Data Protection Reports

Data Storage Backup Security tutorial: Tape Encryption and Cloud Backup
sponsored by Quantum Corporation
EBOOK: Data storage backups are a necessary element of data protection plan, but they're often the biggest source of security woes. Learn everything you need to know about keeping your backups secure in this tutorial.
Posted: 19 Aug 2009 | Published: 01 Aug 2009

Quantum Corporation

Protecting Server Data in Small and Medium-sized Businesses
sponsored by Iron Mountain
WHITE PAPER: Read this white paper to learn how to successfully protect server data outside a centralized data center and focus on specific needs and requirements for SMBs.
Posted: 11 Jan 2010 | Published: 01 Sep 2006

Iron Mountain

New Data Protection Strategies
sponsored by IBM
WHITE PAPER: As the demands for data capacity and higher service levels grow, protecting corporate data becomes more challenging. Continuous Data Protection, as discussed in this white paper by Evaluator Group and IBM, can cost-effectively improve security with minimal impact to business.
Posted: 23 Jul 2010 | Published: 20 Jul 2008

IBM

E-Guide: Continuous Data Protection Backup Tutorial on CDP Tools, Part 1
sponsored by FalconStor Software
EGUIDE: In part one of this tutorial on continuous data protection backup, learn about the latest CDP tools, how CDP has grown over the past few years, and the history of CDP tools and how they are evolving.
Posted: 20 May 2011 | Published: 20 May 2011

FalconStor Software

Agentless Architecture. Agentless Backup is Not A Myth
sponsored by Asigra
WHITE PAPER: Backup and recovery software typically requires agents that are installed onto the host servers that a system administrator wants to back up. The Asigra solution requires no agents, which inherently makes it easier to install and support than legacy backup and recovery solutions. Read this whitepaper to learn more!
Posted: 24 Aug 2010 | Published: 24 Aug 2010

Asigra

Strategic Brief – HIPAA
sponsored by Alliance Storage Technologies
WHITE PAPER: The Health Insurance Portability and Accountability Act of 1996 (HIPAA) enacted reform and standardization in the healthcare industry to protect patient confidentiality. Continue reading to learn more about the goals of HIPAA.
Posted: 23 Nov 2010 | Published: 23 Nov 2010

Alliance Storage Technologies

How to Handle Data Management in the Cloud
sponsored by TechTarget Data Backup
EBOOK: Data management in the cloud enables organizations to manage data between clouds and in conjunction with on-premises storage. Access this handbook to learn 3 cloud-based data management challenges, how to make cloud data work to your benefit, how to use multi-cloud data management and protection, and more.
Posted: 09 Jun 2020 | Published: 09 Jun 2020

TechTarget Data Backup

eGuide: Information Security - Buyer's Guide to Messaging Security
sponsored by TechTarget Security
EGUIDE: Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

TechTarget Security

Windows Recovery Solutions for Today’s Environments
sponsored by InMage Systems
WHITE PAPER: This white paper is intended to help you think about that problem with knowledge of pertinent market trends and next generation recovery technologies.
Posted: 23 Apr 2010 | Published: 23 Apr 2010

InMage Systems

Storage-Based Replication Options: Selecting the Right Replication Method for Optimal Data Protection
sponsored by DellEMC and Intel®
WHITE PAPER: Backup is the core of data protection because it provides the ability to recover data from either physical disasters or common data loss conditions. But backup can have drawbacks - regular disruption of production applications, long recovery time, and significant data/work loss. Replication technologies were developed to shorten recovery time..
Posted: 08 Sep 2009 | Published: 29 Jul 2009

DellEMC and Intel®