Recovery Management Reports

The Case for Third-Party Archiving in Exchange 2010
sponsored by Sunbelt Software
WHITE PAPER: This white paper will give you a brief overview of Sunbelt Software, while educating decision makers about the important role that email and other content archiving plays in minimizing risk and lowering the cost of doing business, the capabilities of archiving in Exchange 2020, and more.
Posted: 28 Jan 2010 | Published: 28 Jan 2010

Sunbelt Software

Protecting Server Data in Small and Medium-sized Businesses
sponsored by Iron Mountain
WHITE PAPER: Read this white paper to learn how to successfully protect server data outside a centralized data center and focus on specific needs and requirements for SMBs.
Posted: 11 Jan 2010 | Published: 01 Sep 2006

Iron Mountain

Building a Better Data Backup Plan: This year's hottest backup trends
sponsored by NETGEAR Inc.
EGUIDE: To help you build the best backup plan for the new year, read this special report by features writer Carol Sliwa on the hottest backup trends. Learn about what's new in backup software, backup hardware and backup outsourcing. Read on to learn more.
Posted: 10 Aug 2011 | Published: 10 Aug 2011

NETGEAR Inc.

Five Challenges to Continuous PCI DSS Compliance
sponsored by Tripwire, Inc.
WHITE PAPER: As the Payment Card Industry Data Security Standard (PCI DSS, or PCI) becomes more widely adopted in both the United States and Europe, organizations face five major challenges when navigating the PCI compliance landscape.
Posted: 07 Feb 2011 | Published: 07 Feb 2011

Tripwire, Inc.

TechTarget ANZ Data Reduction E-Book
sponsored by IBM
EBOOK: Few organisations are willing to pay more for storage every year. Data reduction can get you off the treadmill by reducing the amount of data you need to store, backup and manage, and this e-book explains compression, data de-duplication, archiving and several other techniques to achieve this outcome.
Posted: 02 Aug 2010 | Published: 30 Jul 2010

IBM

E-Guide: Three Ways to Reduce Backup Windows on a Budget
sponsored by Acronis NEMEA
EGUIDE: One of the biggest problems plaguing backup administrators is the volume of data that must be backed up each night is steadily increasing, but the amount of time allotted for the nightly backup remains constant. There are better ways- Read on to learn more.
Posted: 03 Aug 2011 | Published: 03 Aug 2011

Acronis NEMEA

eGuide: Information Security - Buyer's Guide to Messaging Security
sponsored by TechTarget Security
EGUIDE: Protecting messaging services is an important part of any business messaging strategy. Vulnerabilities abound when you allow messaging traffic for delivery over the Internet. The scope of this guide will focus on email security although many of these concepts will also apply to other types of messaging.
Posted: 20 Nov 2009 | Published: 20 Nov 2009

TechTarget Security

Improving Backup Effectiveness and Cost-Efficiency with Deduplication
sponsored by Fujitsu America, Inc.
WHITE PAPER: This paper focuses on the ETERNUS CS800 solution, Fujitsu's new file-, OST-, and VTL-interface disk target solution with deduplication, that is ideally suited for mid-market organizations and remote and branch offices (ROBOs) of larger organizations seeking to reduce or eliminate their dependence on physical tape media for tape backup.
Posted: 06 Dec 2010 | Published: 01 Oct 2010

Fujitsu America, Inc.

The Costs and Implications of EHR System Downtime on Physician Practices
sponsored by Stratus Technologies
WHITE PAPER: The paper includes calculations showing the cost of downtime expected for a given level of EHR solution uptime in practices of various sizes, as well as products associated with specific uptime levels. The report also includes a “cost per hour” tool that estimates the financial impact of downtime in practices they administer, oversee or assist.
Posted: 11 Aug 2011 | Published: 11 Aug 2011

Stratus Technologies

Disaster Recovery with ETERNUS DX – The Data Safe – and VMware SRM
sponsored by Fujitsu America, Inc.
WHITE PAPER: This paper shows the way to protect data and business, where hardware is only one factor. The other factor is the proof that in a worst case scenario the protection works well. The challenge is to test that protection in near real-life situations but without impact on business production.
Posted: 06 Dec 2010 | Published: 06 Dec 2010

Fujitsu America, Inc.