Data protection Whitepapers


Sort by: Date | Company | Title


Top 5 Cloud data protection challenges. Solved.
By CommVault | 1/12/2015

The cloud is transforming IT organisations with agility and efficiency but it still presents many challenges. Organisations have to strike the right balance between rationalizing their move to the cloud and overcoming barriers. Read on to consider how five challenges may impact your strategy.

Download this now


The myths of mobile security
By Check Point Software Technologies | 28/4/2015

Mobility has transformed the workplace. Laptops, smartphones and tablets not only enable an organization’s road warriors, but also create freedoms for all employees to stay connected whether at a conference, working from home, or even sitting in an airport terminal.

Download this now


14 Tips for your Data Protection Plan
By Symantec | 14/10/2014

This paper outlines the 14 “best practice” tips to help manage the security threats you’re potentially facing. By downloading you’ll learn: • The steps you should follow to protect your organisation from security threats • The measures and policies you should have in place from start to finish • Plus, get an opportunity to get the full picture on the current internet security threat environment

Download this now


Why EMC backup for VNX
By EMC Corporation | 8/9/2014

If you're like most businesses, data loss is not an option. That's why you need a protection strategy for your VNX that includes backup. This whitepaper details the best options out there for enhanced data protection.

For backup to be protection of the last resort, it must reside on reliable and cost- effective protection storage.

With the industry's most efficient deduplication, you can store months of backups on disk and quickly recover the data you need when you need it.

Built-in data integrity protection includes end-to-end data verification, fault-detection and self-healing, and ensures recovery every time.

Download this now


Protection storage architecture: The What, why and how
By EMC Corporation | 8/9/2014

This whitepaper details how Protection Storage Architecture can provide a data protection platform that can evolve with business and technical requirements.

Over the next few years, IT will be faced with a new set of data protection challenges, centered on delivering multiple data protection services

Transformational architecture not only enables backup teams to solve immediate tactical challenges but also helps IT teams keep business applications running

Protection Storage Architecture has three core components: protection storage, data source integration and data management services

(Tags: data protection, storage architecture, integration, data management, recovery, backup)

Download this now


EMC Best practices in data protection monitoring
By EMC Corporation | 8/9/2014

This ESG study focuses on why, when it comes to data protection, visibility is the most significant key to success, and how to achieve a truly unified view. · According to the 2013 IT Spending Intentions Survey, improving data backup and recovery was the #2 most important IT priority selected by respondents

· Without far reaching visibility, infrastructure is guaranteed to miss backing up some servers, while potentially duplicating protection of others

· The clarity gained by a unified view is necessary for proactively reporting protection to stakeholders and compliance to auditors

Download this now


The business value of data domain boost
By EMC Corporation | 8/9/2014

How can you effectively manage your data backups when IT budgets are flat or declining? This whitepaper explains the technical and business reasons why one new innovative technology will change the way you do backups. • Traditional backups are too slow, inefficient, and unreliable for the typical data centre of today. • The definition of insanity is continuing to do the same thing over and over and expecting different results. It’s time to stop the insanity with your backup strategy. • A new solution can dramatically increase backup performance, reliability, operational and disaster recovery, and better leverages current infrastructure

Download this now


Top reasons for entry-level storage and data protection from EMC
By EMC Corporation | 8/9/2014

This whitepaper pushes mid-sized businesses to rethink what’s possible for their data storage and protection, explaining how to experience enterprise-class performance at an entry-level price point.

• A simple user interface can perform all block-and file-oriented operations • Advanced efficiency services, such as thin provisioning and file deduplication with compression, reduce initial capacity requirements by up to 50% • Continuous fault detection and self-healing ensure data stays correct and returns correctly so that data is recoverable and accessible throughout its lifecycle

Download this now


Key Communications Systems Are Always Available, Highly Responsive for Global Mining Company
By F5 Networks | 16/7/2014

Mining company Teck Resources wanted to ensure high availability and responsiveness for its critical employee communications systems. To achieve this goal, Teck chose a comprehensive F5 traffic management and secure access solution that provides high availability and give users a more responsive experience.

Download this now


Protecting Against Application DDoS Attacks : A Three-Step Solution
By F5 Networks | 16/7/2014

Today’s security threats increasingly involve application-layer DDoS attacks mounted by organized groups of attackers to damage web-facing applications by exhausting resources. F5 BIG-IP ASM provides application-layer protection against DDoS attacks.

Download this now

Top Whitepapers

Featured Whitepapers