ComputerWeekly.com Research Library

Powered by Bitpipe.com

Backup Software Research

  • RPO vs. RTO: Key Differences Explained

    Sponsored by: Parsec Labs

    However similar in acronym, the definitions of RPO and RTO differ, as do their computing needs, cost implications, and how to build them into a variety of resilience plans. Read this custom TechTarget e-guide on RPO vs. RTO: Key Differences Explained to set the record straight.

  • The Long Road Ahead to Ransomware Preparedness

    Sponsored by: Cohesity

    In this latest eBook from ESG, you’ll learn research-backed methods to mitigate and respond to evolving ransomware threats, recover your data, ensure business continuity, and refuse the ransom.

  • Validation Of Cohesity Accelerated Recovery From Ransomware

    Sponsored by: Cohesity

    In this report, Evaluator Group reveals how Cohesity covers the core tenets of ransomware protection, including using backup data to reduce the risk of production systems being compromised and getting the business back online as quickly as possible following an attack. Read the report to get the detailed analysis from Evaluator Group.

  • Computer Weekly – 4 October 2022: Putting APIs to work

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.

  • 6 Steps For Resiliency Against Cyber Threats

    Sponsored by: Veritas

    There were 19 ransomware attacks every second in 2021, and many are reporting that costs will surpass $20 billion this year, according to SonicWall. Read this datasheet to discover how to integrate backup processes into your cyber resilience plan and view 6 ways Veritas’ solutions can protect you from these threats.

  • Buyer's guide to backup and recovery software

    Sponsored by: ComputerWeekly.com

    In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.

  • Infographic: 5 considerations before buying data center backup software

    Sponsored by: ComputerWeekly.com

    Trying to cross-correlate how one vendor implements a product feature and comparing it to another vendor's features can be a daunting task. Backup and recovery software moves data through almost the entire data center infrastructure, so implementing it, training staff and obtaining support for it is no small feat.

  • CloudCasa Offers Bring-Your-Own Storage for Kubernetes Backup

    Sponsored by: Catalogic Software

    CloudCasa now enables users to bring their own storage for backups alongside a handful of other new features, including security posture review capabilities and cross-cloud Kubernetes cluster restorations. Get the full scoop on these latest CloudCasa updates in the following TechTarget expert guide.

  • Why Is A Data Archiving Plan Important?

    Sponsored by: Beta Systems

    When paired with an over-arching data protection plan, a strong archiving strategy can provide storage capabilities that you can use over extended time frames and at a reduced cost. Access this e-guide to learn the 4-step process for setting up a data archival plan and to get briefed on the 6 incentives of having a plan in place.

  • In Your Data Archive Strategy, How Long is Long Enough?

    Sponsored by: Beta Systems

    It is important for organizations of all sizes to develop a strong data retention strategy that addresses the entire data lifecycle. Read this e-guide to distinguish which data is worth saving and discover the 5 components of a data strategy and how each component plays an important role in data archiving.

  • Veeam Backup & Replication v11 Demo Video – Ransomware Protection

    Sponsored by: Veeam Software

    Tune into this demo of Veeam Backup & Replication v11’s ransomware protection, where Michael Cade—Senior Technologist of Product Strategy at Veeam—will walk you through how to ensure backup compliance, safeguard your recoverability with backup copy immutability, and more.

  • Compass®for Edge Computing

    Sponsored by: Cobalt Iron

    With Cobalt Iron Compass, you can eliminate the complexity and costs normally associated with edge computing backup processes. Download this datasheet to find out how and to discover the essential benefits of leveraging this solution for edge computing backup.

  • COBALT IRON COMPASS®Data Protection for a Remote World

    Sponsored by: Cobalt Iron

    With Cobalt Iron Compass, customers can remotely manage, monitor, track, patch, and protect backup hardware and software—all from a single dashboard. Download the datasheet here to ensure your team can confidently keep your company’s data protection healthy, stable, and secure while working remote.

  • End-to-end Data Protection for the Modern Data Center with Cobalt Iron Compass

    Sponsored by: Cobalt Iron

    Cobalt Iron introduced their Compass platform to drive down cost and fully manage, configure, and maintain data protection processes for you. Access this ESG paper for an in-depth, 3rd party look at Cobalt Iron Compass and the benefits of its fully managed, immutable data and ransomware protection.

  • SD-WAN: The Most Critical Design Considerations

    Sponsored by: NBN

    Experts agree that SD-WAN is the most efficient way to direct network traffic throughout your WAN and lower costs, but you have to ensure you choose the option that meets your architecture, business and performance needs. Access this expert e-guide to delve into the most critical considerations for designing your SD-WAN architecture.

  • Your Microsoft 365 productivity cloud and the backup it deserves

    Sponsored by: Barracuda

    Check out this webcast to learn about Barracuda’s Cloud-to-Cloud Backup, SaaS that provides unlimited storage and retention for Microsoft Office 365 so you can ensure your workloads remain protected.

  • Computer Weekly – 20 October 2020: Why is IBM splitting in two and what does it mean for CIOs?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, IBM is splitting in two, hiving off its services business to focus on hybrid cloud – we examine what it means for CIOs. Our new buyer's guide looks at how intelligent workload management can cut cloud complexity. And we analyse how getting backup right can help tackle ransomware threats. Read the issue now.

  • Building the Optimal Storage Infrastructure

    Sponsored by: Fujifilm Recording Media USA, Inc.

    Access this white paper to learn about the modern tape renaissance happening right now, including understanding how to use tape in the 4 tiers of storage, a closer look at data classification by tier, and more.

  • Leading Dutch IT Services Provider Gets Complete Office 365 Protection

    Sponsored by: Barracuda

    After successive failures to protect data with their previous backup provider occurred, Truston knew they needed a more efficient off-site backup solution for their O365 data. Download this case study to discover the results of Truston investing in Barracuda Essentials.

  • Global provider and awarding body of British education consigns archaic data backup to history books.

    Sponsored by: Barracuda

    Access this case study to learn the 5 improvements that NCC Education saw in day-to-day archiving and backup operations when they implemented Barracuda Essentials.

  • How to Test Your Company’s Disaster Preparedness

    Sponsored by: Ensono Limited

    Companies that encounter the most surprises during a disaster are the ones that don’t test their BCDR plans or perform tests that aren’t as close to reality as possible. Access this data sheet to learn the questions you should be asking about your BCDR plan, why testing will make your BCDR plans stronger, and helpful scenarios to test.

  • Data Protection Strategies and Initiatives for 2022

    Sponsored by: Veeam Software

    Veeam asked a group of 3,400 individuals how they define “modern” and “innovative” data protection solutions in this threat landscape. Discover these 9 defining cyber-attack-ready backup and data protection features in the following webcast, hosted by Veeam’s Jason Buffington and Chris Hoff.

  • Achieving Persistent Backup for Kubernetes

    Sponsored by: Catalogic Software

    Explore this expert guide to learn how persistent backup for Kubernetes can be achieved with CloudCasa and learn how new backup strategies are changing IT approaches to container management.

  • Protecting Data in the Cloud

    Sponsored by: Datavita

    There are a variety of techniques that can be used for cloud backup and data protection. Access this e-guide to learn the advantages and disadvantages of 3 types of cloud backup.

  • Top Data Backup Tips Target Remote Protection and the Cloud

    Sponsored by: Datavita

    As the workforce went almost completely remote, cybersecurity has become a growing concern because home networks are typically less secure than business ones. Check out this e-guide to learn 5 backup tips to get through a time like no other.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.