You've requested...

8 Advantages of Disaster Recovery in the Cloud

If a new window did not open, click here to view this asset.

Download this next:

Backup fundamentals in the age of cloud

In backup many things are pretty much as they have always been. But many things have also changed, with the latest being the advent of the cloud. This brings the possibility of the cloud as a backup target but also the need to backup applications that run in the cloud.

In this e-guide we look at backup fundamentals like choosing incremental or differential backup as well as using snapshots to replace traditional backup. We also provide an overview of strategic considerations for backup in the age of the cloud as well as surveys of the key backup products for SMEs and enterprise deployment.

These are also closely related to: "8 Advantages of Disaster Recovery in the Cloud"

  • Endpoint Backup: File Sync Helps, But Is It Enough?

    Today, the majority of enterprise users make use of multiple devices. Although backups have been an important part of IT operations for many years, mobile and other endpoint devices pose a number of unique challenges. Such devices vary by make and model, operating system, and the type of data that is stored on the device. Some devices aren’t even under the organization’s direct control. Furthermore, such devices may only be connected to the network on an intermittent basis.

    This resource explains that because of these and other challenges, administrators must adopt new policies and techniques if they want to protect the data residing on mobile devices. Access this three-part guide to learn how to effectively implement mobile and endpoint backups in your organization.

  • Mobile Device Data Protection: Key Findings and Players in the Market

    In recent years, the use of endpoint computing devices in the workplace has skyrocketed. In fact, a recent survey revealed 84% of companies are experiencing moderate to significant growth in the use of these devices.

    As smartphones and laptops assume a greater role in today's businesses, IT pros must take the appropriate measures to protect the corporate data that is stored on them.

    This E-Guide quantifies the costs of a lost device, from both a cost and security standpoint. Read on to find out how your peers are leveraging data loss prevention technologies to minimize the risk and impact of data breaches and access an expert analysis of the key players in the mobile data protection marketplace.

Find more content like what you just read:

  • Computer Weekly - 24 January 2023: BBC under scrutiny over its digital strategy

    In this week's Computer Weekly, the BBC faces in-depth scrutiny over its digital plans – we take a look at progress. Do you need to keep data forever? We examine the technologies behind infinite storage. And we find out about the digital transformation challenges in vehicle dealerships. Read the issue now.

    Download

  • How to best handle endpoint device backup

    Remote backup of data on endpoint devices like laptops and smart phones is a challenge for IT staffs. This Drill Down takes a look at remote backups today, focusing on the challenges and solutions available to address endpoint device backup.

    Download

  • A Computer Weekly buyer's guide to on-site, off-site and cloud-based disaster recovery

    With businesses becoming increasingly dependent on data to function, being able to recover quickly from an IT systems failure is critical. In this 14-page buyer's guide, Computer Weekly looks at the various options available when implementing disaster recovery.

    Download

  • Essential Guide to Disaster Recovery

    With the mushrooming of disaster recovery technology in the past few years, your excuses for not having a DR plan are falling away. Use this Essential Guide to learn how to take advantage of new technologies that make the disaster recovery provision and planning process easier than it’s ever been.

    Download

  • Disaster recovery has never been so easy or important

    Disaster recovery has never been more important because at the same time that digital transformation has made most modern enterprises entirely dependent on their IT systems to function, cyber attackers have stepped up their capabilities to go after sensitive data wherever it is found, with most IT leaders reporting major systems outages.

    Download

  • MicroScope – February 2023: Opportunities in security

    In this month's issue, we explore the possibilities for the channel to make its mark with security services, and take a closer look at whether the ChatGPT revolution brings more benefits or negatives with it

    Download

  • DRaas and the key decision points in DR-as-a-service

    In this e-guide we look at the key decisions you'll need to make about the blend of DRaas your organisation wants, which of the key cloud providers are best for which elements of DR service delivery, the pros and cons of moving elements of disaster recovery to the cloud and which to keep closer to home, and the 12 key steps to DRaas deployment.

    Download

  • MicroScope – March 2022: Taking the steady approach to becoming an MSP

    In this issue, take a closer look at the risks and pitfalls on the journey to becoming a manages services provider, read about expected ongoing change and consolidation in the year ahead, and discover what experts have to say on the skills and supply chain shortages

    Download

  • Step-by-step guide to implementing cloud-based DR

    In this exclusive e-guide, expert Brien Posey explains 6 steps and factors to consider when implementing cloud DR. Learn how to adapt this technology to fit your specific needs and find out more about each of these key considerations.

    Download

  • Which DRaaS approach is best

    Managed DRaaS, Assisted DRaaS, or self-service DRaaS, which approach is the best for you? Let's drill into these three major DRaaS provider options, what they offer and points to ponder with each approach.

    Download

  • Top 10 cloud stories 2018

    While cloud has established itself as the preferred way for many enterprises to consume IT resources, organisations in some vertical markets have taken markedly longer to come round to its charms. With this as a backdrop, Computer Weekly takes a look at the top 10 cloud stories of 2018.

    Download

  • Computer Weekly – 17 April 2018: Can China's Alibaba successfully take on the US public cloud giants?

    In this week's Computer Weekly, as Chinese cloud provider Alibaba grows its presence in Europe, we ask if it can compete with the US public cloud giants. A government plan to move data policy has caused controversy among Whitehall digital experts – we find out why. And we assess the use of cloud for disaster recovery. Read the issue now.

    Download

  • E-Guide: Expert Strategies for Virtualization Capacity Planning

    Explore this e-guide to learn about common mistakes and issues overlooked when it comes to capacity planning. In addition, find out the best ways to approach capacity planning in your virtual environment.

    Download

  • Secure your critical data in case of a ransomware breach

    Last year, more than 15 ransomware attacks occurred every second, exceeding 493 million attacks globally. Prevention itself is no longer enough. Download this white paper to learn how you can implement a data recovery strategy with Veritas and AWS, ensuring that the data you need is safe even in case of disaster.

    Download

  • Focus: Disaster recovery planning and virtualisation

    We take a good look at how features and functionality built into popular virtualisation environments can help with disaster recovery planning, testing and execution.

    Download

  • Backup still fundamental but the cloud changes things

    In this e-guide we round up the key ways backup has changed since tape was king and look at developments such as backup appliances, the use of the cloud as a backup target and even the need for backups to protect your workloads in the cloud.

    Download

  • Why you should have a disaster recovery testing plan in place

    With this guide, gain a better understanding of why a disaster recovery testing plan is important, how to efficiently conduct tests, and some tools and terms that you will encounter along the way.

    Download

  • Antimalware IT Checklist: Decision Time Part 3

    This is the third piece in SearchSecurity.com's three-part guide on antimalware products. This expert asset, written by security researcher Mike Rothman, takes a deep dive into the requirements that should seal the deal in terms of final considerations when purchasing an antimalware solution.

    Download

  • Your expert guide to endpoint security

    Achieving the best endpoint protection, given the rise of mobility and increase in the sophistication of the attacks, is more complicated than ever. Learn from industry experts and get up to speed on achieving the best endpoint protection.

    Download

  • AI proves value in HR, but handle with care

    In this e-guide, discover how the allocation of work by algorithm might have advantages for workers as well as employers, how AI is proving its value for HR and how data analytics is being used to support expansion and development.

    Download

  • Multi cloud backup and recovery best practices

    User concerns about data availability and safety continue to grow. And despite being in the early phases of the multi-cloud movement, experts have provided some good guidelines to users to help them implement this additional layer of protection. This guide details multi-cloud backup and recovery best practices, and presents potential pain points.

    Download

  • E-Guide: Physical Security Awareness and Smartphone Security Policy

    In this e-guide, gain key insight for establishing better physical security and employee awareness for device usage. View now to uncover best practices and technologies that can help you lock down devices, and how to put device responsibility back in the hands of the employee.

    Download

  • Disaster recovery and business continuity: Essential guide

    Not only can a solid business continuity strategy protect organisations from reputational damage and lost trade, but – for those operating in regulated industries – it can also prevent firms being hit with downtime-related enforcement action.

    Download

  • SIEM IT Decision Center- Checklist #1

    If you are looking into deploying your own SIEM system, read this E-Guide to better understand features and functions, how to evaluate deployment and management costs, and the latest trends regarding SIEM platforms.

    Download

  • Data Center Servers and Storage E-Book Chapter 4: Reallocating Unused Server and Storage Hardware

    With a bit of planning, a specific tiering-out of your system priorities and a dash of virtualization, you can breathe new life into your old servers -- even as you bring in replacements with all of their powerful new capabilities. Read this e-book to learn more.

    Download

  • Expert Checklist: 11 Steps for Aligning Your BC/DR Program with Business Needs

    This e-guide provides an expert checklist for developing a successful business continuity program, designed with the specific needs of your organization in mind.

    Download

  • 10 FAQs answered about Prisma Access

    Needing to secure their remote and hybrid workforces, many organizations have invested in network security tools. This overview introduces one such tool, Palo Alto Networks Prisma Access, and answers 10 FAQs about the product. Keep reading to discover how Prisma Access harnesses the power of next-gen CASB, FWaaS, ZTNA and cloud SWG.

    Download

  • Protecting the future of your business with cyber resiliency

    The interconnected nature of digital business has brought rapid growth organizational unity but has also left data uniquely exposed. This white paper focuses on the importance of integrating your Veritas and Microsoft solutions, while adopting a multi-layered cybersecurity strategy. Read on to learn more.

    Download

  • Eguide: Top 10 risks in cloud computing and how to stay compliant

    Transitioning to the cloud can come with numerous security risks and compliance issues because cloud computing does not adhere to many business regulations and standards. Access this expert e-guide to discover how you can overcome the top ten risks of cloud computing.

    Download

  • How to implement a successful DR plan for the cloud

    This e-guide recaps the keys to successful DR planning and explains why more and more companies are incorporating the cloud into this essential process. Discover six questions you should ask when evaluating providers and explore three types of cloud-based solutions to consider. Read on to learn more.

    Download

  • VM Backup Methods for Quick VM Recovery

    Learn two essential approaches for getting a server back online in just minutes – the failover method and data prioritization and discover which strategy trades slightly more downtown for less up-front data storage waste.

    Download

  • Computer Weekly – 4 February 2020: Ethics and the internet – how to build a web we can trust

    In this week's Computer Weekly, we examine the steps being taken to ensure the future development of the web is ethical and open. We discuss the UK's cyber security skills gap and ask what more the government should be doing. And we find out how cloud technology could help people stop smoking. Read the issue now.

    Download

  • Expert best practices for data center management

    This expert e-guide offers information on how data center infrastructure management tools can benefit your organization. It also offers information on how to overcome the limitations of DCIM. Access now to gain insight into topics like:using DCIM tools for energy management, DCIM challenges and limitations and more.

    Download

  • Public cloud in India: A guide to building digital resiliency

    In this e-guide, read more about the rise of India as a cloud powerhouse, what major suppliers are doing in the market and an expert's take on the importance of having a cloud operating model to drive business outcomes from cloud initiatives.

    Download

  • E-Guide: How to Determine if VDI is Right for your Company and Ways to Overcome Common Annoyances

    Even though the thought of virtual desktops has caught everyone's attention, the actual number of installations remains small. This expert e-guide from SearchVirtualDesktop.com explains how organizations can determine whether this technology is right for them by calculating the return on investment from VDI.

    Download

  • MicroScope – September 2021: Stepping forward after Covid

    In this issue, discover what the lasting impact of Covid-19 is likely to be as the channel emerges into a post-pandemic world. Also discover more about disaster recovery for SMEs and how best to make a plan to protect your business, and read about an uptick in cloud-based contact centre-as-a-service solutions

    Download

  • CW APAC – October 2020: Trend Watch: Storage

    In this handbook, Computer Weekly takes a peek at future storage technologies, such as helium and DNA, and offers some valuable tips on how to keep cloud storage costs under control. Read the issue now.

    Download

  • How to balance cost vs. convenience during replication implementation

    Access this exclusive disaster recovery handbook about replication for insight from industry pros such as Brien Posey and Paul Kirvan, and learn about replication tools today, asynchronous vs. synchronous replication, and replication for virtual machines. Read on to arm yourself with the replication know-how needed to navigate this space in 2013.

    Download

  • Consumerization 101: Defining & Enforcing a Successful BYOD Policy

    This E-Guide from SearchConsumerization.com explores the top concerns of consumerization and BYOD in and discusses how to create a successful BYOD policy that will help mitigate the risks. In addition, get the answers to today's top consumerization questions and learn how cloud storage can be a life-saver in the event of device loss/theft.

    Download

  • SIEM IT Decision Center- Checklist #2

    This white paper presents SIEM use cases and technical information for security and compliance pros to better understand the threat landscape and help move their RFP process forward.

    Download

  • Computer Weekly – 18 September 2018: The importance of smartphone sustainability

    In this week's Computer Weekly, we examine the considerable environmental footprint of the mobile phone industry and ask what can be done to improve it. We find out how disaster recovery as a service (DRaaS) is being used and when it's an option for businesses. And we look at some of the UK's emerging fintech success stories. Read the issue now.

    Download

  • 8-page paper: Why use wireless WAN for branch networks?

    How can you mitigate the risk of downtime for your branch network? This 8-page white paper by Cradlepoint, “6 Wireless Failover Strategies for Enterprise Branch Continuity,” provides expert recommendations. Download the paper to unlock those insights.

    Download

  • Inside the successful projects that rely on NoSQL database applications

    Check out this white paper for a look inside the modern challenges that NoSQL databases address, as well as when to choose NoSQL over relational and why.

    Download

  • Modern Data Protection Is More Than Backup

    This exclusive e-book takes a look at how data protection is changing today. Download now to learn how and why backup is converging with other IT technologies and how copy data management differs from traditional backup.

    Download

  • How T-Mobile prevents network downtime in stores

    Tap into this case study to find out how T-Mobile retail stores prevent network downtime.

    Download

  • MicroScope – October 2019: What's next for the channel?

    The fourth quarter is the busiest in the channel, and we get an idea of which technologies should be selling strongly

    Download

  • How PANDORA (& other retailers) achieved networking success

    What unique networking challenges do retailers encounter? Along with unpacking 7 of them, including connectivity for pop-up stores and out-of-band management for branch continuity, this 17-page e-book explores retailers’ stories of networking success. Download the book to learn about the journeys of PANDORA, T-Mobile and more.

    Download