Skip to main content
 

restore

Results 76 - 83 of 83Sort Results By: Published Date | Title | Company Name
Published By: digitiliti     Published Date: Apr 02, 2007
The challenge of managing, protecting and storing digital data is a major issue for businesses of every size and category. Companies generally rank the improvement of their storage infrastructure as a top objective, and the escalation of data protection costs has become an overriding concern. According to recent research, the data storage capacity of the average North American enterprise is now 59 terabytes, and the projected annual production data growth is 20 to 30 percent.
Tags : 
data storage, software, data security, data protection, enterprise software, storage, digitiliti, backup and recovery
    
digitiliti
Published By: ElcomSoft     Published Date: Dec 06, 2007
These days we’re always hearing about the "information age," "information technology," and how "information rules the world." We have come to feel that information is everything. But what does that mean, and is information in itself so important? Not completely. We need information to make decisions – that's what is truly important. A proper decision lights the way to success in any situation. That's why having access to information is a competitive advantage in any business environment.
Tags : 
passwords, password, password protected, password management, access control, data protection, information management, elcomsoft
    
ElcomSoft
Published By: Diligent Technologies     Published Date: Apr 11, 2008
This document is intended for the use of Enterprise1 Storage Professionals, focused on Data Protection — Backup, Restore,DR and Archive operations — who are interested in evaluating the potential impact of de-duplication technologies to their business. There is much hyperbole associated with de-duplication. The purpose of this document is to help readers distill the essence from the hype, as the basis for sound decision-making.
Tags : 
diligent, diligent technologies, deduplication, de-duplication, data center, datacenter, data protection
    
Diligent Technologies
Published By: ScriptLogic     Published Date: Nov 14, 2011
While modern backup and recovery solutions are perfectly capable of restoring permissions along with files, stuff just isn't always that simple.
Tags : 
server, migration, backup, recovery, permissions, copy, restore
    
ScriptLogic
Published By: Acronis     Published Date: Apr 28, 2011
Based on Acronis' patented disk imaging and bare metal restore technologies, Acronis® Backup & RecoveryT 10 Advanced Server is the next generation of the Acronis True Image disaster recovery family for physical and virtual environments. It simplifies and automates backup and restore processes across Windows and Linux environments, and remotely monitors and manages geographically distributed servers and workstations.
Tags : 
acronis, backup and recovery, 10 advanced server, patented disk imaging, bare metal restore, true image, disaster recovery, remote server
    
Acronis
Published By: Symantec     Published Date: Jun 29, 2012
This paper examines how recent trends in Internet trust marks can help restore confidence in online shopping, and as concluded by at least one recent study, even induce those who do shop to spend more.
Tags : 
trust marks, symantec, internet privacy, extended validation, norton secured seal
    
Symantec
Published By: Code42     Published Date: Apr 22, 2016
Backup isn't just a copy in the cloud. It's the antidote to everything. Be it user error, natural disaster, hardware failure, malware, theft or litigation—there’s a countermeasure to restore your business to normal. Skeptical? Click through the eBook to find out how backup makes the enterprise impervious.
Tags : 
back up protections, hardware failure, data protection, code 42
    
Code42
Published By: Cohesity     Published Date: Mar 19, 2019
Every 14 seconds. That’s how often analysts predict ransomware will attack a business this year.1 Despite the best efforts to thwart ransomware attacks, cyber criminals are innovative, and they continue to create new malware. This means more sophisticated and targeted ransomware attacks are coming—all with the same goal: Disrupt business operations in the hopes victims will pay to restore order. No industry is immune. And because enterprises are now even more attractive targets than consumers,2 your organization must proactively prepare for when, not if, cyber criminals come for your data.
Tags : 
    
Cohesity
Start   Previous    1 2 3 4     Next   End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.