You've requested...

Download this next:

MicroScope: Chart course to Covid-19 recovery

Five ways that disaster recovery changes in a pandemic
Covid-19 has changed IT. Previously, working remotely was a business continuity measure, but now it is the norm. That means disaster recovery has to adapt to new risks and new ways to respond. Stephen Pritchard reports

Different approaches to remote collaboration
The coronavirus has made working from home the new norm. Cliff Saran looks at how collaboration tools could work in the long term

How to address Covid-19 and maintain a healthy business
Christian Alvarez, senior vice-president of worldwide channels at Nutanix, shares his advice around adapting to the challenges posed by the coronavirus pandemic

These are also closely related to: "Remote Data Protection"

  • How equipment as a service (EaaS) transforms after-sales into revenue

    Previously, OEMs viewed after-sales service as a headache.

    But with the rise of customer-centricity, digitization and Industry 4.0, and the transition from CapEx to OpEx, after-sales support is no longer an afterthought—and what’s more, it can be up to 5 times more profitable than selling the machine itself.

    Read this e-book to maximize your after-sales profits and support, with easy-to-comprehend guidance to assist you along the way:

    • A practical framework to identify and capitalize on opportunities
    • How to transform after-sales into a revenue stream with equipment as a service (EaaS)
    • And examples illustrating how leading companies are profiting from technology in after-sales.

  • MicroScope – September 2021: Stepping forward after Covid

    The lasting impact of coronavirus

    Life is starting to move back towards a more normal footing, but will things ever be quite the same in the channel? Billy MacInnes reports

    Disaster recovery for SMEs

    Stephen Pritchard looks at key disaster recovery considerations for SMEs, including why backup is not enough, how to create a disaster recovery plan, best-practice DR testing and DR as a service

    CCaS is role model for contact centre of the future

    Anne-Meine Gramsma, chief commercial officer at ContactCenter4All, discusses the case for shifting to cloud-based contact centre-as-a-service solutions

Find more content like what you just read:

  • Research paper: How to evolve from insecure VPNs to true connectivity

    Against an increasingly complex backdrop of attacks, outages, and skills shortages, the pressure is on to deliver productive, truly connected hybrid environments. How are your fellow IT pros responding to this challenge? Discover how in this research paper Enterprise remote access and support: Deploying a modern secure connectivity solution.

    Download

  • Data backup failure: Top 5 causes and tips for prevention Infographic

    Backups are central to any data protection strategy, and they are critical to any disaster recovery plan. Unfortunately, backup failure is all too common. When you look at the reasons for failure, the same issues come up again and again. Download this exclusive infographic and find more about how to prevent backup failure.

    Download

  • Secure remote access: More vital than ever thanks to Covid-19

    We explore some of the minutiae of securing the remote workforce. First, infosec consultant Kevin Beaver, picks over some remote access security risks that have arisen during the pandemic. Then we explore the findings of a recent supplier report, which detailed how remote working burn-out is becoming a factor in increasing security risk.

    Download

  • How virtual desktops simplify end user computing during lockdown

    While desktop virtualisation is nothing new, the coronavirus pandemic has demonstrated the value of providing employees with seamless remote access. In this e-guide we look at the suitability of streaming applications via virtual desktop infrastructure to support employees working from anywhere.

    Download

  • MicroScope – December 2020: Reasons to be positive for 2021

    In this issue, discover why the continued digital transformation trend means 2021 is looking good for the channel. Also read how business processes can be optimised by adding artificial intelligence to the mix, and how the channel is looking at the challenge of sustainability

    Download

  • Guide to business continuity planning: COVID-19 and beyond

    As COVID-19 continues to spread, companies need to evaluate their ability to conduct business as usual during this time. Inside this comprehensive guide, we share best practices on how to defend your business against disruption, identify key business areas at risk and respond to business continuity planning challenges.

    Download

  • MicroScope – January 2021: Looking forward to the future

    In this issue of MicroScope, take a look at what the year ahead holds for the channel after a largely positive 2020. Also discover why IAM technology is so important for post-pandemic cloud computing, and what approaches are fundamental to finding business success

    Download

  • Disaster recovery has never been so easy or important

    Disaster recovery has never been more important because at the same time that digital transformation has made most modern enterprises entirely dependent on their IT systems to function, cyber attackers have stepped up their capabilities to go after sensitive data wherever it is found, with most IT leaders reporting major systems outages.

    Download

  • MicroScope – June 2021: A hybrid working world

    With hybrid working set to become the norm as the world starts to return to a more normal footing post-Covid, we look at how businesses are preparing for the new world of work. Also discover how to tackle the sustainability challenge, and have some key questions answered around handling bottlenecks caused by large volumes of data

    Download

  • CW Europe - March-May 2021: Nordic tech startups create blueprint for post-Covid working environment

    Business can learn lessons from Nordic tech startups to prepare employees to return to the office after Covid restrictions end.

    Download

  • Step-by-step disaster recovery planning guide

    IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.

    Download

  • Covid-19: Three steps to remote working effectiveness

    Staff are going to have to work from home, if they can, for the foreseeable future. We look at steps to ensure they remain fit and productive

    Download

  • Computer Weekly – 11 February 2020: How the Post Office caused so much misery

    In this week's Computer Weekly, after a landmark legal victory against the Post Office over a faulty IT system, campaigner Alan Bates shares his 20-year story of trials and triumph. Oracle is under fire over its cloud sales practices – we examine the claims. And we look at the sustainability challenges for datacentres.

    Download

  • Disaster recovery for VDI: 4 key questions to consider

    VDI shops should keep a few key considerations in mind when planning for virtual desktop disaster recovery. This e-guide explores four key questions to consider when setting up an IT disaster recovery plan.

    Download

  • MicroScope – November 2020: Simplify the path to partner programmes

    In this issue, discover how to navigate the complexity of channel partner programmes to best foster relationships, how business intelligence software is helping companies look beyond Covid-19, and why leaders are looking forward to 2021

    Download

  • Computer Weekly - 11 August 2020: Freezing digital history in the Arctic Circle

    In this week's Computer Weekly, we find out why GitHub is storing its historical open source code repositories on analogue film in the Arctic Circle. Our buyer's guide examines modern software development practices. And we hear how VR technology helped the UK build more ventilators to deal with the Covid-19 pandemic. Read the issue now.

    Download

  • MicroScope – May 2020: Staying connected

    In this issue, read about how the channel is helping customers stay connected during the pandemic, with Covid-19 raising hardware as businesses aim to provide technology for home workers. Also discover the benefits of SD-WAN and learn about the top compliance concerns for the coming year

    Download

  • Computer Weekly - 22 September 2020: Can Arm stay strong under Nvidia?

    In this week's Computer Weekly, we examine the implications of the controversial acquisition of UK chip leader Arm by US rival Nvidia. Black Lives Matter has raised awareness of social inequalities, but is the tech sector becoming more diverse? And we ask if business software can learn from the addictive nature of social apps. Read the issue now.

    Download

  • How Pure is Changing the Game in Disaster Recovery

    The recently announced Pure Protect™ //DRaaS (Disaster Recovery as a Service) is designed to make enterprise-level disaster recovery accessible and simple for businesses of all sizes. Powered by native AWS services, Pure Protect //DRaaS offers budget-friendly and highly effective disaster recovery solutions for VMware environments. Join us in this exclusive webinar to delve into the groundbreaking features of Pure Protect //DRaaS. Discover how you can take control of your disaster recovery costs, automate complex processes, and gain peace of mind, all with just a few clicks. Join us for the webinar and you will learn: What is Pure Protect //DRaaS? How does Pure Protect help control my disaster recovery costs? When will Pure Protect be available?

    Download

  • MicroScope – September 2020: Reach out to resellers

    In this issue, discover how the channel is making sure the human touch is maintained during the pandemic, with insight into how closer bonds can be developed and on how to maintain productivity. Also read about 'hybrid working' is set to shape the future of the workplace

    Download

  • MicroScope – June 2022: A return to face-to-face meetings

    With the world emerging from the pandemic, what role does the personal event and face-to-face meetings hold in business? Also read about the next step for the future of collaboration and communication services, and why there needs to be greater diversity across the channel

    Download

  • Live-video support tools: Changing the game for remote support

    With an explosion of IoT devices and continued growth of IT consumerization, market researchers see an opportunity for vendors with new-age remote support products. Uncover independent analysts' opinions of a live-video support tool and understand how it differentiates from competitors like Apple's FaceTime or Google Hangouts.

    Download

  • Why you should have a disaster recovery testing plan in place

    With this guide, gain a better understanding of why a disaster recovery testing plan is important, how to efficiently conduct tests, and some tools and terms that you will encounter along the way.

    Download

  • A Computer Weekly buyer's guide to on-site, off-site and cloud-based disaster recovery

    With businesses becoming increasingly dependent on data to function, being able to recover quickly from an IT systems failure is critical. In this 14-page buyer's guide, Computer Weekly looks at the various options available when implementing disaster recovery.

    Download

  • Computer Weekly - 9 March 2021: Are you ready to return to the office?

    In this week's Computer Weekly, a year after lockdown began, we look at employers' changing attitudes to returning to the workplace. We find out how the software developer community has coped during the Covid-19 pandemic. And we examine the cyber security concerns prompted by latest social media craze, Clubhouse. Read the issue now.

    Download

  • CW APAC: Expert advice on zero-trust security

    Zero trust is a security model that eliminates the traditional perimeter and assumes that no user or device can be trusted until proven otherwise. In this handbook, Computer Weekly looks at how enterprises can take a zero-trust approach to securing their network, devices and workforce.

    Download

  • CW APAC: Trend Watch - business response to coronavirus

    With countries the world over reeling from the Covid-19 coronavirus outbreak, which has meant sweeping changes both economically and socially, Computer Weekly looks at how firms in the Asia-Pacific region have adapted to what has so quickly become the new normal.

    Download

  • MicroScope – February 2021: The forecast on channel security

    MicroScope asks experts to share their opinions on what lies ahead for the channel in the security market, along with their predicitions for what upcoming threats to expect. Also read about how the managed service community helped to keep SMEs afloat during Covid-19, and how to arm the business with the best IAM tools for remote working

    Download

  • Accessing & Improving Backup, Data Protection, & Disaster Recovery Capabilities

    The resilience of organizations hinges on the strength of their backup, data protection, and disaster recovery capabilities. Don't wait until disaster strikes, fortify your organization's defenses against data loss and disruptions. Watch this webinar to assess and improve your backup, data protection, and disaster recovery capabilities, ensuring a resilient and secure future for your digital assets.

    Download

  • Computer Weekly - 24 March 2020: Making home working work - a guide for IT leaders

    In this week's Computer Weekly, with staff working from home during the coronavirus crisis, we look at three key technology areas to consider. We find out about a novel approach to teaching security awareness to users. And we examine the role of IT in corporate environmental, social and governance programmes. Read the issue now.

    Download

  • Infrascale Virtual Disaster Recovery Solutions Overview + Demo

    The next disaster may be tomorrow! Confidently protect your data and data operations with one of the fastest DRaaS solutions available. Be boot ready in minutes — with an all-in-one, easy-to-use, disaster recovery solution. Infrascale Backup & Disaster Recovery (IBDR) is a hybrid cloud disaster recovery solution that helps mitigate the downtime caused by server crashes, ransomware attacks, or natural disasters. IBDR does this through simple and fast backup and restore of files and folders, or full server and virtual machine failover and failback. With IBDR your data is always protected and always available… when you need it. In this webinar we will discuss: - Infrascale Virtual Disaster Recovery Solutions Overview - Demo

    Download

  • Secure your data in your cloud and SaaS applications

    Secure your data in cloud and SaaS apps with IBM Guardium DSPM. Automate discovery and classification of sensitive data, monitor for threats, and minimize compliance risks. Download this product overview to learn more.

    Download

  • Discover SaaS-based Disaster Recovery and Backup with HPE GreenLake

    With the unmatched power of continuous data protection (CDP), Zerto has been the industry leader in disaster recovery. Integrating Zerto into the HPE GreenLake platform now delivers SaaS-based disaster recovery on a globally accessible, hybrid-cloud platform with multi-site management and flexible billing. Watch now to learn how we are bringing Zerto to HPE GreenLake offering a SaaS-based DR solution. Navigate the service offerings inside the cloud console with us and discover how you can have full data protection when you pair HPE GreenLake for Disaster Recovery with HPE GreenLake for Backup and Recovery. You will learn: - The value of the HPE GreenLake Edge-to-Cloud Platform - How SaaS-based data protection works - The benefits of HPE GreenLake for Disaster Recovery and HPE GreenLake Backup and Recovery - The vision for HPE GreenLake for Data Protection - How to get hands-on with HPE GreenLake for Disaster Recovery and HPE GreenLake for Backup and Recovery Watch now to explore more of the SaaS-based data protection.

    Download

  • Virtualisation therapy for your disaster recovery plan

    We take a good look at how features and functionality built into popular virtualisation environments can help with disaster recovery planning, testing and execution.

    Download

  • Securing the digital frontier: Inside Dell and AMD’s zero trust approach

    Dell and AMD have created a cyber resilient architecture that utilizes a zero-trust strategy, embracing the idea that system components are vulnerable at each link in the chain and offering protection at every point. Download this product overview, which provides an analysis of how Dell and AMD's cooperative zero-trust can secure your business.

    Download

  • Critical Data Management for Your Journey to and Within the Cloud

    The hyper-growth and hyper-sprawl of data requires cloud strategies that simplify management and optimize protection of the data and applications that power your business. In this session, you will hear about any.cloud and how they combine Data management software with IBM Cloud to provider Cloud data management, and data security solutions in the cloud: - Simplify data protection and disaster recovery in your data center and in the cloud - Enable long-term data retention using Cloud Object Storage integration - Deepen the integration into enterprise workloads such as VMware, IBM Cloud, and Azure - Enhance ransomware attack prevention and regulatory compliance About any.cloud: any.cloud is market leading in DR and data availability in the cloud. any.cloud offers its solutions globally in 60+ datacenters. any.cloud is ISO 27001 certified, and so are the datacenters. Since 1998, any.cloud has been helping its customers increase their business and is committed to being the chosen partner, when it comes to cloud services. We have come a long way since then, constantly improving, refining and developing our products with new solutions to promote business. The team at any.cloud work intensely on updating our services, because we care about your business as much as you do and we specialize in building expert services to maximize the potential of your business. We are always looking to the future and push the limits. We create a strong foundation for growth to support our partners. We do not stop until you are happy with the solution and we have solved your problem.

    Download

  • Enabling Data Protection, DRaaS, & Disaster Recovery

    For years, the data protection and disaster recovery markets have undergone both evolution and revolution as new products jump onto the scene while others mature and grow. This rapid pace of innovation has resulted in more end user choice than ever before, which means that IT pros and decision makers require regular education to ensure that they stay abreast of current products and trends. To help you learn about the latest and most innovative data protection and disaster recovery solutions, this MegaCast from ActualTech Media explores how Zerto can help make data protection easy and disaster recovery fast, reliable, and efficient.

    Download

  • MicroScope – October 2020: Get in touch with remote network security

    In this issue, find out how the security channel has been working to ensure the network safety of remote workers during the pandemic. Also read about how flash-based storage is being enhanced to include ground-breaking technology using helium and DNA, and discover how data is the key to encryption

    Download

  • Citrix DaaS Disaster Recovery with Nutanix

    Many of the Citrix DaaS workloads are either unprotected or under-protected. Budget constraints and deployment complexity prohibit enterprises from protecting their Citrix DaaS deployments, which can result in significant downtime during disaster incidents. Join this session to learn how Nutanix and Citrix have built a solution together to provide you the functionality to back up critical data, protect applications, and survive disasters efficiently.

    Download

  • Disaster recovery and business continuity: Essential guide

    Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.

    Download

  • Data Protection, Disaster Recovery & DRaaS Megacast

    The “new normal” is an expectation of 100% uptime of applications and long-term retention of data. Coupled with massively growing data sets, IT organizations are struggling to meet these expectations. As an IT professional, you are looking for innovative data protection and disaster recovery solutions to overcome these hurdles, but where do you start? You simply don’t have time to research and compare the latest software and hardware solutions available for enterprise data protection. Leave the hard work to us and join us on the Data Protection, Disaster Recovery, and DRaaS Megacast! This single event will help you learn about the latest and most innovative data protection and disaster recovery solutions. In this educational event, you’ll learn what makes each solution unique as well as how they improve your company’s reliability, availability, and efficiency. You’ll learn how each vendor makes data protection easy and how they make disaster recovery fast, reliable, and efficient. Register now to join us for this fast-paced, fun, and prize-filled event!

    Download

  • 5 Steps to Securing Your Terminal Emulator

    Learn why IT leaders can’t afford to disregard legacy security any longer—and what steps to take next. IBM i and IBM Z systems need to be a central part of an organization’s IT security strategy. After all, they power many businesses’ core applications—and those core applications need protecting! The primary obstacle to securing the IBM i/Z is that most legacy applications were built at a time when cybersecurity wasn’t even an issue. The transition to an internet-connected system has opened it up to new risks. Ensuring the security of your legacy systems is to start including them as a part of your security plans and policies. That’s where your terminal emulation solution comes in. At most IBM i/Z-powered organizations, terminal emulators are still used to access core business applications running on IBM i or IBM Z. In this webinar, we lay out the five steps your organization should take to secure your terminal emulator. Even if you’re confident that your terminal emulator is secure, consider this webinar to be a checkup—a confirmation that you’re doing everything right.

    Download

  • 5 Steps to Securing Your Terminal Emulator

    Learn why IT leaders can’t afford to disregard legacy security any longer—and what steps to take next. IBM i and IBM Z systems need to be a central part of an organization’s IT security strategy. After all, they power many businesses’ core applications—and those core applications need protecting! The primary obstacle to securing the IBM i/Z is that most legacy applications were built at a time when cybersecurity wasn’t even an issue. The transition to an internet-connected system has opened it up to new risks. Ensuring the security of your legacy systems is to start including them as a part of your security plans and policies. That’s where your terminal emulation solution comes in. At most IBM i/Z-powered organizations, terminal emulators are still used to access core business applications running on IBM i or IBM Z. In this webinar, we lay out the five steps your organization should take to secure your terminal emulator. Even if you’re confident that your terminal emulator is secure, consider this webinar to be a checkup—a confirmation that you’re doing everything right.

    Download

  • 5 Steps to Securing Your Terminal Emulator

    Learn why IT leaders can’t afford to disregard legacy security any longer—and what steps to take next. IBM i and IBM Z systems need to be a central part of an organization’s IT security strategy. After all, they power many businesses’ core applications—and those core applications need protecting! The primary obstacle to securing the IBM i/Z is that most legacy applications were built at a time when cybersecurity wasn’t even an issue. The transition to an internet-connected system has opened it up to new risks. Ensuring the security of your legacy systems is to start including them as a part of your security plans and policies. That’s where your terminal emulation solution comes in. At most IBM i/Z-powered organizations, terminal emulators are still used to access core business applications running on IBM i or IBM Z. In this webinar, we lay out the five steps your organization should take to secure your terminal emulator. Even if you’re confident that your terminal emulator is secure, consider this webinar to be a checkup—a confirmation that you’re doing everything right.

    Download

  • 5 Steps to Securing Your Terminal Emulator

    Learn why IT leaders can’t afford to disregard legacy security any longer—and what steps to take next. IBM i and IBM Z systems need to be a central part of an organization’s IT security strategy. After all, they power many businesses’ core applications—and those core applications need protecting! The primary obstacle to securing the IBM i/Z is that most legacy applications were built at a time when cybersecurity wasn’t even an issue. The transition to an internet-connected system has opened it up to new risks. Ensuring the security of your legacy systems is to start including them as a part of your security plans and policies. That’s where your terminal emulation solution comes in. At most IBM i/Z-powered organizations, terminal emulators are still used to access core business applications running on IBM i or IBM Z. In this webinar, we lay out the five steps your organization should take to secure your terminal emulator. Even if you’re confident that your terminal emulator is secure, consider this webinar to be a checkup—a confirmation that you’re doing everything right.

    Download

  • 5 Steps to Securing Your Terminal Emulator

    Learn why IT leaders can’t afford to disregard legacy security any longer—and what steps to take next. IBM i and IBM Z systems need to be a central part of an organization’s IT security strategy. After all, they power many businesses’ core applications—and those core applications need protecting! The primary obstacle to securing the IBM i/Z is that most legacy applications were built at a time when cybersecurity wasn’t even an issue. The transition to an internet-connected system has opened it up to new risks. Ensuring the security of your legacy systems is to start including them as a part of your security plans and policies. That’s where your terminal emulation solution comes in. At most IBM i/Z-powered organizations, terminal emulators are still used to access core business applications running on IBM i or IBM Z. In this webinar, we lay out the five steps your organization should take to secure your terminal emulator. Even if you’re confident that your terminal emulator is secure, consider this webinar to be a checkup—a confirmation that you’re doing everything right.

    Download

  • 5 Steps to Securing Your Terminal Emulator

    Learn why IT leaders can’t afford to disregard legacy security any longer—and what steps to take next. IBM i and IBM Z systems need to be a central part of an organization’s IT security strategy. After all, they power many businesses’ core applications—and those core applications need protecting! The primary obstacle to securing the IBM i/Z is that most legacy applications were built at a time when cybersecurity wasn’t even an issue. The transition to an internet-connected system has opened it up to new risks. Ensuring the security of your legacy systems is to start including them as a part of your security plans and policies. That’s where your terminal emulation solution comes in. At most IBM i/Z-powered organizations, terminal emulators are still used to access core business applications running on IBM i or IBM Z. In this webinar, we lay out the five steps your organization should take to secure your terminal emulator. Even if you’re confident that your terminal emulator is secure, consider this webinar to be a checkup—a confirmation that you’re doing everything right.

    Download