Data Protection White Papers

(View All Report Types)
Disaster Recovery with ETERNUS DX – The Data Safe – and VMware SRM
sponsored by Fujitsu America, Inc.
WHITE PAPER: This paper shows the way to protect data and business, where hardware is only one factor. The other factor is the proof that in a worst case scenario the protection works well. The challenge is to test that protection in near real-life situations but without impact on business production.
Posted: 06 Dec 2010 | Published: 06 Dec 2010

Fujitsu America, Inc.

Solution Brief: Unified Backup and Disaster Recovery (DR) for VMware Environments
sponsored by FalconStor Software
WHITE PAPER: Organizations investing in VMware vSphere can leverage the data protection capabilities and application awareness of FalconStor CDP to protect and maximize their VMware purchases. FalconStor CDP enables flexible, affordable, automated, and dependable backup and DR for any VMware vSphere environment.
Posted: 22 Jul 2011 | Published: 22 Jul 2011

FalconStor Software

User Directed Storage Management: How To Make Users Accountable For Responsible Storage Usage
sponsored by Northern Parklife
WHITE PAPER: The accelerated pace of doing business in today's world puts organizations under tremendous pressure. They need to be fleet and flexible, able to rapidly respond to opportunities, make decisions, and deploy resources. Critical to this is the way information is managed and stored.
Posted: 12 Feb 2009 | Published: 12 Feb 2009

Northern Parklife

An Overview of Data Replication
sponsored by Overland Storage
WHITE PAPER: There are many forms of data replication, each with its own features, value and shortcomings. This white paper details the types of data replication and alternative data protection options to help you find the right solution for your business a...
Posted: 30 Jul 2007 | Published: 01 Feb 2007

Overland Storage

Citrix GoToMyPCCorporate - Security White Paper
sponsored by Citrix Online - GotoMyPC
WHITE PAPER: In this white paper you will learn how Citrix® GoToMyPC® Corporate provides industry-leading security, end-point management and centralized control.
Posted: 19 Jun 2008 | Published: 01 Jan 2006

Citrix Online - GotoMyPC

Streamline Your Storage Usage: 4 Straightforward Ways To True NAS Management
sponsored by Northern Parklife
WHITE PAPER: In a relatively short span of time, Network Attached Storage [NAS] has become a popular, widely implemented technology given its many attractive features and benefits. This whitepaper details four techniques for managing network attached storage, including file management simplification and data access without server intervention.
Posted: 12 Feb 2009 | Published: 12 Feb 2009

Northern Parklife

HP Data Protector Software Advanced Backup to Disk Integration with Virtual Tape Libraries White Paper
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This white paper provides a better understanding of the integration of HP Data Protector Software with Virtual Tape Libraries by utilizing the Advanced Backup to Disk functionality available with the HP Data Protector Software.
Posted: 10 Dec 2008 | Published: 10 Dec 2008

Hewlett Packard Enterprise

Data Protection Strategies Leveraging Replication: An In-Depth Look at Evaluation Criteria and Usage Scenarios
sponsored by Double-Take Software
WHITE PAPER: As dependence on continuous access to critical data grows, so does the importance of avoiding service interruption. This paper examines four data protection strategies and compares their merits for the most common business continuance scenarios.
Posted: 01 May 2009 | Published: 29 Feb 2008

Double-Take Software

New Insider Threat Emerges in the New Economy
sponsored by Lumension
WHITE PAPER: Learn how employees and partners are engaging with IT assets and intellectual property.
Posted: 02 Feb 2009 | Published: 02 Feb 2009

Lumension

Achieving SaaS Security with Connected® Online PC Backup
sponsored by Iron Mountain
WHITE PAPER: This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.
Posted: 23 Sep 2008 | Published: 23 Sep 2008

Iron Mountain