Backup and Recovery Software Reports

Buyer's guide to backup and recovery software
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.
Posted: 14 Jul 2022 | Published: 14 Jul 2022

TechTarget ComputerWeekly.com

Experts Address Your Cloud Security and Data Protection Concerns
sponsored by IBM
ESSENTIAL GUIDE: In this essential guide, our experts address your cloud backup security concerns and explain what you're required to protect vs. the cloud provider's responsibilities and 3 ways to use the cloud as a data protection target. Download now or risk missing out on the essentials you can put into practice at your company.
Posted: 25 Jun 2019 | Published: 24 Jun 2019

IBM

Top 20 Cloud Backup Services for 2019
sponsored by Druva
EGUIDE: To keep your pulse on the latest cloud backup developments, download this e-guide. Inside, our experts share 7 considerations for selecting a cloud backup service, examine 20 top cloud backup services to simplify the selection process, and explain how the public cloud is improving data protection.
Posted: 05 Sep 2019 | Published: 04 Sep 2019

Druva

Understanding the differences in your backup options
sponsored by Druva
EGUIDE: Download this e-guide to learn the biggest differences between off-site and cloud backup methods and find out which one fits your data protection needs the best.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Druva

Data Protection Methods: Mounting Backups vs. Recovering from Backups
sponsored by Veritas
EGUIDE: This e-guide highlights important questions to ask before deciding on a data protection method and discusses the benefits and challenges associated with mounting backup versus recovery. Read on to see how mounting backups can significantly improve your data protection systems.
Posted: 17 Mar 2016 | Published: 16 Mar 2016

Veritas

Data Efficiency with Violin's Concerto 7000 All Flash Array
sponsored by Violin Memory
WHITE PAPER: Read this solution brief to learn more about an all flash array that uses the latest thin provisioning technology along with application consistent snapshots for offline and near-line workloads. This solution saves space, reduces server sprawl and minimizes management overhead.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

Violin Memory

Securing Your Organization While Maintaining Here, Near, and Anywhere Data Availability
sponsored by Violin Memory
WHITE PAPER: The right all-flash array based solution provides comprehensive data protection functions to protect against problems in the data center, in a metro environment, and anywhere with different technologies based on the application needs. Read this solution brief to look into the application-specific data protection.
Posted: 30 Jun 2014 | Published: 30 Jun 2014

Violin Memory

Finding the Right Backup and Recovery Solution for Hyper-V
sponsored by Veeam Software
EGUIDE: Powerful backup and recovery protocols are especially important to businesses that rely on virtual machines. But after the mishap with Backup Exec, many businesses began looking elsewhere for solutions for Hyper-V protection. This e-guide examines why so many businesses have chosen to go with Veeam to achieve their backup goals.
Posted: 29 Feb 2016 | Published: 22 Feb 2016

Veeam Software

An Effective Data Archiving System Can Ease Backup Woes
sponsored by Veritas
EGUIDE: This e-guide examines data creation and growth and the troubles you may have storing it. Learn why data is cluttering up your archives and how to mitigate unstructured data until it becomes useful again so that you can improve your backup operations substantially and reduce cost.
Posted: 17 Mar 2016 | Published: 17 Mar 2016

Veritas

Container applications need backup: Who knew?
sponsored by TechTarget Storage
EZINE: The need to protect data in container applications has emerged with the advent of persistent data in containers. In this 'Storage' magazine issue, we also look at how object storage can thwart ransomware attacks.
Posted: 08 Jun 2018 | Published: 08 Jun 2018

TechTarget Storage