Recovery Management Software Reports

Integrating HP Data Protector Software with HP Data Deduplication Solutions
sponsored by HP Inc
WHITE PAPER: This white paper will discuss HP Data Protector Software which fully supports HP data deduplication technologies allowing you to recover files more quickly while reducing your data management and storage costs.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

HP Inc

Hitachi Storage Solutions at Work
sponsored by Hitachi Vantara
CASE STUDY: This white paper highlights how a financial organization was able to secure their banking and transaction data with Hitachi Storage Solutions. Read this white paper to learn how they did it and how they overcame many of their storage challenges.
Posted: 29 Oct 2007 | Published: 01 Jun 2006

Hitachi Vantara

Presentation Transcript: The Challenges of Protection and Recovery in a Virtual World
sponsored by Hewlett Packard Enterprise
PRESENTATION TRANSCRIPT: Read this presentation transcript to learn the challenges brought about by protection and recovery approaches in virtual environments and what different IT organizations are doing to address them.
Posted: 19 May 2010 | Published: 19 May 2010

Hewlett Packard Enterprise

Potomac Hospital Case Study
sponsored by SonicWALL
CASE STUDY: In this case study Potomac Hospital installed SonicWALL PRO 5060 across their hospital’s network. Learn how SonicWALL’s CDP appliances deliver complete, disk-based backup and recovery solutions that replicate data in real-time.
Posted: 15 Nov 2007 | Published: 01 Jun 2007

SonicWALL

Data Deduplication with the PowerVault DL2000 - Powered by CommVault
sponsored by DellEMC and Intel®
VIDEO: IT Departments today are facing an explosion in the amount of data they have to manage, backup and restore. In this videocast, learn how data deduplication can help address the problems of redundant data and reduce storage disk storage requirements.
Posted: 30 Jan 2009 | Premiered: 30 Jan 2009

DellEMC and Intel®

Data Protection Strategies Leveraging Replication: An In-Depth Look at Evaluation Criteria and Usage Scenarios
sponsored by Double-Take Software
WHITE PAPER: As dependence on continuous access to critical data grows, so does the importance of avoiding service interruption. This paper examines four data protection strategies and compares their merits for the most common business continuance scenarios.
Posted: 01 May 2009 | Published: 29 Feb 2008

Double-Take Software

Email management suite
sponsored by Iron Mountain
VIDEO: Email management solutions are designed to simplify your email management complexities. In this brief Videocast, legendary British comic, John Cleese, explains why you should want a total email management suite.
Posted: 26 Jun 2008 | Premiered: 25 Jun 2008

Iron Mountain

InMage Provides Solid Defense for Tampa Bay Lightning’s Mission-Critical Data and Applications
sponsored by InMage Systems
CASE STUDY: This short case study explores how the pro ice hockey team, Tampa Bay Lightning, easily and affordably implemented one industry-leading backup and recovery software solution that leverages the advantages of disk-based data protection to provided application-aware recovery that can meet both remote and local requirements. Read on to learn more.
Posted: 24 Oct 2013 | Published: 24 Oct 2013

InMage Systems

How Virtualization Cuts CDP Costs by 80%
sponsored by Veeam Software
WHITE PAPER: This white paper compares 3 different options of implementing CDP (continuous data protection) and shows how virtualization-enabled CDP - or Near-CDP - becomes the most affordable and most logical disaster recovery choice for businesses of all sizes.
Posted: 18 Feb 2010 | Published: 17 Feb 2010

Veeam Software

Presentation Transcript: Email Archiving, Ediscovery, Compliance, Storage Management
sponsored by Symantec Corporation
PRESENTATION TRANSCRIPT: Email archiving is a burgeoning market at a time when many storage pros are faced with increasing ediscovery requests and compliance regulations. Listen to this podcast to find out the latest developments in email archiving.
Posted: 29 Jun 2009 | Published: 29 Jun 2009

Symantec Corporation