Data Protection Software Reports

Protecting the Virtual Environment Using Auto-Snapshot Manager/VMware Edition
sponsored by DellEMC and Intel®
TECHNICAL ARTICLE: This Technical Report focuses on the installation, configuration and usage of Auto-Snapshot Manager/VMware™ Edition to obtain hypervisor aware snapshots and provide an additional layer of data protection for the Virtual Environment.
Posted: 24 Aug 2009 | Published: 01 Oct 2008

DellEMC and Intel®

High Availability Solutions in Exchange Server 2007 That Eliminate the Need for Disaster Recovery
sponsored by Marathon Technologies
PRESENTATION TRANSCRIPT: In this transcript featuring Exchange expert Peter Bruzzese, learn how to utilize tools for high availability (HA) that can eliminate the need for disaster recovery in Exchange Server 2007 environments. Find out how to ensure optimal uptime, availability and recovery in your Exchange environment.
Posted: 15 Feb 2010 | Published: 15 Feb 2010

Marathon Technologies

ExaGrid: A Scalable Approach to Disk-based Backup
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: Looking for a new disk-based backup solution? Download this Taneja Group white paper to learn some key criteria to consider when evaluating disk-based data protection vendors and how one company matches up against these criteria.
Posted: 20 Nov 2008 | Published: 20 Oct 2008

ExaGrid Systems, Inc.

Time-addressable and Event-addressable Storage: Combining Snapshots and Data Journaling for True Continuous Data Protection
sponsored by American Megatrends Inc.
WHITE PAPER: Although there are many different ideas of what CDP is, it is clear that it must protect data in a manner that is both time-addressable and event-addressable. This white paper explains what this means and gives an overview of effective CDP ...
Posted: 04 Apr 2008 | Published: 14 Mar 2008

American Megatrends Inc.

Presentation Transcript: Changing the Rules of Backup and Disaster Recovery
sponsored by FalconStor Software
PRESENTATION TRANSCRIPT: Join Independent Backup Expert W. Curtis Preston and Falconstor's Product Marketing Manager Peter Eichers as they explore common data protection challenges and what technologies can be used to address them.
Posted: 07 Apr 2009 | Published: 07 Apr 2009

FalconStor Software

New Data Protection Strategies
sponsored by IBM
WHITE PAPER: As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with minimal impact to business.
Posted: 23 Jul 2010 | Published: 20 Jul 2008

IBM

Top Reasons to Upgrade to Symantec Backup Exec™ 12.5 and Backup Exec System Recovery 8.5
sponsored by Symantec Corporation
WHITE PAPER: Download this whitepaper to find out the top reasons to upgrade to a more effective backup system and how to get continuous data protection and complete system recovery.
Posted: 02 Oct 2008 | Published: 02 Oct 2008

Symantec Corporation

New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER: Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

Case Study: First Trade Union Bank Adds Vault for LAN-Speed Restores and Robust Replication
sponsored by i365, makers of Evault
CASE STUDY: Despite the economic downturn, First Trade Union Bank is continuing to grow... this case study examines the data center challenges the bank faced in the midst of this growth and show's how by working with i365, they were able to create faster backups/restores, in some cases reduce RTO's by up to 98%, enhance DR and protect their virtual servers.
Posted: 30 Jun 2009 | Published: 30 Jun 2009

i365, makers of Evault

Presentation Transcript: The Challenges of Protection and Recovery in a Virtual World
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: Read this presentation transcript to learn the challenges brought about by protection and recovery approaches in virtual environments and what different IT organizations are doing to address them.
Posted: 19 May 2010 | Published: 19 May 2010

Hewlett Packard Enterprise