Continuous Backups White Papers

(View All Report Types)
How Virtualization Cuts CDP Costs by 80%
sponsored by Veeam Software
WHITE PAPER: This white paper compares 3 different options of implementing CDP (continuous data protection) and shows how virtualization-enabled CDP - or Near-CDP - becomes the most affordable and most logical disaster recovery choice for businesses of all sizes.
Posted: 18 Feb 2010 | Published: 17 Feb 2010

Veeam Software

Solution Brief: Unified Backup and Disaster Recovery (DR) for VMware Environments
sponsored by FalconStor Software
WHITE PAPER: Organizations investing in VMware vSphere can leverage the data protection capabilities and application awareness of FalconStor CDP to protect and maximize their VMware purchases. FalconStor CDP enables flexible, affordable, automated, and dependable backup and DR for any VMware vSphere environment.
Posted: 22 Jul 2011 | Published: 22 Jul 2011

FalconStor Software

Achieving SaaS Security with Connected® Online PC Backup
sponsored by Iron Mountain
WHITE PAPER: This document introduces the many security measures currently in place within the Iron Mountain data protection architecture to prevent unauthorized access or damage to customer data.
Posted: 23 Sep 2008 | Published: 23 Sep 2008

Iron Mountain

Neverfail Heartbeat Failover Engine
sponsored by Neverfail
WHITE PAPER: Check out this white paper to explore a business continuity solution that continuously keeps your applications up in the face of any threat to system availability.
Posted: 24 Jun 2013 | Published: 24 Jun 2013

Neverfail

Business Continuity Planning - The First Step to Business Resiliency
sponsored by Overland Storage
WHITE PAPER: Business Continuity(BC) is the ability to keep vital business operations running in the event of failure in the existing infrastructure. This white paper highlights the importance of (BC) planning and explores strategies and solutions to help achieve them
Posted: 12 Nov 2007 | Published: 01 Aug 2007

Overland Storage

Secure Mobile Computing: Using Two-factor Authentication with VPNs and Disk Encryption
sponsored by Aladdin Knowledge Systems
WHITE PAPER: Although mobile computing offers organizations many competitive advantages, it also entails significant security risks to corporate networks and sensitive corporate data. Read this whitepaper to learn about strong authentication solutions.
Posted: 28 Jul 2008 | Published: 11 Jun 2008

Aladdin Knowledge Systems

Time-addressable and Event-addressable Storage: Combining Snapshots and Data Journaling for True Continuous Data Protection
sponsored by American Megatrends Inc.
WHITE PAPER: Although there are many different ideas of what CDP is, it is clear that it must protect data in a manner that is both time-addressable and event-addressable. This white paper explains what this means and gives an overview of effective CDP ...
Posted: 04 Apr 2008 | Published: 14 Mar 2008

American Megatrends Inc.

Reducing Costs and Creating a More Secure IT Environment with a Holistic Approach to Data Protection: An ROI Analysis of FalconStor Storage Management Solutions
sponsored by FalconStor Software
WHITE PAPER: Data protection and disaster recovery continue to be overarching challenges for most firms. To remedy a myriad of problems with data protection as well as operational and disaster recovery, companies are replacing legacy backup methods with new approaches. Read on to learn more.
Posted: 22 Oct 2010 | Published: 22 Oct 2010

FalconStor Software

VMware Solutions for Small to Medium Businesses: Ensuring Rapid, Reliable and Affordable Disaster Recovery
sponsored by VMware, Inc.
WHITE PAPER: VMware Infrastructure transforms disaster recovery by providing you fast, reliable and cost-effective disaster recovery. Why suffer from the slow, expensive and unreliable problems associated with traditional disaster recovery solution?
Posted: 20 Nov 2008 | Published: 20 Nov 2008

VMware, Inc.

Disaster Recovery with ETERNUS DX – The Data Safe – and VMware SRM
sponsored by Fujitsu America, Inc.
WHITE PAPER: This paper shows the way to protect data and business, where hardware is only one factor. The other factor is the proof that in a worst case scenario the protection works well. The challenge is to test that protection in near real-life situations but without impact on business production.
Posted: 06 Dec 2010 | Published: 06 Dec 2010

Fujitsu America, Inc.