliminate the Need for Disaster Recovery
sponsored by Marathon Technologies
PRESENTATION TRANSCRIPT: In this transcript featuring Exchange expert Peter Bruzzese, learn how to utilize tools for high availability (HA) that can eliminate the need for disaster recovery in Exchange Server 2007 environments. Find out how to ensure optimal uptime, availability and recovery in your Exchange environment.
Posted: 15 Feb 2010 | Published: 15 Feb 2010

Marathon Technologies

ENHANCING YOUR IT ENVIRONMENT USING SNAPSHOTS
sponsored by DellEMC and Intel®
WHITE PAPER: Snapshots help you improve the productivity and reliability of your backups because they are fast, flexible and affordable. Read this white paper to learn more about snapshot technologies and the benefits they deliver.
Posted: 18 Mar 2008 | Published: 17 Mar 2008

DellEMC and Intel®

Business Continuity E-Guide
sponsored by Citrix
EGUIDE: Check out this e-guide for an overview of business continuity essentials, including access to a free BC planning template, discussions on how cybersecurity and business continuity can collaborate to simplify recovery, and 10 risks to monitor.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Citrix

HP StorageWorks tape and disk-to-disk data protection
sponsored by Hewlett Packard Company and Intel
WHITE PAPER: HP protects the integrity of your data and helps you regain access to it. We have a range of change-ready, cost-effective, and trusted solutions that provide the appropriate level of protection based on your specific business requirements.
Posted: 11 Mar 2009 | Published: 03 Nov 2008

Hewlett Packard Company and Intel

Presentation Transcript: Changing the Rules of Backup and Disaster Recovery
sponsored by FalconStor Software
PRESENTATION TRANSCRIPT: Join Independent Backup Expert W. Curtis Preston and Falconstor's Product Marketing Manager Peter Eichers as they explore common data protection challenges and what technologies can be used to address them.
Posted: 07 Apr 2009 | Published: 07 Apr 2009

FalconStor Software

Time-addressable and Event-addressable Storage: Combining Snapshots and Data Journaling for True Continuous Data Protection
sponsored by American Megatrends Inc.
WHITE PAPER: Although there are many different ideas of what CDP is, it is clear that it must protect data in a manner that is both time-addressable and event-addressable. This white paper explains what this means and gives an overview of effective CDP ...
Posted: 04 Apr 2008 | Published: 14 Mar 2008

American Megatrends Inc.

Protecting the Virtual Environment Using Auto-Snapshot Manager/VMware Edition
sponsored by DellEMC and Intel®
TECHNICAL ARTICLE: This Technical Report focuses on the installation, configuration and usage of Auto-Snapshot Manager/VMware™ Edition to obtain hypervisor aware snapshots and provide an additional layer of data protection for the Virtual Environment.
Posted: 24 Aug 2009 | Published: 01 Oct 2008

DellEMC and Intel®

Email management suite
sponsored by Iron Mountain
VIDEO: Email management solutions are designed to simplify your email management complexities. In this brief Videocast, legendary British comic, John Cleese, explains why you should want a total email management suite.
Posted: 26 Jun 2008 | Premiered: 25 Jun 2008

Iron Mountain

Data Protection Strategies Leveraging Replication: An In-Depth Look at Evaluation Criteria and Usage Scenarios
sponsored by Double-Take Software
WHITE PAPER: As dependence on continuous access to critical data grows, so does the importance of avoiding service interruption. This paper examines four data protection strategies and compares their merits for the most common business continuance scenarios.
Posted: 01 May 2009 | Published: 29 Feb 2008

Double-Take Software