Security BackupWelcome, Guest      sign in | register | help


   Search for:        Advanced Search
 
Your search for keyword: Security Backup returned the following results.
RSS What is RSS?
Related Categories

 •   Backup Systems and Services
 •   Data Security
 •   Storage Security
 •   Enterprise Data Protection and Privacy
 •   Storage Management
 •   Disaster Recovery
 •   Disk-based Backup & Storage/ RAID
 •   Virtualization
 •   Security Monitoring
 •   Security Policies

Related Searches
 •   It Security Backup
 •   Linux Based Security Backup
 •   Maintenance Security Backup
 •   Making Security Backup
 •   Security Backup Intrastructures
 •   Security Backup Operational
 •   Security Backup Pricing
 •   Security Backup Proposals
 •   Security Backup Warehouse
 •   Security Function
Advertisement

ALL RESULTS
1 - 25 of 470 | Next Page

Featured Sponsors

E-mail Recovery, Restoration, Search & Analysis by Ontrack® PowerControls™ by Kroll Ontrack.
Ontrack® PowerControls™ is a simple yet powerful tool for copying, searching, recovering and analyzing mailbox items directly from Microsoft Exchange Server more...
>> Discover more offerings from Ontrack® PowerControls™ by Kroll Ontrack.

Top Considerations for Implementing Secure Backup and Recovery by Zmanda Inc.

July 2008 - (Free Research)
Since your backup is a copy of your most valuable digital assets, backup security is a critical consideration. This white paper details important considerations for ensuring security of backup data. 
(WHITE PAPER) READ ABSTRACT |

Presentation Transcript: Protecting Data on the Edge by Zenith Infotech

November 2009 - (Free Research)
According to industry statistics, the majority of a typical company's data doesn't reside on data center storage -- it lives on the "edge." The edge may be desktop PCs, laptops or even smart phones and PDAs. In this transcript, W. Curtis Preston describes the most effective techniques, tools and best practices for protecting edge or mobile data. 
(PRESENTATION TRANSCRIPT) READ ABSTRACT |

General Backup Purchasing Considerations by Quantum Corporation

December 2008 - (Free Research)
This chapter discusses the process of evaluating and purchasing backup products. Also discussed are the issues to be aware of during this process, such as recovery deadlines, scalability, security, and more. 
(WHITE PAPER) READ ABSTRACT |

Global Data Deduplication Results with NetBackup PureDisk by Symantec Corporation

February 2008 - (Free Research)
At the heart of NetBackup PureDisk customers will find flexible deduplication technology, a highly scalable software-based storage system, and integration with NetBackup for greater functionality. 
(WHITE PAPER) READ ABSTRACT |

Developing an Effective Corporate Mobile Policy by BlackBerry

June 2008 - (Free Research)
By now, most organizations are clear on the advantages and benefits of wireless data solutions in the enterprise. However, It is no longer enough to rely on ad hoc policies regarding wireless computing. 
(WHITE PAPER) READ ABSTRACT |

Cost-effective Data Protection for Microsoft Windows Environments by Zmanda Inc.

August 2008 - (Free Research)
This whitepaper discusses the challenges of protecting Microsoft Windows files, databases, and email applications within a heterogeneous IT environment; and demonstrates how Amanda Enterprise, combined with its clients and agents. 
(WHITE PAPER) READ ABSTRACT |

THE CASE FOR ENDPOINT USER DATA PROTECTION by Cibecs

July 2011 - (Free Research)
Cibecs is an automated data backup and recovery solution specifically developed for endpoint devices. Cibecs offers tangible operational benefits over and above the “insurance” benefit of quick and easy data recovery.C 
(WHITE PAPER) READ ABSTRACT |

Videocast: Considerations for Choosing Cloud Backup Hosting Services by KineticD

June 2011 - (Free Research)
Cloud backup for physical and virtual environments is becoming more and more important for SMBs. Gartner predicts that by 2012, Vendor Lock-in will surpass security as the biggest obstacle to cloud computing. Vendors are trying to lock-in and maintain their customers forever, not allowing them the flexibility and mobility SMBs require. 
(VIDEO) READ ABSTRACT |

Global Threat Report - September 2011 Backup strategy for your home users by ESET

November 2011 - (Free Research)
This white paper underlines the importance of backing up your data, whether at home or within the enterprise. In addition, discover today's top ten security threats to look out for. 
(WHITE PAPER) READ ABSTRACT |

E-Guide: Align Data Protection with Business Importance by IBM

August 2011 - (Free Research)
This SearchStorage.com E-Guide discusses the importance of protecting not just data but "use" of the associated information system, and outlines 4 capabilities needed for a better approach to data protection. Read on to learn more. 
(EGUIDE) READ ABSTRACT |

BMC Software Hybrid Copy Techniques by BMC Software, Inc.

April 2009 - (Free Research)
Because organizations are demanding 24x7 availability from their IMS, DB2®, and VSAM applications, it is imperative that those applications do not experience outages. Read this white paper to find out how BMC's Hybrid Copy techniques help for faster system recovery in the event of a local outage. 
(WHITE PAPER) READ ABSTRACT |

Focus on Endpoint Data Protection by Druva Software

March 2011 - (Free Research)
Whether it's employee laptops, mobile devices, or remote offices, endpoint data protection is an increasing concern for data storage managers. Find out in this e-guide which approaches and technologies work best when it comes to storing and protecting endpoint data. 
(EGUIDE) READ ABSTRACT |

Handbook: Medical Image Archiving by SearchHealthIT.com

August 2013 - (Free Research)
As more and more information heads online, healthcare providers are struggling to secure and store necessary electronic data. Consult this expert handbook to learn cutting-edge archiving strategies that will help you successfully migrate to the next generation of health IT data systems. 
(EBOOK) READ ABSTRACT |

Virtualization Technologies and Their Impact on Disaster Recovery by Double-Take Software

July 2007 - (Free Research)
Disaster recovery strategies and high availability for virtual environments are critical for business continuity. This paper outlines strategies specific to virtualized servers that ensure failover and mission-critical application availability. 
(WHITE PAPER) READ ABSTRACT |

Lloyd Gosselink Rochelle & Townsend Ensure Reliable, Constant, E-mail Services with Replay AppImage by AppAssure Software, Inc.

June 2009 - (Free Research)
The network administrators at Lloyd Gosselink Rochelle & Townsend, PC have taken many steps to ensure reliable, constant, e-mail services. Like any law firm, e-mail is a central application and protecting the e-mail system is a central function of information services. One of the most important steps was implementing Replay AppImage. 
(CASE STUDY) READ ABSTRACT |

Remote Laptop and Tablet Backup Considerations by Druva Software

May 2014 - (Free Research)
This expert e-guide explains the necessity of adapting storage to fit the needs of an increasingly mobile workforce. It also explains the benefits of a solution that delivers remote laptop and tablet backup. 
(EGUIDE) READ ABSTRACT |

PST Archiving: What is it and How is it Done? by CommVault Systems, Inc.

January 2014 - (Free Research)
This webcast provides you with a background on PST data, the risks relating to it, and an archiving solution that efficiently and effectively manages these files. 
(WEBCAST) READ ABSTRACT |

Insight From The Iron Mountain Data Protection Predictors Study by Iron Mountain

March 2014 - (Free Research)
This concise data sheet reveals results from over 200 IT pros concerning data protection trends that likely will change in the next 1 to 3 years. 
(DATA SHEET) READ ABSTRACT |

Compliant Media Management: Best Practices Guide by Iron Mountain

May 2011 - (Free Research)
By following established best practices, you have the opportunity to both reduce the risks associated with a data breach and improve the overall efficiency of your media management program. Check out this E-Guide to learn the five key Best Practices Areas that your organization needs to know about, and more. 
(WHITE PAPER) READ ABSTRACT |

How Virtualization Cuts CDP Costs by 80% by Veeam Software

February 2010 - (Free Research)
This white paper compares 3 different options of implementing CDP (continuous data protection) and shows how virtualization-enabled CDP - or Near-CDP - becomes the most affordable and most logical disaster recovery choice for businesses of all sizes. 
(WHITE PAPER) READ ABSTRACT |

Managing PST Files: From Discovery to the Archive by C2C Systems

May 2010 - (Free Research)
As the need to retain corporate data has increased to meet regulatory requirements, the very existence of PST files may put you at risk of failing to meet these legal requirements which could have significant implications. So what can you do about PST files?  
(WHITE PAPER) READ ABSTRACT |

Top Ten IT Systems Management Pain Points by Kaseya

April 2011 - (Free Research)
Managing the IT infrastructure for small and mid-sizedcompanies is a thankless job. People just don’tunderstand the expertise, time and patience required.Kaseya presents the top ten IT management pain pointsand our solution for making your life easier. 
(WHITE PAPER) READ ABSTRACT |

Enhancing Application Protection and Recovery with a Modern Approach to Snapshot Management by CommVault Systems, Inc.

April 2014 - (Free Research)
This white paper highlights the challenges associated with rapid data growth when it comes to storage. It also gives the benefits of a software solution that makes recovery and managing snapshots easier and more efficient. 
(WHITE PAPER) READ ABSTRACT |

Success Story: Meet Today's Backup, Deduplication and SLA Requirements by APTARE

June 2013 - (Free Research)
This white paper examines how one organization easily and affordably implemented a backup software that ensures all backups are completed for all copies of their data. 
(CASE STUDY) READ ABSTRACT |

Perfecting Backup and Recovery Objectives by APTARE

June 2013 - (Free Research)
This white paper examines a data protection solution that provides extensive visibility into storage allocation, utilization and backup to meet today's demanding compliance requirements. 
(WHITE PAPER) READ ABSTRACT |

1 - 25 of 470 | Next Page

Advertisement

Search FindTech

Search the
Technology Services Directory
  The Complete KnowledgeStorm Network of Technology Search Sites. Focused searching for faster results.

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines.

TechTarget Corporate Web Site  |  Media Kits  |  Reprints




  TechTarget - The IT Media ROI Experts