Automated Backup Software Reports

Focus: backup, replication and snapshots
sponsored by TechTarget ComputerWeekly.com
EGUIDE: We walk you from the basics of backup methods to the pros and cons of different ways of protecting data and key issues in virtual machine backup.
Posted: 08 Feb 2021 | Published: 27 Jun 2017

TechTarget ComputerWeekly.com

Infographic: 5 considerations before buying data center backup software
sponsored by TechTarget ComputerWeekly.com
EBOOK: Trying to cross-correlate how one vendor implements a product feature and comparing it to another vendor's features can be a daunting task. Backup and recovery software moves data through almost the entire data center infrastructure, so implementing it, training staff and obtaining support for it is no small feat.
Posted: 14 Jun 2022 | Published: 14 Jun 2022

TechTarget ComputerWeekly.com

Backup deduplication: a complete guide
sponsored by TechTarget ComputerWeekly.com
EGUIDE: There are many elements to consider in picking the backup deduplication technology that fits best. How do zone-level and block-level deduplication compare? What about inline versus post-processing deduplication? What are the differences between deduplication and compression? Check out this complete e-guide to backup deduplication.
Posted: 08 Feb 2021 | Published: 24 Jan 2020

TechTarget ComputerWeekly.com

Navigating Ransomware Recovery
sponsored by Cisco Umbrella
EGUIDE: The decisions and road to recovery will involve several stakeholders and real costs. So, when organizations must make the tough decision of whether to pay a ransom, rebuild the system, or file a report, there are many factors to consider. Use this e-guide to help you plan and map out steps to avoid rushing into bad choices that can’t be reversed.
Posted: 20 Apr 2020 | Published: 11 Feb 2020

Cisco Umbrella

Modern Data Protection Is More Than Backup
sponsored by TechTarget Data Backup
EBOOK: This exclusive e-book takes a look at how data protection is changing today. Download now to learn how and why backup is converging with other IT technologies and how copy data management differs from traditional backup.
Posted: 04 Feb 2015 | Published: 04 Feb 2015

TechTarget Data Backup

Spanning Backup Survives Series of Ownership Spins
sponsored by Spanning Cloud Apps
EGUIDE: In this expert-guide learn how Spanning backup went through the process of rediscovering their identity and reaffirming their mission after being sold 3 times in as many years. Then, learn why they integrated with AWS and why they're setting their sights on ransomware protection and GDRP compliance.
Posted: 08 Jan 2018 | Published: 29 Dec 2017

Spanning Cloud Apps

Finding the Right Backup and Recovery Solution for Hyper-V
sponsored by Veeam Software
EGUIDE: Powerful backup and recovery protocols are especially important to businesses that rely on virtual machines. But after the mishap with Backup Exec, many businesses began looking elsewhere for solutions for Hyper-V protection. This e-guide examines why so many businesses have chosen to go with Veeam to achieve their backup goals.
Posted: 29 Feb 2016 | Published: 22 Feb 2016

Veeam Software

SMBs Need Enterprise-quality Data Protection, Right-sized for Them
sponsored by HPE and Intel®
WHITE PAPER: This white paper highlights the need for SMBs to find data protection tools that are right-sized for their specific needs. It also cautions against organizations underestimating their data protection needs.
Posted: 25 Jun 2014 | Published: 25 Jun 2014

HPE and Intel®

Hyper-converged Secondary Storage: More Than Just a Trend
sponsored by Cohesity
EGUIDE: This guide delves into Cohesity's hyper-converged secondary storage platform, and explains why this new category of backup offerings is more than just a trend. Read on for the exclusive details, including an article illustrating how Cohesity's scale-out system replaced legacy EMC at Piedmont HealthCare in North Carolina.
Posted: 17 Aug 2018 | Published: 17 Aug 2018

Cohesity

Why Endpoint Backup Is More Critical Than Ever
sponsored by Code42
WHITE PAPER: Access this white paper to learn why relying on traditional firewalls and local file shares isn't enough to protect against data loss. You'll also get the facts on how you can build a comprehensive workforce enablement and protection strategy.
Posted: 12 Jun 2014 | Published: 30 Apr 2014

Code42