data recovery

Results 426 - 450 of 460Sort Results By: Published Date | Title | Company Name
Published By: VMware     Published Date: May 02, 2011
The cost of downtime and/or lost data can be devastating. For this reason, business continuity and disaster recovery (BC/DR) is becoming a critical mandate. Virtualization can keep your business running through many types of planned and unplanned IT outages. Download this white paper to learn more.
Tags : 
smb, vmware, virtualization, business continuity, disaster re vsphere, downtime, it failure, vms, it managementcovery, bc/dr planning solutions, high availability, taneja group
    
VMware
Published By: VMware     Published Date: May 03, 2011
Read our guide to learn how you can get started quickly with VMware.
Tags : 
vmware, virtualization management, smbs, business continuity, vsphere, data protection, disaster recovery, high availability, backup
    
VMware
Published By: The Bunker     Published Date: Nov 30, 2010
What questions should an organization ask about security and availability when contemplating a cloud computing model
Tags : 
cloud, security, data centre, sla, continuity, disaster recovery
    
The Bunker
Published By: EMC Corporation     Published Date: May 27, 2011
In this brief, IDC discusses the challenges of using tape and the benefits of disk-based data protection solutions with data deduplication, especially if a business is experiencing unabated data growth, a lack of recovery performance, and increased costs associated with physical tape.
Tags : 
emc, idc, backup and recovery, data protection solutions, data deduplication, data growth, recovery performance
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 08, 2012
Data deduplication is not just altering how backup targets are used; it dramatically affects operating efficiencies, simplifies remote office data protection, and makes disaster recovery significantly more affordable and realistic. Read on.
Tags : 
leveraging, emc, deduplication, solutions, backup, recover, long-term information, retention, information retention
    
EMC Corporation
Published By: EMC Corporation     Published Date: Mar 08, 2012
In this brief, IDC discusses the challenges of using tape and the benefits of disk-based data protection solutions with data deduplication, especially if a business is experiencing unabated data growth, a lack of recovery performance. Find out more.
Tags : 
idc, disk based, data protection, unabated, data growth, recovery, backup
    
EMC Corporation
Published By: Riverbed Technology, Inc.     Published Date: Apr 08, 2014
As enterprises focus on consolidation of data centers, they continue to expand the roles and numbers of branch offices, often in locations that are difficult to support and protect. Learn to extend the virtual edge of the data center to branch offices, enabling complete consolidation of servers and data, improving security, and providing LAN performance at the edge via the WAN.
Tags : 
wan, cloud based computing, optimization, performance, data center, data consolidation, servers, disaster recovery, risk
    
Riverbed Technology, Inc.
Published By: HP and Intel® Xeon® processors     Published Date: Sep 06, 2011
This white paper discusses how SMBs can effectively address their data protection challenges, implementing solutions that help store and protect their business-critical data as they cut costs and improve efficiency and reliability.
Tags : 
hp + intel, data protection stratefy, smbs, backup and recovery, disk, tape, d2d storage, data deduplication
    
HP and Intel® Xeon® processors
Published By: Dell Storage     Published Date: Apr 21, 2011
This one-pager discusses the cost savings and ease of management advantages by automating disaster recovery plans and tasks.
Tags : 
dell compellent, automation, disaster recovery, fluid data, vmware site recovery manager, enterprise cloud computing
    
Dell Storage
Published By: Idera     Published Date: Jun 21, 2011
SharePoint 2007 was big, and SharePoint 2010 shows every sign of being even bigger. However, there is one stumbling block on the way to SharePoint 2010 nirvana... upgrading. In this white paper, find out ten of the common difficulties you may encounter when upgrading content to SharePoint 2010 and some solutions.
Tags : 
idera, sharepoint, migration, upgrade, monitor, customization, metadata, populating, third party, exchange, nerd, security audit, back up and recovery, architect, public folders, hosting, cloud, protection, technology
    
Idera
Published By: CDW Vmware     Published Date: Aug 02, 2012
As with many enterprises today, your data center houses critical IT components that your business depends on. But are they fully secure and protected from potential threats such as intruders or natural disasters? A data recovery plan is very important to be fully prepared in the event of a disaster.
Tags : 
quick, start, data, recovery, vmware, enterprise, data, center, components, protect, recover, secure, threat, intruders, natural disaster, recovery, plan, event, disaster, critical
    
CDW Vmware
Published By: Symantec     Published Date: Jul 29, 2013
Virtualization has been a game-changing technology for IT, providing efficiencies and capabilities that just aren't possible when constrained within a physical world. When searching for a backup and recovery solution for virtual environments, there are a few “must have” features to consider. Learn about the top four in this data sheet!
Tags : 
deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2013
Because of the outstanding economy, flexibility, and service levels it offers, virtualization is transforming data centers at breakneck speed: by 2016, an estimated 80 percent of the world's x86 servers will be Virtual Machines (VMs). But the speed of this transformation, along with the high resource utilization, ease of cloning, moving workloads, and other ways virtualization works its magic, raise challenges for “traditional” IT services and the teams that deliver them.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management
    
Symantec
Published By: Symantec     Published Date: Jul 29, 2013
Backup and recovery has never been a higher priority for IT organizations than it is right now. But when it comes to Virtual Machine (VM) backup and recovery, the landscape has never been more confusing. Download this white paper and learn about the advantages of backup agents, agentless backup and agent-assisted backup so that you can decide for yourself and truly determine the best approach for your organization. We help you weigh in the pros and cons of each method.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management
    
Symantec
Published By: Symantec     Published Date: Jul 30, 2013
In this whitepaper we will discuss what to look for in a virtualization protection solution as well as consider the merits of a separate solution for protecting one’s virtual environment, compared with using a unified solution that offers comparable virtualization protection capabilities. Download for more information.
Tags : 
architect, deduplication, virtual machines, symantec, enterprise, technology, server, virtualization, data protection, backup, recovery, system security, system management
    
Symantec
Published By: CDW     Published Date: Sep 15, 2014
WHEN IT COMES TO DATA CENTER OPTIMIZATION, IT’S NOT JUST WHAT YOU KNOW. IT’S WHO YOU KNOW. That’s why we partner with leading vendors like EMC. They offer a wide range of devices for primary storage, archiving, backup, recovery and data center management. And with years of experience in EMC deployments, CDW has the experts and the expertise to make them work for you. Together, we give our customers access to the latest technologies that help optimize their data centers to keep their organizations running smoothly.
Tags : 
data, optimization, experts, backup, recovery, technologies, organizations, vendor, experience, deployment, management, storage, archiving, technologies, recovery
    
CDW
Published By: Kaseya     Published Date: Mar 12, 2015
Providers who add BDR to their offerings can enjoy substantial profit margins and incremental monthly recurring revenue. BDR, therefore, is ideal for solution providers, especially as a first step to a managed services practice.
Tags : 
backup, data loss, risks, recovery services, humor error, program deletions, hardware failures, system crashes, application freezes, software bugs
    
Kaseya
Published By: Datto Inc.     Published Date: Jan 31, 2013
You can even conquer a Superstorm when all the pieces come together. Read how the entire Datto team, from product and technical support to the CEO, worked with Partners and their clients to make it through Sandy with data intact and minimal downtime.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business, smb, downtime, instant virtualization, disaster recovery, managed-service provider, msp, recovery time objective, rto, recovery point objective, rpo, risk assessment, datto
    
Datto Inc.
Published By: NETIQ     Published Date: Sep 09, 2013
Virtualization technology can solve the cost vs. time dilemma that traditional data recovery solutions pose, enabling organizations to quickly and cost-effectively recover all server workloads. To learn more, download your copy of this NetIQ paper today.
Tags : 
netiq, white paper, disaster recovery, workload mirroring, removable-media backup, server workload, virtualization technology
    
NETIQ
Published By: HP     Published Date: May 14, 2014
In today’s world of explosive data volumes, midmarket companies face a growing number of challenges when it comes to safeguarding data, and today's approaches to backup and data protection are falling short. The Brief outlines HP solutions to meet IT needs for backup appliances that tightly integrate deduplication, data protection and recovery.
Tags : 
hewlett packard, data, backup, . data protections, recovery, deduplication
    
HP
Published By: Cyveillance     Published Date: Jun 20, 2014
Phishing is defined by the Financial Services Technology Consortium (FSTC) as a broadly launched social engineering attack in which an electronic identity is misrepresented in an attempt to trick individuals into revealing personal credentials that can be used fraudulently against them. In short, it’s online fraud to the highest degree. Although it’s been around for years, phishing is still one of the most common and effective online scams. The schemes are varied, typically involving some combination of spoofed email (spam), malicious software (malware), and fake websites to harvest personal information from unwitting consumers. The explosive rise of mobile devices, mobile applications, and social media networks has given phishers new vectors to exploit, along with access to volumes of personal data that can be used in more targeted attacks or spear phishing. The fact that phishing attacks are still so common highlights their efficacy and reinforces the need to implement comprehensive phishing and response plans to protect organizations. An effective phishing protection plan should focus on four primary areas: Prevention, Detection, Response, and Recovery. High-level recommendations for each of the four areas are outlined in this whitepaper.
Tags : 
cyveillance, phishing, security, cyberattacks, cybercriminals, threats
    
Cyveillance
Published By: Mimecast     Published Date: Nov 06, 2017
Trying to manage disparate email solutions? Not just for e-discovery, archiving and recovery, but security and continuity as well? Your perfect-world archive is achievable. Reduce administrative complexity with a 100% cloud solution for not only your email archiving but continuity and security, too. Watch the virtual event on cloud archiving on-demand now, featuring: • Amanda Crew, from the hit show Silicon Valley, with a brief history of cringeworthy archive failures. • First-hand industry insight from Mimecast CEO Peter Bauer and CTO Neil Murray. • A deep dive demonstration of the leading cloud archive solution including, data protection, recovery, e-discovery and compliance features.
Tags : 
mimecast, virtual event, email archiving, email solutions, cloud archiving
    
Mimecast
Published By: Unitrends     Published Date: Jan 05, 2017
Exchange Online, SharePoint Online, and OneDrive for Business are the applications your business relies on every day. But without a smart backup plan, finding and restoring lost Office 365 data can take hours, days, or even longer. The facts are that data loss can occur in cloud-based applications, including Microsoft Office 365 and deleted items will be permanently removed after 14 days. Read our eBook to learn how to broaden your backup and recovery plan to include purpose built protection for Microsoft Office 365.
Tags : 
unitrends, microsoft office 365, backup, recovery, data loss
    
Unitrends
Published By: Druva     Published Date: Aug 03, 2016
Will your company will lose data in the cloud? Many organizations think SaaS providers will recover their data but that is not the case. Gartner assesses backup and recovery shortcomings of SaaS providers and provides considerations to close the gap.
Tags : 
    
Druva
Published By: Druva     Published Date: Aug 03, 2016
Will your company will lose data in the cloud? Many organizations think SaaS providers will recover their data but that is not the case. Gartner assesses backup and recovery shortcomings of SaaS providers and provides considerations to close the gap.
Tags : 
    
Druva
Start   Previous    5 6 7 8 9 10 11 12 13 14 15 16 17 18 19    Next    End
Search Offers      
Get your company's offers in the hands of targeted business professionals.