ComputerWeekly.com Research Library

Powered by Bitpipe.com

Backups Research

  • Data Backup Recovery

    Sponsored by: Magna5

    Watch this short video to learn about Magna 5’s cloud-based data backup and disaster recovery solution which protects your most critical data and systems no matter where they are located – on-prem or in the cloud.

  • Ransomware Recovery, Rubrik Special Edition

    Sponsored by: Rubrik

    Dive into this Ransomware Recovery e-book to learn a sensible approach to recovering quickly from ransomware attacks that can’t be avoided.

  • The Gorilla Guide to Backup & Recovery Best Practices

    Sponsored by: Rubrik

    Check out this e-book for backup & recovery best practices including why traditional backup/DR could be failing you, how to fight the scourge of ransomware, and what it takes to stay one step ahead of the bad guys.

  • Top 10 “Must Have” Qualities for a Modern Backup and Recovery Solution

    Sponsored by: Rubrik

    Check out this white paper to learn 10 “must have” factors required for a modern backup and recovery solution based on the experience of real users, who write about their experience with Rubrik on IT Central Station.

  • How to Develop a Ransomware Remediation Plan

    Sponsored by: Rubrik

    Explore this e-book to learn what to look for in a backup and recovery solution and find out how to build an effective ransomware remediation plan to ensure you can quickly respond to a cyberattack without missing a beat.

  • Empowering SQL Server DBAs with Modern Backup & Recovery

    Sponsored by: Rubrik

    Check out this e-book to learn how choosing data protection that is built on modern data backup and recovery technology can help businesses support strategic initiatives while empowering DBAs.

  • Managing & Recovering Microsoft 365 Data

    Sponsored by: Rubrik

    Dive into this e-book for an overview on how to think about protecting your organization’s Microsoft 365 data, from looking at who is responsible for data protection and common misconceptions to the most important criteria for picking a backup solution.

  • Empowering Oracle DBAs with Modern Backup & Recovery

    Sponsored by: Rubrik

    Dive into this e-book to learn why digital transformation requires data resiliency, what’s blocking backup and recovery modernization efforts, 7 steps for empowering DBAs with backup, and how Rubrik can help.

  • Veeam Backup & Replication v11 Demo Video – Ransomware Protection

    Sponsored by: Veeam Software

    Tune into this demo of Veeam Backup & Replication v11’s ransomware protection, where Michael Cade—Senior Technologist of Product Strategy at Veeam—will walk you through how to ensure backup compliance, safeguard your recoverability with backup copy immutability, and more.

  • Veeam Backup & Replication v11 Demo Video – Instant Recovery

    Sponsored by: Veeam Software

    Access this demo to discover how to instantly recover a SQL Server database, recover any image-based backup to Hyper-V, and achieve instant recovery of a file share with the pioneer of Instant VM Recovery.

  • Veeam Backup & Replication v11 Demo Video – Continuous Data Protection

    Sponsored by: Veeam Software

    Check out this demo of Veeam Backup & Replication v11 to cover installing a filter driver on a vSphere cluster, using vSphere tags to drive a policy-based approach to protecting workloads, and learning how CDP protects Tier-1 workloads with low RPOs.

  • Infographic: 5 ways backup can protect against ransomware

    Sponsored by: ComputerWeekly.com

    Ransomware threatens to put your data beyond reach, so the best way to prepare is to have good-quality data you can restore from backup. This infographic looks at the top 5 steps CIOs should consider.

  • Lessons Learned: Recovering from Ransomware

    Sponsored by: Rubrik

    Run through this e-book to familiarize yourself with the 7 different types of ransomware attacks, 4 ransomware recovery best practices, and how you can recover faster and easier using Rubrik.

  • 5 Keys to Mitigating Data Risk

    Sponsored by: Rubrik

    Dive into this e-book to learn how to stay protected in the new cloud IT era through 5 keys to mitigating data risk.

  • Buyer’s Guide to Ransomware Recovery

    Sponsored by: Rubrik

    Check out this e-book for a recap on how ransomware works, examine what kind of backup/recovery can handle ransomware, learn how to make backup and recovery ransomware-ready, and gather intelligence for detection and recovery. If you are responsible for your organization’s IT security, this e-book is for you.

  • 5 Exclusive Ways Acronis Skyrockets Your Data Protection Business

    Sponsored by: Acronis

    Check out this e-book to discover 5 use cases of Acronis Cyber Cloud, a unique cloud platform that delivers everything you need to take your data protection business to new heights

  • Simplify NAS Backup

    Sponsored by: Cobalt Iron

    Check out this data sheet to read about Compass from Cobalt, a NAS backup and recovery solution that improves restore flexibility and increases backup efficiency while improving functionality, efficiency, and service levels.

  • Analytics-Driven Automation in Cobalt Iron Compass®

    Sponsored by: Cobalt Iron

    Access this white paper to learn about Cobalt Iron’s next-generation enterprise software-as-a-service (SaaS) backup solution which uniquely addresses the backup problems of the current day through 6 characteristics.

  • Cobalt Iron Compass® for Hybrid Cloud

    Sponsored by: Cobalt Iron

    In this data sheet you’ll learn about Cobalt Iron Compass, a true cloud-based solution that delivers performance and protection across the entire enterprise and hybrid cloud no matter where data resides. Check it out to learn its 4 key benefits.

  • Modernizing Your Backup and Recovery Solution to Meet Today’s Demands

    Sponsored by: Cobalt Iron

    Read this white paper to learn what it means to modernize your backup and recovery to meet today’s demands and discover a hyperconverged, intelligent data protection solution that can do it by consolidating all aspects of data protection into a single platform.

  • Enterprise Backup for the Remote World: Your Complete Guide

    Sponsored by: Cobalt Iron

    Check out this white paper to learn key takeaways from the remote work experience that can help data managers handle sudden drastic changes and see how Cobalt Iron Compass enterprise SaaS is in the perfect position to contribute in this increasingly remote world.

  • What It Takes toSimplify Enterprise Backupand Get More From Your IBM Spectrum Protect Investment

    Sponsored by: Cobalt Iron

    Check out this white paper for an objective look at Spectrum Protect technology, learn how enterprises can use it more effectively in a new and changing business world, and much more.

  • Background and Company Performance

    Sponsored by: Cobalt Iron

    Check out this analyst report to discover what makes Cobalt Iron’s Compass solution North American Data Backup Product Leadership Award material.

  • Compass®for Edge Computing

    Sponsored by: Cobalt Iron

    With Cobalt Iron Compass, you can eliminate the complexity and costs normally associated with edge computing backup processes. Download this datasheet to find out how and to discover the essential benefits of leveraging this solution for edge computing backup.

  • COBALT IRON COMPASS®Data Protection for a Remote World

    Sponsored by: Cobalt Iron

    With Cobalt Iron Compass, customers can remotely manage, monitor, track, patch, and protect backup hardware and software—all from a single dashboard. Download the datasheet here to ensure your team can confidently keep your company’s data protection healthy, stable, and secure while working remote.

Browse by Report Type: Backups White Papers | Backups Multimedia | Backups IT Downloads

See more topics related to: Backups

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.