ComputerWeekly.com Research Library

Powered by Bitpipe.com

Continuous Data Protection Research

  • 7 NAS encryption best practices to protect data

    Sponsored by: TechTarget ComputerWeekly.com

    NAS encryption helps organisations prevent unauthorized individuals from gaining access to confidential data. However, the process is complex and, if done incorrectly, can put sensitive data at risk. Here are seven NAS encryption best practices to protect your data.

  • 4 data privacy predictions for 2022

    Sponsored by: TechTarget ComputerWeekly.com

    Over the last two years, businesses and employees saw their workspace change forever with the rise of hybrid and remote work. All of a sudden, data privacy became a top priority for enterprises all over the world. As attention continues to build, here are four data privacy predictions for 2022 and beyond.

  • Digital identity strategies to enhance data privacy and protect networks

    Sponsored by: TechTarget ComputerWeekly.com

    The rise of digital transformation, cloud adoption and remote work has spurred an evolution of identity in the workplace. In this e-guide, read more about the convergence of identity management and security, how to identify the main access management risks, and how cloud adoption is shaping digital identity trends.

  • The components and objectives of privacy engineering

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, read more about the differences and similarities of privacy by design and privacy engineering, the main components and objectives of privacy engineering, and how privacy engineers can help promote innovation and trust among employees and clients.

  • In data privacy we trust: building a strong information protection strategy in the hybrid era

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, find out what it takes to build up a strong data privacy practice in your organisation, the differences between data protection and data privacy, as well as how cyber security and privacy teams can work together to better protect data from prying eyes.

  • Infographic: 5 cybersecurity predictions for 2022

    Sponsored by: TechTarget ComputerWeekly.com

    Cybercrime showed no sign of slowing down in 2021 and enterprises continue to fall victim to cyberattacks, with gangs targeting larger organizations with increasingly large demands. In good news, we can always take stock of the recent past and know what to prepare for. In this infographic, we point out five forecasts for cybersecurity in 2022.

  • Top 10 Backup Challenges and Expert Recommendations to Address Them

    Sponsored by: TechTarget Storage

    Access this expert eGuide to learn about the backup challenges that companies struggle with today, and how to address them.

  • How to Handle Data Management in the Cloud

    Sponsored by: TechTarget Data Backup

    Data management in the cloud enables organizations to manage data between clouds and in conjunction with on-premises storage. Access this handbook to learn 3 cloud-based data management challenges, how to make cloud data work to your benefit, how to use multi-cloud data management and protection, and more.

  • The keys to a successful business continuity and DR strategy

    Sponsored by: Citrix

    Developing a business continuity and DR strategy usually involves an extensive amount of information gathering, combined with piecing together products and services that work as a collective. Check out this e-guide to learn the differences between business continuity and DR, discover 4 approaches to a successful combined strategy, and much more.

  • Business Continuity E-Guide

    Sponsored by: Citrix

    Check out this e-guide for an overview of business continuity essentials, including access to a free BC planning template, discussions on how cybersecurity and business continuity can collaborate to simplify recovery, and 10 risks to monitor.

  • Arcserve Unified Data Protection Cuts Downtime for Cloud DR

    Sponsored by: arcserve

    In this expert-guide, learn about Arcserve's new Unified Data Protection system, which the claim delivers a five-minute recovery time objective and 15-minute recover point objective for data, and figure out if this service is fast enough for you.

  • What are Continuous Data Protection Software's Pros And Cons?

    Sponsored by: Dell EMC and Intel®

    Click inside this expert-guide and learn the pros and cons of continuous data protection software.

  • Dealing with Data Growth: Storage and Backup Strategies

    Sponsored by: Simplify IT

    This e-guide, from SearchDataBackup.com, examines how the proliferation of business information has contributed to the current state of data protection.

  • Expert Guide to Data Protection: New Capabilities, Remaining Gaps, and Answers to Customer FAQ

    Sponsored by: Symantec Corporation

    This e-guide follows the evolution of data protection and points out the latest capabilities and remaining gaps in the marketplace. Read on now to find out whether conventional methods are keeping pace and which data protection processes should be treated separately.

  • InMage Provides Solid Defense for Tampa Bay Lightning’s Mission-Critical Data and Applications

    Sponsored by: InMage Systems

    This short case study explores how the pro ice hockey team, Tampa Bay Lightning, easily and affordably implemented one industry-leading backup and recovery software solution that leverages the advantages of disk-based data protection to provided application-aware recovery that can meet both remote and local requirements. Read on to learn more.

  • HP Simply StoreIT Solutions for Data Protection Brochure

    Sponsored by: Hewlett Packard Enterprise

    This brief resource showcases a data protection model that helps ensure you overcome common data protection challenges with affordable, reliable, and proven backup and data protection solutions that support your specific needs today and into the future.

  • Storage Magazine: October

    Sponsored by: TechTarget Storage

    In the October 2013 issue of Storage magazine, our experts explore how to build a better backup with the help of new modern apps, highlight 10 storage tips for virtual desktops and much more!

  • Storage Magazine - September 2013

    Sponsored by: Dell and VMware

    This expert resource delves into storage decisions events that deliver practical advice and technical guidance from the world's most renowned storage experts. These events offer tips and vendor-neutral advice for tackling current issues and help you avoid falling behind by providing exclusive insight into market trends and emerging technologies.

  • Taneja Group Solution Brief: High-End Storage For Everyone

    Sponsored by: Exablox

    This white paper explores what SMB and departmental storage buyers should both require and expect from storage solutions to meet their business goals, and how traditional mid- market storage based on old technologies can fall short. Dive in to discover real-life experiences, benefits, cost effectiveness and ease of management

  • Expert Overview: New Data Protection Strategies and Success Metrics

    Sponsored by: EMC Corporation

    This e-guide explores the basic philosophy behind continuous data protection and how it's making its way into the current backup landscape.

  • Disaster Recovery Today: Top 3 Vendors and 2 New Tactics

    Sponsored by: EMC & Arrow

    This E-Guide examines the factors driving the recent focus on data protection and points out the top three vendors they are turning to as they evaluate and invest in new recovery software.

  • Neverfail Heartbeat Failover Engine

    Sponsored by: Neverfail

    Check out this white paper to explore a business continuity solution that continuously keeps your applications up in the face of any threat to system availability.

  • Data Protection for the Enterprise vs. SMB: Disk, CDP, Cloud and Other Options

    Sponsored by: Axcient

    This E-Guide explores the role that scale plays in determining the impact of a disruption and discusses enterprise data protection requirements that apply to SMBs. Find out why disk, CDP and cloud backup offerings are worth further consideration and learn how hybrid appliances are making DR quick and cost-effective.

  • Backup Basics: Disk, CDP and Cloud

    Sponsored by: Barracuda Networks

    Check out this exclusive SearchDataBackup.com E-Guide for an expert look at backup approaches including continuous data protection (CDP), cloud and disk.

  • American Equipment, Symantec Technologies and Wasatch Software Success

    Sponsored by: Symantec Corporation

    Facing a significant growth in data, American Equipment, Inc. needed to improve its data protection and backup. In this case study learn how Symantec Technologies and Wasatch Software were able to meet these needs with Symantec Backup Exec.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.