ComputerWeekly.com Research Library

Powered by Bitpipe.com

Backups Research

  • RPO vs. RTO: Key Differences Explained

    Sponsored by: Parsec Labs

    However similar in acronym, the definitions of RPO and RTO differ, as do their computing needs, cost implications, and how to build them into a variety of resilience plans. Read this custom TechTarget e-guide on RPO vs. RTO: Key Differences Explained to set the record straight.

  • The Long Road Ahead to Ransomware Preparedness

    Sponsored by: Cohesity

    In this latest eBook from ESG, you’ll learn research-backed methods to mitigate and respond to evolving ransomware threats, recover your data, ensure business continuity, and refuse the ransom.

  • Validation Of Cohesity Accelerated Recovery From Ransomware

    Sponsored by: Cohesity

    In this report, Evaluator Group reveals how Cohesity covers the core tenets of ransomware protection, including using backup data to reduce the risk of production systems being compromised and getting the business back online as quickly as possible following an attack. Read the report to get the detailed analysis from Evaluator Group.

  • Computer Weekly – 4 October 2022: Putting APIs to work

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.

  • Computer Weekly - 26 July 2022: Inside Russia's Ukraine information operations

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we get the inside track on Russia's disinformation operations attempting to spread propaganda and cyber threats about the invasion of Ukraine. Our new buyer's guide looks at customer and employee experience management. And we assess 10 top Kubernetes backup suppliers. Read the issue now.

  • Evalueserve Ensures Data Availability And Security With Commvault

    Sponsored by: Commvault

    This case study discusses Commvault Complete Data Protection, a solution that encrypts data from different locations and recovers them based on the RPO and RTO of customers. Check it out here to learn the impact it can have on your organization.

  • Greater Ransomware Protection with Data Isolation and Air Gap Technologies

    Sponsored by: Commvault

    Commvault Complete™ Backup & Recovery software includes several layers and tools to protect and restore your data and applications. Check out this white paper to learn the key advantages and value of Commvault data protection with data isolation and air gapping in the fight against ransomware.

  • Buyer's guide to backup and recovery software

    Sponsored by: ComputerWeekly.com

    In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.

  • Infographic: 5 considerations before buying data center backup software

    Sponsored by: ComputerWeekly.com

    Trying to cross-correlate how one vendor implements a product feature and comparing it to another vendor's features can be a daunting task. Backup and recovery software moves data through almost the entire data center infrastructure, so implementing it, training staff and obtaining support for it is no small feat.

  • Data backup failure: Top 5 causes and tips for prevention Infographic

    Sponsored by: ComputerWeekly.com

    Backups are central to any data protection strategy, and they are critical to any disaster recovery plan. Unfortunately, backup failure is all too common. When you look at the reasons for failure, the same issues come up again and again. Download this exclusive infographic and find more about how to prevent backup failure.

  • Step-by-step disaster recovery planning guide

    Sponsored by: ComputerWeekly.com

    IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.

  • CloudCasa Offers Bring-Your-Own Storage for Kubernetes Backup

    Sponsored by: Catalogic Software

    CloudCasa now enables users to bring their own storage for backups alongside a handful of other new features, including security posture review capabilities and cross-cloud Kubernetes cluster restorations. Get the full scoop on these latest CloudCasa updates in the following TechTarget expert guide.

  • The vulnerability of backup in a predominantly remote + cloud world

    Sponsored by: ComputerWeekly.com

    Backup is fundamental to IT, but things have changed a lot recently. The pandemic has had a key impact in this. In this e-guide we look at the effects of the pandemic on backup, including the increased prevalence of remote working and use of the cloud.

  • Infographic: 10-step guide for testing backups

    Sponsored by: ComputerWeekly.com

    Creating and adopting a data backup plan is only the first step to protect enterprises against the possibility of a system failure. To achieve complete data protection, it is also necessary to establish a backup testing strategy. Here are ten recommendations to ensure that your organization's data will always be safe, secure and rapidly available.

  • Ransomware Questions to Ask for Optimal Backup Protection

    Sponsored by: Commvault

    PH

  • Why Is A Data Archiving Plan Important?

    Sponsored by: Beta Systems

    When paired with an over-arching data protection plan, a strong archiving strategy can provide storage capabilities that you can use over extended time frames and at a reduced cost. Access this e-guide to learn the 4-step process for setting up a data archival plan and to get briefed on the 6 incentives of having a plan in place.

  • In Your Data Archive Strategy, How Long is Long Enough?

    Sponsored by: Beta Systems

    It is important for organizations of all sizes to develop a strong data retention strategy that addresses the entire data lifecycle. Read this e-guide to distinguish which data is worth saving and discover the 5 components of a data strategy and how each component plays an important role in data archiving.

  • CloudCasa Backup-as-a-Service

    Sponsored by: Catalogic Software

    Explore this Evaluator Group product brief to learn about the usage and deployment of Catalogic CloudCasa and see what sets it apart from the competition.

  • CloudCasa - Kubernetes and Cloud Database Backup as a Service

    Sponsored by: Catalogic Software

    CloudCasa helps organizations quickly and easily backup their complex cloud applications from Kubernetes environments to cloud databases, without extensive prior expertise. Read on learn more about CloudCasa’s offerings, including free storage management via one centralized platform that makes it easy to back up and recover your critical data.

  • Ransomware: How to Protect and Recover Your Data From this Growing Threat

    Sponsored by: Catalogic Software

    Check out this white paper to learn how to protect and recover your data from the growing threat that is ransomware and discover how Catalogic Software for modern data protection may be able to help.

  • The Complete Guide to Migrating Your Enterprise Archiving System

    Sponsored by: Proofpoint

    Check out this e-book for a complete guide to migrating your enterprise archiving system and learn everything you’ll need to know about moving to the cloud.

  • The Lasting Impact of COVID-19 on the Data Backup Market

    Sponsored by: AWS

    Data backup and protection industry experts see many trends that emerged during the pandemic persisting throughout 2021 and beyond. This e-guide outlines some of the most impactful trends. Access it here to learn more about each trend and get a better handle on this ‘up in the air’ time for the backup market.

  • Data Protection Strategies and Initiatives for 2022

    Sponsored by: Veeam Software

    Veeam asked a group of 3,400 individuals how they define “modern” and “innovative” data protection solutions in this threat landscape. Discover these 9 defining cyber-attack-ready backup and data protection features in the following webcast, hosted by Veeam’s Jason Buffington and Chris Hoff.

  • Achieving Persistent Backup for Kubernetes

    Sponsored by: Catalogic Software

    Explore this expert guide to learn how persistent backup for Kubernetes can be achieved with CloudCasa and learn how new backup strategies are changing IT approaches to container management.

  • Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.

Browse by Report Type: Backups White Papers | Backups Multimedia | Backups IT Downloads

See more topics related to: Backups

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.