Continuous Backup Software Reports

Time-addressable and Event-addressable Storage: Combining Snapshots and Data Journaling for True Continuous Data Protection
sponsored by American Megatrends Inc.
WHITE PAPER: Although there are many different ideas of what CDP is, it is clear that it must protect data in a manner that is both time-addressable and event-addressable. This white paper explains what this means and gives an overview of effective CDP ...
Posted: 04 Apr 2008 | Published: 14 Mar 2008

American Megatrends Inc.

Hitachi Storage Solutions at Work
sponsored by Hitachi Vantara
CASE STUDY: This white paper highlights how a financial organization was able to secure their banking and transaction data with Hitachi Storage Solutions. Read this white paper to learn how they did it and how they overcame many of their storage challenges.
Posted: 29 Oct 2007 | Published: 01 Jun 2006

Hitachi Vantara

Top Reasons to Upgrade to Symantec Backup Exec™ 12.5 and Backup Exec System Recovery 8.5
sponsored by Symantec Corporation
WHITE PAPER: Download this whitepaper to find out the top reasons to upgrade to a more effective backup system and how to get continuous data protection and complete system recovery.
Posted: 02 Oct 2008 | Published: 02 Oct 2008

Symantec Corporation

TechTalk: Stop Malware at the Web Gateway
sponsored by BlueCoat
WEBCAST: Safeguarding your data from malware and other Web threats takes a layered approach. In this TechTalk webinar Blue Coat Technical Marketing Engineers will lead a discussion on how the Blue Coat ProxyAV works with the ProxySG to create a community-watch based security.
Posted: 14 May 2009 | Premiered: Mar 24, 2009

BlueCoat

The keys to a successful business continuity and DR strategy
sponsored by Citrix
EGUIDE: Developing a business continuity and DR strategy usually involves an extensive amount of information gathering, combined with piecing together products and services that work as a collective. Check out this e-guide to learn the differences between business continuity and DR, discover 4 approaches to a successful combined strategy, and much more.
Posted: 20 Apr 2020 | Published: 20 Apr 2020

Citrix

Data Protection Strategies Leveraging Replication: An In-Depth Look at Evaluation Criteria and Usage Scenarios
sponsored by Double-Take Software
WHITE PAPER: As dependence on continuous access to critical data grows, so does the importance of avoiding service interruption. This paper examines four data protection strategies and compares their merits for the most common business continuance scenarios.
Posted: 01 May 2009 | Published: 29 Feb 2008

Double-Take Software

What are Continuous Data Protection Software's Pros And Cons?
sponsored by Dell EMC and Intel®
EGUIDE: Click inside this expert-guide and learn the pros and cons of continuous data protection software.
Posted: 26 Jun 2017 | Published: 20 Jun 2017

Dell EMC and Intel®

Presentation Transcript: The Challenges of Protection and Recovery in a Virtual World
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: Read this presentation transcript to learn the challenges brought about by protection and recovery approaches in virtual environments and what different IT organizations are doing to address them.
Posted: 19 May 2010 | Published: 19 May 2010

Hewlett Packard Enterprise

FalconStor Continuous Data Protector
sponsored by FalconStor Software
PRODUCT OVERVIEW: Enter the HP Solutions Demo portal for an interactive flash demo and overview on FalconStor CDP with HP Solutions.
Posted: 02 Apr 2009 | Published: 02 Apr 2009

FalconStor Software

Protecting the Virtual Environment Using Auto-Snapshot Manager/VMware Edition
sponsored by DellEMC and Intel®
TECHNICAL ARTICLE: This Technical Report focuses on the installation, configuration and usage of Auto-Snapshot Manager/VMware™ Edition to obtain hypervisor aware snapshots and provide an additional layer of data protection for the Virtual Environment.
Posted: 24 Aug 2009 | Published: 01 Oct 2008

DellEMC and Intel®