Automated Backup Software Reports

Need all that speed?
sponsored by TechTarget Storage
EZINE: 'Storage' magazine examines nonvolatile memory express and the future of flash storage. We also look at combating ransomware and intellectual property theft.
Posted: 08 Mar 2018 | Published: 08 Mar 2018

TechTarget Storage

RPO vs. RTO: Key Differences Explained
sponsored by Parsec Labs
EGUIDE: However similar in acronym, the definitions of RPO and RTO differ, as do their computing needs, cost implications, and how to build them into a variety of resilience plans. Read this custom TechTarget e-guide on RPO vs. RTO: Key Differences Explained to set the record straight.
Posted: 16 Nov 2022 | Published: 15 Nov 2022

Parsec Labs

Computer Weekly – 30 September 2014: Hacking IT from the inside
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, car giant Daimler talks about IT security strategy and the benefits of its own in-house hacking team. App developers are under fire for collecting too much personal data – we examine the best practice. And our review of Microsoft's Surface Pro 3 tablet asks whether it can replace the laptop. Read the issue now.
Posted: 29 Sep 2014 | Published: 30 Sep 2014

TechTarget ComputerWeekly.com

Why are Data Backups and Disaster Recovery Converging?
sponsored by Veritas
EGUIDE: Backup and disaster recovery have primarily been treated separately. In this exclusive e-guide, consultant Brien Posey explains how server virtualization has allowed these two technologies to converge.
Posted: 17 Mar 2016 | Published: 16 Mar 2016

Veritas

A New Approach to Remote Replications
sponsored by IBM
WHITE PAPER: This resource examines the steps organizations can take in order to improve network utilization and speed up data transfer for more effective remote replication.
Posted: 01 Apr 2015 | Published: 01 Apr 2015

IBM

Implementing GDPR is within your organization's reach
sponsored by TechTarget Data Backup
EZINE: Implementing GDPR requirements may seem daunting, but don't put it off. The General Data Protection Regulation will help with compliance and data management.
Posted: 02 Mar 2018 | Published: 02 Mar 2018

TechTarget Data Backup

Data Protection Strategies and Initiatives for 2022
sponsored by Veeam Software
WEBCAST: Veeam asked a group of 3,400 individuals how they define “modern” and “innovative” data protection solutions in this threat landscape. Discover these 9 defining cyber-attack-ready backup and data protection features in the following webcast, hosted by Veeam’s Jason Buffington and Chris Hoff.
Posted: 08 Sep 2022 | Premiered: Sep 6, 2022

Veeam Software

Data Protection Methods: Mounting Backups vs. Recovering from Backups
sponsored by Veritas
EGUIDE: This e-guide highlights important questions to ask before deciding on a data protection method and discusses the benefits and challenges associated with mounting backup versus recovery. Read on to see how mounting backups can significantly improve your data protection systems.
Posted: 17 Mar 2016 | Published: 16 Mar 2016

Veritas

Hyper-converged platforms grow to include secondary storage space
sponsored by Rubrik
EGUIDE: Hyper-converged platforms have grown to include secondary storage space; however secondary-storage still faces a plethora of issues. Discover how to best address the problems facing secondary storage and how vendors are promising to make life easier for storage administrators.
Posted: 08 Dec 2016 | Published: 05 Dec 2016

Rubrik

Storage magazine: Getting Serious About Mobile Backup
sponsored by TechTarget Storage
EZINE: The August 2014 issue of Storage magazine looks at how hypervisor vendors are adding new storage features, examines storage performance bottlenecks and shows how HDFS can help with big data.
Posted: 01 Aug 2014 | Published: 01 Aug 2014

TechTarget Storage