CDP Reports

7 NAS encryption best practices to protect data
sponsored by TechTarget ComputerWeekly.com
EBOOK: NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

TechTarget ComputerWeekly.com

Solution Brief: Unified Backup and Disaster Recovery (DR) for VMware Environments
sponsored by FalconStor Software
WHITE PAPER: Organizations investing in VMware vSphere can leverage the data protection capabilities and application awareness of FalconStor CDP to protect and maximize their VMware purchases. FalconStor CDP enables flexible, affordable, automated, and dependable backup and DR for any VMware vSphere environment.
Posted: 22 Jul 2011 | Published: 22 Jul 2011

FalconStor Software

Presentation Transcript: Online Backup FAQ
sponsored by i365, makers of Evault
PRESENTATION TRANSCRIPT: Trying to decide if online backup, or backup as a service, will be beneficial to your small or midsized business? Check out this presentation transcript, where you’ll learn the benefits and drawbacks of online backup, the major players in online backup today, what to look for when evaluating online backup options, and more.
Posted: 10 Nov 2009 | Published: 09 Nov 2009

i365, makers of Evault

Presentation Transcript: Navigating Your Way Through the Fog of Cloud-Based Backup
sponsored by Asigra
PRESENTATION TRANSCRIPT: There is a current movement to cloud-based backup for MSPs. Why cloud backup and why now? In this transcript of the "Navigating Your Way Through the Fog of Cloud-Based Backup" video, learn about the considerations for buying into cloud backup.
Posted: 24 Sep 2010 | Published: 24 Sep 2010

Asigra

E-Guide: Best Practices for Data Protection and Recovery in Virtual Environments
sponsored by EMC Backup and Recovery Solutions
EGUIDE: Data backup is a top priority at most organizations, but data protection in virtual environments can be especially complicated. In this expert eguide from SearchVirtualDataCentre.co.uk, get tips for doing just that. Find out how you can enhance your data protection strategy without compromising your virtual infrastructure.
Posted: 16 Jul 2010 | Published: 16 Jul 2010

EMC Backup and Recovery Solutions

Backup Basics: Disk, CDP and Cloud
sponsored by Barracuda Networks
EGUIDE: Check out this exclusive SearchDataBackup.com E-Guide for an expert look at backup approaches including continuous data protection (CDP), cloud and disk.
Posted: 28 Mar 2013 | Published: 28 Mar 2013

Barracuda Networks

IDC Report - Reducing Costs and Creating a More Secure IT Environment with a Holistic Approach to Data Protection
sponsored by FalconStor Software
ANALYST REPORT: IDC interviewed eight FalconStor customers that had deployed at least one or a combination of the following FalconStor storage management solutions: Virtual Tape Library (VTL), Network Storage Server (NSS), and Continuous Data Protector (CDP). All customers reported high levels of satisfaction.
Posted: 17 Sep 2009 | Published: 01 Aug 2009

FalconStor Software

9 Backup Types & Methods: Which is Right for Your Business
sponsored by SonicWALL
EGUIDE: This SearchStorage.com expert EGuide will help you understand the various backup options currently available by outlining what each backup type and technology entails, and showing how to choose the right strategy for your business.
Posted: 24 Oct 2011 | Published: 24 Oct 2011

SonicWALL

Hitachi Adaptable Modular Storage and VMware: Efficiency and Performance Maximized
sponsored by Hitachi Vantara
PRODUCT OVERVIEW: Because data centers everywhere are being challenged to meet increasing business and IT demands with shrinking budgets, they are turning to server virtualization technologies, such as VMware, to optimize operational efficiencies throughout the data center.
Posted: 25 Jan 2010 | Published: 25 Jan 2010

Hitachi Vantara

eGuide: Information Security - Buyer's Guide to Messaging Security
sponsored by TechTarget Security
EGUIDE: Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

TechTarget Security