Data Protection News
December 28, 2016
While companies may be confident in their disaster recovery strategy, DR planning and testing still has a ways to go, according to results of a survey by data protection vendor Zetta. Among 403 IT ...
December 22, 2016
How much data do you actually recover? That's a question that Asigra users answered in a data recovery report. Featuring statistics gathered from nearly 1,100 organizations across eight sectors, ...
November 03, 2016
The latest Quorum onQ disaster recovery platform update features faster disk writes, increased capacity and a redesigned user interface. Quorum onQ 4.0 provides a suite of high availability, ...
September 23, 2016
StorageCraft will use its new analytics technology to tell its customers to stop backing up certain data. That’s right, the data protection vendor wants its customers to back up less. And ...
Data Protection Get Started
Bring yourself up to speed with our introductory content
Latent data, also known as ambient data, is the information in computer storage that is not referenced in file allocation tables and is generally not viewable through the operating system (OS) or standard applications. Continue Reading
An organization uses a disaster recovery (DR) site to recover and restore its technology infrastructure and operations when its primary facility becomes unavailable. In deciding the location and setup of a disaster recovery site, a business must ... Continue Reading
Point-in-time snapshots are a method of data protection that allows an administrator to make a full copy of a volume so that a restore can occur based on a specific time. Continue Reading
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
Evaluate Data Protection Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Through disk-based backup, continuous data protection enables backups to take place more often. Discover how to repair the technology's cost and capacity problem. Continue Reading
DR may be dying. The term DR, that is, not the actual process of disaster recovery. There is a move in the industry to replace the phrase with "IT resilience." At last week's ZertoCON business ... Continue Reading
Mounting a virtual machine image can save time, but there's a penalty to pay for the convenience. We list the questions to ask when deciding which data protection method to employ. Continue Reading
Manage Data Protection
Learn to apply best practices and optimize your operations.
Your cloud data may not be as secure as you think. No matter where your data lives, you should put the same level of thought and care into its protection, according to Sam Gutmann, CEO of ... Continue Reading
If you want to exercise some cost containment, forget the hardware for a moment and focus on data management. Continue Reading
By using these three methods to understand the type of protection your applications need, you'll achieve a more efficient data protection strategy. Continue Reading
Problem Solve Data Protection Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Network-attached storage devices can present a plethora of security issues to an enterprise. Expert Kevin Beaver explains how to detect and mitigate the risks. Continue Reading
Traditional RAID methods and their rebuild processes have some shops suffering long downtimes -- enter erasure codes and multi-copy mirroring. Continue Reading
Erasure coding can help reduce the data needed for backups and lower the cost of backup and recovery over the traditional approach, Wikibon CTO says. Continue Reading