Cookie policy: This site uses cookies (small files stored on your computer) to simplify and improve your experience of this website. Cookies are small text files stored on the device you are using to access this website. For more information on how we use and manage cookies please take a look at our privacy and cookie policies. Some parts of the site may not work properly if you choose not to accept cookies.

sections
 

data protection architecture

Results 1 - 25 of 25Sort Results By: Published Date | Title | Company Name
Published By: IBM     Published Date: Jun 29, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
IBM
Published By: Oracle     Published Date: Aug 09, 2018
The purpose of IT backup and recovery systems is to avoid data loss and recover quickly, thereby minimizing downtime costs. Traditional storage-centric data protection architectures such as Purpose Built Backup Appliances (PBBAs), and the conventional backup and restore processing supporting them, are prone to failure on recovery. This is because the processes, both automated and manual, are too numerous, too complex, and too difficult to test adequately. In turn this leads to unacceptable levels of failure for today’s mission critical applications, and a poor foundation for digital transformation initiatives. Governments are taking notice. Heightened regulatory compliance requirements have implications for data recovery processes and are an unwelcome but timely catalyst for companies to get their recovery houses in order. Onerous malware, such as ransomware and other cyber attacks increase the imperative for organizations to have highly granular recovery mechanisms in place that allow
Tags : 
    
Oracle
Published By: NetApp     Published Date: Aug 14, 2015
Taking advantage of a variety of private and public cloud services.
Tags : 
data, backup, recovery, protection, cloud, architecture, infrastructure
    
NetApp
Published By: Commvault ABM Oct     Published Date: Feb 15, 2018
Enterprises and managed service providers (MSPs) have some similar challenges in the realm of data protection. Both have to deal with expansive environments—with enterprises protecting distributed offices/geographies, and MSPs protecting many independent subscribers. Both also have been seeing production data storage and secondary protection storage demands rising. Enterprises and MSPs alike should therefore be looking for data protection architectures that have scale-out capabilities built into their core foundation.
Tags : 
data protection, msps, data storage, scale out data protection
    
Commvault ABM Oct
Published By: Symantec     Published Date: Nov 24, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : 
modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : 
modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection
    
Symantec
Published By: Symantec     Published Date: Nov 24, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : 
modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection
    
Symantec
Published By: HP - Intel® Xeon® processors     Published Date: Nov 07, 2012
In this white paper, HP and Veeam Software outline an end-to-end storage and data protection architecture optimized for VMware vSphere and Microsoft® Hyper-V environments.
Tags : 
virtualization, converged infrastructure, cloud computing, convergence, mission-critical applications, servers, cloud, it infrastructure, data center
    
HP - Intel® Xeon® processors
Published By: Symantec     Published Date: Nov 19, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture. Benefits and challenges of an appliance-based data protection approach will be discussed, as well as emerging best practices for modern data protection.
Tags : 
modernizing data protection, data back up appliances, appliance based data protection, best practices for data protection
    
Symantec
Published By: HP and Intel® Xeon® processor     Published Date: Feb 11, 2012
This white paper outlines an end-to-end storage and data protection architecture optimized for VMware vSphere.
Tags : 
intel, storage, 2.0, infrastructure, trends, storage, flexibility, drivers, market dynamics, trends, converged, custom requirement, deduplication, tiering, protocol, foundation, security
    
HP and Intel® Xeon® processor
Published By: mindSHIFT Technologies     Published Date: Jul 01, 2014
In this whitepaper, you will learn how your company can benefit from cloud-based business continuity and the 10 steps it can take to execute an effective plan.
Tags : 
mindshift, cloud, cloud based business continuity plan, business continuity plan, data management, data protection, scalability, cloud architecture, cloud infrastructure
    
mindSHIFT Technologies
Published By: Pure Storage     Published Date: Sep 04, 2018
Veritas' NetBackup software has long been a favorite for data protection in the enterprise, and is now fully integrated with the market-leading all-flash data storage platform: Pure Storage. NetBackup leverages the FlashArray API for fast and simple snapshot management, and protection copies can be stored on FlashBlade for rapid restores and consolidation of file and object storage tiers. This webinar features architecture overviews as well as 2 live demo's on the aforementioned integration points.
Tags : 
    
Pure Storage
Published By: HP and Intel® Xeon® processor     Published Date: Aug 10, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability. The key to
Tags : 
complete, storage, data, protection, architecture, virtual, environments, virtualization, physical, servers, server, transforms, data, management
    
HP and Intel® Xeon® processor
Published By: Sponsored by HP and Intel®     Published Date: Nov 02, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability.
Tags : 
virtualization, data management, it infrastructure, cloud computing
    
Sponsored by HP and Intel®
Published By: Arcserve     Published Date: Jun 11, 2014
Is it the end of data protection as we know it? Download this whitepaper to learn how to define a next generation architecture.
Tags : 
arcserve, next generation architecture, data protection, data protection operations, metrics, security, it management
    
Arcserve
Published By: Group M_IBM Q418     Published Date: Sep 10, 2018
LinuxONE from IBM is an example of a secure data-serving infrastructure platform that is designed to meet the requirements of current-gen as well as next-gen apps. IBM LinuxONE is ideal for firms that want the following: ? Extreme security: Firms that put data privacy and regulatory concerns at the top of their requirements list will find that LinuxONE comes built in with best-in-class security features such as EAL5+ isolation, crypto key protection, and a Secure Service Container framework. ? Uncompromised data-serving capabilities: LinuxONE is designed for structured and unstructured data consolidation and optimized for running modern relational and nonrelational databases. Firms can gain deep and timely insights from a "single source of truth." ? Unique balanced system architecture: The nondegrading performance and scaling capabilities of LinuxONE — thanks to a unique shared memory and vertical scale architecture — make it suitable for workloads such as databases and systems of reco
Tags : 
    
Group M_IBM Q418
Published By: Symantec     Published Date: Mar 06, 2014
This IDC executive brief will discuss the evolution and challenges of data protection and how backup appliances can form part of a modern data protection architecture.
Tags : 
symantec, data protection, backup appliances, backup applications, data protection architecture, virtual enviornments
    
Symantec
Published By: Arcserve     Published Date: Apr 22, 2015
We’ll walk you through the driving forces behind these rapidly evolving data protection architectures, the trends you’ll want to be keeping an eye on, what we should all demand of next generation architectures, and the state of the current market landscape.
Tags : 
network architecture, security, backup, disaster recovery, data loss, cloud computing, data center design and management
    
Arcserve
Published By: Arcserve     Published Date: Jul 15, 2015
We’ll walk you through the driving forces behind these rapidly evolving data protection architectures, the trends you’ll want to be keeping an eye on, what we should all demand of next generation architectures, and the state of the current market landscape.
Tags : 
    
Arcserve
Published By: Intel Corp.     Published Date: Aug 08, 2012
Virtualization reduces the number of physical servers IT needs to provision and maintain, but it also transforms the data protection paradigm. Now businesses can recover from failures in minutes, not hours, with unprecedented affordability. The key to achieving the best business uptime and cost savings is the effective design of storage management and data protection. This white paper outlines an end-to-end storage and data protection architecture optimized for VMware vSphere and Microsoft® Hyper-V environments.
Tags : 
complete, storage, data, protection, architecture, virtual, environments, virtualization, physical, servers, server, transforms, data, management, security, it management, infrastructure, server hardware, data center design and management, data center
    
Intel Corp.
Published By: Eaton     Published Date: Jan 26, 2016
Cloud computing vendors and colocation data centers make every effort to maximize the scalability, efficiency and agility of their data centers. As a result, more and more of them are looking into replacing older, transformer-based centralized power protection schemes with distributed architectures in which uninterruptible power systems (UPSs) reside in the white space (or data hall). This white paper describes the advantages of positioning UPSs in the white space as well as the essential qualities to look for in a white space-ready UPS.
Tags : 
eaton, data center trends, white space, upss, uninterruptible power systems, data hall, it management, enterprise applications
    
Eaton
Published By: HP     Published Date: Aug 08, 2014
Although ESG continues to see the vast majority of IT organizations living within a disk-plus-tape world, no one can argue against the idea that the cloud is becoming a viable and attractive component of any data protection architecture. Modern disk and tape solutions have overwhelming benefits for ROI, but those benefits can often be expanded by leveraging the economics and additional agility capabilities of a cloud tier. And all of those tiers would benefit from smarter data protection and preservation mechanisms through the combination of both backups and archiving.
Tags : 
disk plus tape, esg, cloud, roi, economics, agility, archiving, backup, recovery solutions, lower costs, speed recovery, infrastructure, risk, simplified management, performance, connectivity
    
HP
Published By: HP and Intel® Xeon® processors     Published Date: Nov 19, 2012
In this white paper, HP and Veeam Software outline an end-to-end storage and data protection architecture optimized for VMware vSphere and Microsoft(r) Hyper-V environments. Read on to learn more.
Tags : 
data protection, vmware, vsphere, hyperv, it management, data center
    
HP and Intel® Xeon® processors
Published By: CDW     Published Date: Sep 10, 2014
Leading organizations don’t think of data protection in traditional back-office terms—and that’s no accident. They think and act like service providers, and in doing so transform data protection operations from mere cost centers to business enablers. Traditional data protection architectures can’t meet today’s challenges of massive growth, application performance, and data availability. And they aren't designed for services-oriented business models.
Tags : 
protection, storage, architecture, massive growth, integrated, data
    
CDW
Published By: Logicalis     Published Date: Aug 20, 2014
We are pleased to present the findings of The Impact of IT Transformation on Enterprise Computing sponsored by Logicalis. The objective of this research is to better understand how the different stages of IT transformation can affect an organization, the challenges of advancing through each stage, and how successful progression can improve an organization’s IT effectiveness.
Tags : 
logicalis, it transformation, it strategy, it budget, it solutions, it system, it priorities, networking, security, software development, it management, knowledge management, data management, virtualization, converged infrastructure, draas, cloud computing, automation, automation & orchestration, protection
    
Logicalis
Search      

Related Topics

Add Research

Get your company's research in the hands of targeted business professionals.