Enterprise Data Backups Reports

4 data privacy predictions for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Over the last two years, businesses and employees saw their workspace change forever with the rise of hybrid and remote work. All of a sudden, data privacy became a top priority for enterprises all over the world. As attention continues to build, here are four data privacy predictions for 2022 and beyond.
Posted: 08 Mar 2022 | Published: 08 Mar 2022

TechTarget ComputerWeekly.com

Social Security Administration Deploys DocAve to Protect Mission-Critical SharePoint Deployment
sponsored by AvePoint, Inc.
CASE STUDY: In early 2008, the Social Security administration they deployed their pilot SharePoint deployment that was accessible to all agency staff. After evaluating several backup solutions, SSA administrators chose AvePoint Doc Ave Backup and Recovery for their SharePoint environment. Read this case study to learn why.
Posted: 04 Feb 2010 | Published: 04 Feb 2010

AvePoint, Inc.

Data Storage Backup Security tutorial: Tape Encryption and Cloud Backup
sponsored by Quantum Corporation
EBOOK: Data storage backups are a necessary element of data protection plan, but they're often the biggest source of security woes. Learn everything you need to know about keeping your backups secure in this tutorial.
Posted: 19 Aug 2009 | Published: 01 Aug 2009

Quantum Corporation

Presentation Transcript: Online Backup FAQ
sponsored by i365, makers of Evault
PRESENTATION TRANSCRIPT: Trying to decide if online backup, or backup as a service, will be beneficial to your small or midsized business? Check out this presentation transcript, where you’ll learn the benefits and drawbacks of online backup, the major players in online backup today, what to look for when evaluating online backup options, and more.
Posted: 10 Nov 2009 | Published: 09 Nov 2009

i365, makers of Evault

E-Guide: An integrated approach to data storage management
sponsored by Quantum Corporation
EGUIDE: As corporate data continues to grow, data storage management is getting a much needed makeover. This e-guide covers the pros and cons of compression, archiving, deduplication, and continuous data protection, along with suggestions for optimal, integrated use of all four.
Posted: 17 Aug 2011 | Published: 17 Aug 2011

Quantum Corporation

Twynham School Relies on DocAve® to Protect Valuable SharePoint Data
sponsored by AvePoint, Inc.
CASE STUDY: Southwest England's Twynham Comprehensive School used AvePoint's DocAve Backup and Restore to provide reliable, granular, and full-fidelity backup and recovery capabilities to protect their over 50GB of data and hundreds of sites stored on its MOSS environment.
Posted: 04 Feb 2010 | Published: 04 Feb 2010

AvePoint, Inc.

Demo: Microsoft Windows 2008 Protection and Recovery Using FalconStor CDP
sponsored by FalconStor Software
PRODUCT DEMO: Access this video demonstration for a detailed look at FalconStor CDP’s ability to protect physical servers and virtual machines, support direct attached storage along with iSCSI and fiber channel SAN connectivity and to work with clustered shared storage.
Posted: 21 Jul 2010 | Premiered: 21 Jul 2010

FalconStor Software

Business Continuity E-Guide
sponsored by Citrix
EGUIDE: Check out this e-guide for an overview of business continuity essentials, including access to a free BC planning template, discussions on how cybersecurity and business continuity can collaborate to simplify recovery, and 10 risks to monitor.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Citrix

Simplify Remote Office Data Recovery
sponsored by IBM
WHITE PAPER: This white paper reviews the factors that can make data recovery in remote offices a complicated problem and describes the range of technology options available, explaining the benefits and shortcomings of each in the context of remote offices.
Posted: 01 Jul 2011 | Published: 30 Jun 2011

IBM

Disaster Recovery with ETERNUS DX – The Data Safe – and VMware SRM
sponsored by Fujitsu America, Inc.
WHITE PAPER: This paper shows the way to protect data and business, where hardware is only one factor. The other factor is the proof that in a worst case scenario the protection works well. The challenge is to test that protection in near real-life situations but without impact on business production.
Posted: 06 Dec 2010 | Published: 06 Dec 2010

Fujitsu America, Inc.