STORServer boasts some of the industry’s leading backup, archive, and disaster recovery experts. Our white papers allow us to share industry insights and our own expertise on important data protection issues.
Some white papers share brand-neutral information to assist you when researching data protection solutions for your business or personal needs. Others provide more detailed information about STORServer product features and are intended for both existing and future customers.
Viability of an Enterprise Backup Appliance
Learn about why a backup appliance is a viable data protection option for your enterprise, including the five features of this data protection solution you can’t be without.
Over the last decade, integrated backup appliances have successfully shown that they are the next evolutionary step in the development of mature data protection solutions. More recently, enterprise-level data protection appliances can justifiably claim that they are the beginning of practical, affordable information management, in the sense of managing the information contained in the data.
In this white paper you will learn why a backup appliance is a viable data protection option for your business, 5 features of this data protection solution you can’t be without, and How it can be implemented into your business efficiently and effectively.
Protecting vCenter Server with STORServer VMB
Learn about how to protect and restore your VMware vCenter Server with STORServer Virtual Machine Backup (VMB).
In this white paper, our VP of Engineering, Steve Jensen, explains how to properly protect a VMware® vCenter Server that is running on a virtual machine by using STORServer® Virtual Machine Backup (VMB). This white paper also includes instructions for backing up vCenter Server and its Microsoft® SQL database, and restoring both when necessary.
The Guide to Backup Appliance Technology
Learn about backup appliance technology and why it is a viable option for your business’ data backup and recovery.
Data recovery solutions should always include three major areas for ensuring restores: backup, archive and disaster recovery. Buying technology to perform these three key functions separately creates huge divides in both management and successful implementation. In today’s world, there are a number of options for data protection, recovery and backup. In this white paper, our chairman, John Pearring, specifically talks about backup appliance technology and why it is a viable option for your data protection needs.
What is a STORServer Backup Appliance?
Learn about the full scope and functionality of a STORServer Backup Appliance in this white paper.
Every business has data management requirements revolving around the three data protection areas: backup, archive, and disaster recovery. Traditionally companies purchased each component separately. That is, a library, software, and server.
In this white paper, we talk about the innovative STORServer® Backup Appliance, designed as a single box that includes everything required for data protection.
The STORServer Backup Appliance Disaster Recovery Manager
Learn how to use our Disaster Recovery Manager to plan effectively in this white paper.
Disaster recovery is a crucial aspect of data backup and recovery. Disaster Recovery Manager (DRM) is a core component of the STORServer® Backup Appliance that offers various options to configure, control and automatically generate a Disaster Recovery plan file containing the information, scripts, and procedures needed to automate restoration and help ensure quick recovery of data after a disaster. In this white paper, our chairman, John Pearring, details the full scope and functionality of STORServer®’s Disaster Recovery Manager.
Data Encryption Technology -STORServer/IBM
Download this white paper to learn about IBM encryption technology and why it is important for your data.
IBM encryption technology is a feature that is available within IBM’s Tivoli Storage Manager (TSM) software, which ensures that data is secure by requiring a 256-bit Advanced Encryption Standard (AES). There are several approaches to data encryption through TSM including Application, Library, System, and Drive methods, which are discussed in this white paper.