Disc Recovery Reports

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

Software designer creates environment for growth
sponsored by DellEMC and Intel®
CASE STUDY: Learn how a software design group improved productivity and client services by replacing its backup and restore solution with Dell AppAssure.
Posted: 04 Mar 2014 | Published: 28 Feb 2014

DellEMC and Intel®

Navigating Ransomware Recovery
sponsored by Cisco Umbrella
EGUIDE: The decisions and road to recovery will involve several stakeholders and real costs. So, when organizations must make the tough decision of whether to pay a ransom, rebuild the system, or file a report, there are many factors to consider. Use this e-guide to help you plan and map out steps to avoid rushing into bad choices that can’t be reversed.
Posted: 20 Apr 2020 | Published: 11 Feb 2020

Cisco Umbrella

The Best Network Attached Storage Choice for Database and Software Environments
sponsored by Oracle and Intel®
WHITE PAPER: This white paper explores the benefits and capabilities of a new set of storage appliances from Oracle that deliver enterprise-class network attached storage capabilities with deep Oracle integration and leading simplicity, efficiency, performance and TCO.
Posted: 12 Jun 2014 | Published: 29 Nov 2013

Oracle and Intel®

Double-Take Availability: Keeping Disaster Recovery Systems Up to Date
sponsored by Vision Solutions
CASE STUDY: Access this exclusive case study to discover how a successful accounting organization accommodated an increase in data into their disaster recovery plan.
Posted: 12 Mar 2014 | Published: 31 Dec 2012

Vision Solutions

Managing Data through Replication: Avoiding Errors, Improving Access
sponsored by Dell Software
WHITE PAPER: CIOs and IT entities looking to secure data and ensure its availability during times of emergency could benefit from employing a data replication tool. Learn the ins and outs of data replication with this brief from the Center for Digital Government, and gain insight into how it works, what it offers and it's appeal to IT professionals.
Posted: 11 Feb 2014 | Published: 31 Dec 2012

Dell Software

PHD Virtual RTA Tool
sponsored by PHD Virtual
WEBCAST: This webcast provides information on a virtual Recovery time Actual (RTA) tool that will help you accurately calculate RTOs. Find out how your organization can achieve this goal (hint: no install is needed, just somewhere to run the executable).
Posted: 31 Jan 2014 | Premiered: Nov 11, 2013

PHD Virtual

Taking control of your finances: RECOVERY RULES: Your E-Guide to Best Practices for Data Protection and Recovery in Virtual Environments
sponsored by PHD Virtual
WHITE PAPER: This informative white paper is packed full of information on the challenges and benefits involved in adopting best practices for recovering data in virtual environments. From local data protection and recovery to data center migration, this resource will help your organization improve the value and responsiveness of your IT services.
Posted: 03 Feb 2014 | Published: 31 Dec 2013

PHD Virtual

Six Steps to Buying Data Loss Prevention Products
sponsored by Intel Security
EGUIDE: Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Intel Security

Enterprise Architects Challenged to Manage Data Explosion
sponsored by Red Hat
WHITE PAPER: This whitepaper explains how Red Hat Storage Server allows enterprises to quickly and confidently deliver business applications that minimize cost, complexity, and risk while increasing architectural flexibility.
Posted: 02 Jul 2014 | Published: 29 Nov 2013

Red Hat