WEBCAST:
This webcast provides information on a virtual Recovery time Actual (RTA) tool that will help you accurately calculate RTOs. Find out how your organization can achieve this goal (hint: no install is needed, just somewhere to run the executable).
EGUIDE:
The Storage Networking Industry Association (SNIA) defines CDP as "a class of mechanisms that continuously capture or track data modifications enabling recovery to previous points in time." In part two of this tutorial on continuous data protection backup, learn how CDP is being used today, and about the latest CDP products.
WHITE PAPER:
In independent testing, researchers found Dell AppAssure offered advantages in ease-of-use and backup/recovery time. AppAssure's image-level backup technology can essentially eliminate the potential for data loss by creating closely spaced recovery points for mission-critical applications, such as Exchange, SQL and SharePoint. Read the Report
WHITE PAPER:
This white paper features a unified and scalable storage solution that performs automated data migrations safely, quickly and independently of the live backup production environment.
EGUIDE:
In part one of this tutorial on continuous data protection backup, learn about the latest CDP tools, how CDP has grown over the past few years, and the history of CDP tools and how they are evolving.
WHITE PAPER:
The white paper Closing the Virtualisation Loop identifies the objectives in the next phase of virtual machine backup and recovery and provides recommendations on how to improve backup and disaster recovery in a hybrid IT environment.
WHITE PAPER:
Recovery as a Service (RaaS) has been around for some time, but the emergence of cloud computing offers a more efficient, faster and cheaper platform for application recovery. Find out what you should look for in a cloud-based recovery solution, and how you can successfully implement one.
PRESENTATION TRANSCRIPT:
Join Independent Backup Expert W. Curtis Preston and Falconstor's Product Marketing Manager Peter Eichers as they explore common data protection challenges and what technologies can be used to address them.