Organizations have high expectations of data protection professionals to return applications to production. In the virtual environment in particular, cost effective tools exist to help meet those objectives. But which one should you use, and when? After all, not all…
