Recovery Management Reports

Infographic: 5 cybersecurity predictions for 2022
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Cybercrime showed no sign of slowing down in 2021 and enterprises continue to fall victim to cyberattacks, with gangs targeting larger organizations with increasingly large demands. In good news, we can always take stock of the recent past and know what to prepare for. In this infographic, we point out five forecasts for cybersecurity in 2022.
Posted: 06 Jan 2022 | Published: 06 Jan 2022

TechTarget ComputerWeekly.com

7 NAS encryption best practices to protect data
sponsored by TechTarget ComputerWeekly.com
EBOOK: NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.
Posted: 24 Mar 2022 | Published: 24 Mar 2022

TechTarget ComputerWeekly.com

Presentation Transcript: Navigating Your Way Through the Fog of Cloud-Based Backup
sponsored by Asigra
PRESENTATION TRANSCRIPT: There is a current movement to cloud-based backup for MSPs. Why cloud backup and why now? In this transcript of the "Navigating Your Way Through the Fog of Cloud-Based Backup" video, learn about the considerations for buying into cloud backup.
Posted: 24 Sep 2010 | Published: 24 Sep 2010

Asigra

eGuide: Information Security - Buyer's Guide to Messaging Security
sponsored by TechTarget Security
EGUIDE: Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

TechTarget Security

Focus on Endpoint Data Protection
sponsored by Druva
EGUIDE: Whether it's employee laptops, mobile devices, or remote offices, endpoint data protection is an increasing concern for data storage managers. Find out in this e-guide which approaches and technologies work best when it comes to storing and protecting endpoint data.
Posted: 30 Mar 2011 | Published: 30 Mar 2011

Druva

4 Backup Technologies to Help Meet Your RTOs
sponsored by EMC Corporation
EGUIDE: This expert E-Guide explores different modern backup technologies that can reduce the amount of data being backed up and help you meet your backup RTOs.
Posted: 09 May 2012 | Published: 09 May 2012

EMC Corporation

The Costs and Implications of EHR System Downtime on Physician Practices
sponsored by Stratus Technologies
WHITE PAPER: The paper includes calculations showing the cost of downtime expected for a given level of EHR solution uptime in practices of various sizes, as well as products associated with specific uptime levels. The report also includes a “cost per hour” tool that estimates the financial impact of downtime in practices they administer, oversee or assist.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

Stratus Technologies

Social Security Administration Deploys DocAve to Protect Mission-Critical SharePoint Deployment
sponsored by AvePoint, Inc.
CASE STUDY: In early 2008, the Social Security administration they deployed their pilot SharePoint deployment that was accessible to all agency staff. After evaluating several backup solutions, SSA administrators chose AvePoint Doc Ave Backup and Recovery for their SharePoint environment. Read this case study to learn why.
Posted: 04 Feb 2010 | Published: 04 Feb 2010

AvePoint, Inc.

Protecting Server Data in Small and Medium-sized Businesses
sponsored by Iron Mountain
WHITE PAPER: Read this white paper to learn how to successfully protect server data outside a centralized data center and focus on specific needs and requirements for SMBs.
Posted: 11 Jan 2010 | Published: 01 Sep 2006

Iron Mountain

E-Guide: Continuous Data Protection Backup Tutorial on CDP Tools, Part 1
sponsored by FalconStor Software
EGUIDE: In part one of this tutorial on continuous data protection backup, learn about the latest CDP tools, how CDP has grown over the past few years, and the history of CDP tools and how they are evolving.
Posted: 20 May 2011 | Published: 20 May 2011

FalconStor Software