ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Recovery Research

  • Commvault Provides Native Access to Amazon S3 Including Amazon Glacier and Deep Archive

    Sponsored by: Commvault

    Choosing a data management solution that compliments your backup and recovery system means simpler, streamlined data protection. Checkout this webcast to hear about a complete data management solution that uses a single interface for on premise and public cloud environments and offers auditing, reporting, and alerting capabilities.

  • Understanding Recovery Readiness in a Not-So-Ready World.

    Sponsored by: Commvault

    Modern recovery doesn’t come without its challenges, which is where having a recovery readiness strategy comes into play. Watch this webcast to learn the 3 essential elements of recovery readiness and to see how AI and ML are changing the backup landscape.

  • Cloud Disaster Recovery: A Survival Guide by the University of Canberra

    Sponsored by: Commvault

    By choosing a DR solution that automatically uploaded data daily and secured it for long-term retention, the University of Canberra could be sure that their data was safe in the event of a disaster. Watch this webcast to learn more about the solution that Canberra chose and the 5 transformational benefits it created.

  • University of Canberra saves A 135,000 by eliminating tapes with AWS and Commvault

    Sponsored by: Commvault

    By implementing a holistic solution that supported the cloud service providers they wanted to use, UC was able to reduce storage overhead by A$135,000 and improve their back up window by 38%. Read this case study to discover the solution UC put in place to transform their storage and to hear the remaining benefits they experienced.

  • Ransomware - Protect Your Data

    Sponsored by: Commvault

    One trend that is gaining popularity in ransomware recovery is a holistic solution with an ability to align recovery operations to the value of the data. Tune into this webcast to view the key takeaways from this Gartner research, analyze real-world ransomware case studies, and discover the 4 key elements of a risk mitigation strategy.

  • Cost Efficient Backups for the Enterprise

    Sponsored by: Druva

    Access this white paper for a rundown of the pros and cons of each type of deduplication and to view a solution that unifies data protection with global dedupe to break up operational silos and simplify administration.

  • 9 Steps to Critical Event Management Improvement

    Sponsored by: EverBridge Inc.

    By leveraging a holistic approach to CEM, organizations can look forward to a more unified, distributed, automated, and collaborative process. Access this white paper to discover an essential 9-step CEM process that organizations can use to improve their responses to critical events.

  • Fraud Detection in Healthcare: a step-by-step guide to incorporating machine learning

    Sponsored by: Dataiku

    There are many AI-based use cases that span the healthcare industry, all with the goal of improving patient care. Access this white paper to learn the 3 basic types of anomalies that may be detected and to learn how to confront the challenges of fraud and anomaly detection with 4 AI and ML-based approaches.

  • A Place for Your Stuff: The Need for Cloud Storage for Archival Data

    Sponsored by: Somerville

    With a hybrid data protection and archiving strategy, your organization can achieve quick recovery, increase backup performance, and reduce primary disk storage costs. Access this white paper to learn the 4 crucial elements of this hybrid cloud archival strategy and how a multi-tiered approach could benefit your company.

  • Seagate Enterprise Data Solutions

    Sponsored by: TechData - Seagate

    The Seagate portfolio of hardware solutions includes cloud building blocks, RAID/data protection, and integrated application platforms meant to help your organization grow. Access this datasheet to learn the 3 main benefits Seagate offers and to see these benefits in action.

  • Enterprise Family Guide

    Sponsored by: TechData - Seagate

    Access this white paper to learn about a family of vertically integrated Enterprise Data Solutions from Seagate, including the Exos Enterprise Hard Drives and the Nytro Enterprise Solid-State Drives, that are fit to accommodate zettabyte-level data capacity and performance.

  • FlexPod: The Converged Infrastructure Swiss Army Knife for Your Data Center

    Sponsored by: NetApp

    According to a recent IDC survey evaluating the usability and market acceptance of converged infrastructure, FlexPod from NetApp and Cisco exceeds the requirements set forth. Access this blog post to learn the 8 most important features for a multi-tool infrastructure like converged.

  • Protect Your Cloud Journey with Druva and Amazon Web Services (AWS)

    Sponsored by: Druva

    Druva, powered by AWS, utilizes cloud and local data sources to provide data protection, governance, and intelligence, while eliminating the need for silos of storage hardware. Access this webcast to extract the 6 foundational benefits of Druva’s cloud-native SaaS solution and see how your company can benefit.

  • Cloud Data Protection for VMware Cloud on AWS

    Sponsored by: Druva

    Organizations can implement Druva and VMware Cloud on AWS to move and protect applications as needed, accelerate and simplify data migration, and utilize robust DR. Watch this webcast to learn how AWS, VMware, and Druva fit together to streamline your data backup and restoration needs.

  • Your SAP Applications Belong on NetApp

    Sponsored by: NetApp

    Read this solution brief to view several storage solutions with which you can boost SAP performance and app efficiency and learn the 10 benefits your organization can realize by partnering with NetApp.

  • Data Protection in the Cloud: Avoiding Cloud Data Loss

    Sponsored by: Clumio

    Using a SaaS approach to cloud data protection eliminates the need for user-performed upgrades, enables you to continuously monitor backups for potential problems and more. Read this custom strategy brief from Clumio to learn about the 6 staple cloud backup needs and about the benefits of data protection as a service.

  • No deal Brexit: Ideal or Ordeal?

    Sponsored by: ComputerWeekly.com

    In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.

  • Protecting Public Sector Organizations Against Ransomware and Other Cyber Threats

    Sponsored by: Hewlett Packard Enterprise

    In order to protect your company from cyber attackers, you need proper strategies in place that will protect and recover your data, harden systems and environments, and review security policies more than once a year. Watch this webcast from TechTarget, sponsored by HPE, to learn how your organization can defend itself against ransomware attacks.

  • Protect Your Enterprise from Ransomware Attacks with These Four Technologies

    Sponsored by: Cohesity

    As ransomware attacks continue to rise, IT needs to not only ensure that they can recover in a timely manner post-attack, but also that they are recovering from an uninfected copy. Read this report from Forrester Research to learn how you can deploy four key technologies to improve your organization’s resilience against ransomware.

  • Buyer's Guide to Modern Backup

    Sponsored by: Cohesity

    Read this buyer's guide to understand the key considerations when choosing an enterprise-grade, modern, web-scale backup and recovery solution. Determine the right needs for your organization by learning the fundamental questions to ask about your current environment, the range of backup and recovery issues currently faced by enterprises, and more.

  • Conversational Geek: Office 365 Backup

    Sponsored by: Cohesity

    Did you know that backing up your data in Office 365 is a shared responsibility? Read this eBook to find out why Office 365 data must be included in your backup, how to avoid lost time and profits caused by major outages, and how to ensure you can recover quickly and keep operations running.

  • Beyond NAS: A Transformative Approach to Unstructured Data

    Sponsored by: Cohesity

    Traditional NAS platforms are not equipped to handle today’s data and application needs. Read this white paper to see why the future of scale-out NAS must begin with a blank sheet of paper that provides a fresh solution that is data-centric, API-driven, software-defined, and provides global space efficiency, along with integrated cybersecurity.

  • Avoid Ransomware Disasters With a Better Backup and Recovery Strategy

    Sponsored by: Cohesity

    Ransomware attacks will happen. Has your IT team safeguarded backup data copies and prioritized business-critical application recovery? Read this Gartner report to learn how you can use backup and recovery technologies to combat ransomware and evaluate your team’s recovery readiness.

  • Mid-Market Finance Firm Uses Optiv’s Incident Response to Recover from Breach

    Sponsored by: Optiv

    In this case study, discover how a mid-market specialty finance firm in the final recovery stages from a recent security breach partnered with Optiv to deploy incident response (IR) solutions to handle the breach recovery and achieved 24x7x365 security coverage.

  • Cloud backup vs traditional backup

    Sponsored by: ComputerWeekly.com

    Cloud backup vs. traditional backup is an important discussion. While the cloud backup market is soaring, traditional backup players may also have much to offer your organisation. In this e-guide we look over the advantages and disadvantages of both backup offers.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.