ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Recovery Research

  • Unlock Hidden Resources in Your Hybrid Virtualization Infrastructure

    Sponsored by: Quest

    Read this white paper for guidance on how to meet the backup and recovery needs of container and hybrid virtualized environments, as well as how to find, and apply, the most suitable and flexible solution.

  • Don't Pay the Bad Guys! Protect Your Data from Ransomware Attacks

    Sponsored by: Bytes Technology Group

    Rubrik is utilizing machine learning to provide instant recovery, immutability, and impact visibility which makes paying ransoms a thing of the past. Access this resource to learn the 5 components of Rubrik’s solution and see for yourself how it compares to traditional backup architectures.

  • Leading Dutch IT Services Provider Gets Complete Office 365 Protection

    Sponsored by: Barracuda

    After successive failures to protect data with their previous backup provider occurred, Truston knew they needed a more efficient off-site backup solution for their O365 data. Download this case study to discover the results of Truston investing in Barracuda Essentials.

  • StorSafe Launch Webinar

    Sponsored by: FalconStor Software

    By leveraging industry-standard container technology to enable persistent long-term archiving, StorSafe improves data portability, accessibility, security, and integrity validation. Tune into this launch webinar to get a more detailed look at the features and functionality of StorSafe.

  • The Age of Data-Centric Archive

    Sponsored by: FalconStor Software

    This paper highlights a long-term, persistent, containerized archival solution called StorSafe, which provides data preservation that is agnostic, heterogeneous, and highly portable. Read on to learn how your business could benefit from this system.

  • Backup fundamentals in the age of cloud

    Sponsored by: ComputerWeekly.com

    In this e-guide we look at backup fundamentals like choosing incremental or differential backup as well as using snapshots to replace traditional backup. We also provide an overview of strategic considerations for backup in the age of the cloud as well as surveys of the key backup products for SMEs and enterprise deployment.

  • Why a Backup Strategy for Microsoft Office 365 is Essential for Security, Compliance, and Business Continuity

    Sponsored by: Clumio

    Download this IDC white paper to dig into the O365 backup essentials, including 3 risks of not backing up O365 data and 3 key features to look for in a solution.

  • Digitally Transforming Enterprises Are Managing to Higher Levels of Storage and Data Availability

    Sponsored by: IBM

    With more than 60% of enterprises working to achieve digital transformation, data is becoming an increasingly strategic resource for driving competitive differentiation. IDC research in December 2018 explored data availability targets being set by IT organizations but also how well they are performing in achieving their workload availability goals.

  • 5-min demo: Data Security

    Sponsored by: Veeam Software

    With modernized data protection, organizations can cut their average ransomware recovery cost down or not pay anything at all. How? Tune into this demo to learn how you can protect your data with immutability from Veeam.

  • The Essential Guide to Data Protection & Disaster Recovery

    Sponsored by: Tintri

    Download this e-book to understand the storage features that are essential to modern data protection and DR practices and to view specific guidelines on what to look for and how to implement your plan.

  • Druva Security Overview

    Sponsored by: Druva

    This white paper explains how Druva’s Cloud Platform enforces end-to-end data security regardless of where your data sits. Access now to view this platform’s features and to learn how to protect your data as the use of cloud-based SaaS applications grows.

  • Alliant Credit Union Achieves Data Recovery 90% Faster with Commvault

    Sponsored by: Commvault

    Upholding a high standard for delivery and improving RTO means Alliant Credit Union can’t risk services being disrupted by an infrastructure failure. Read this case study to learn how it reduced its RTO from 36 hours to just four with Commvault Complete Backup & Recovery.

  • Yantai Shinho Improves RPO by 84% and Cuts Storage Costs with AWS and Commvault

    Sponsored by: Commvault

    Access this case study to learn how Yantai Shinho achieved backup for core databases in 30 mins using Commvault Complete Backup & Recovery, including a host of other benefits.

  • Case Study: Astra Daihatsu Motor

    Sponsored by: Commvault

    Download this case study to find out how Astra Daihatsu overcame their previous issues with assembly line downtime and met regional compliance regulations using Commvault’s Complete Backup & Recovery and the 4 benefits they realized as a result.

  • Spectrum Enriches Viewing Experience for 28 Million Customers

    Sponsored by: Commvault

    Rapid and continuous replication coupled with large volumes of storage was quickly becoming essential to Spectrum. Read this case study to learn how Spectrum was able to achieve their goal and overcome bandwidth issues using Commvault ContinuousDataReplicator (CDR).

  • 5 Steps to Application-aware Data Protection

    Sponsored by: Commvault

    Read the following blog post to examine 5 steps that will help you achieve application-aware data protection in your organization.

  • Case Study: Orchid Pharma Cuts Hardware Costs with Commvault

    Sponsored by: Commvault

    Read this case study to learn how Orchid Pharma was able to minimize disk utilization by 96%, lower their annual operating costs, reduce their backup window by 60%, and establish zero backup failure with Commvault Complete Backup & Recovery software.

  • Equifax and the 147 Million: One Individual’s Story from behind the Headlines

    Sponsored by: Auth0

    What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.

  • Case Study: Southern Institute of Technology New Zealand

    Sponsored by: Commvault

    Southern Institute of Technology (SIT) was contending with 46 terabytes of business-critical data, pushing their existing backup tools over the edge. So how did SIT come out on top and achieve a perfect score with a more suitable backup and recovery solution? Read this case study to find out.

  • Enhance and Extend Your Spectrum Protect

    Sponsored by: Cobalt Iron

    When it comes to finding the right data protection solution, what features should you be looking for? Tune into this webcast to learn 6 of these defining features and discover how Compass from Cobalt Iron leverages them to deliver intelligent data protection.

  • Unleash the Power of NAS Backup

    Sponsored by: Veeam Software

    The following webinar highlights the benefits of Veeam’s NAS backup and compares the solution to others in the market. Tune in to learn more and to view this solution’s key features, like file-level backup capabilities aimed at protecting your file shares, and additional use cases.

  • Protect Your Data Simply with Nutanix Mine and Veeam

    Sponsored by: Veeam Software

    Tune into this webinar to learn how to address the common issues in point solution backups and how the Nutanix Mine with Veeam can simplify your data protection plans and unify backup.

  • Essential BC/DR Planning & Testing Templates

    Sponsored by: TechTarget

    What if you were hit with a ransomware attack or experienced a malfunction in its data center sprinkler system? Whether your company is in the early stages of establishing a DR plan or it's time to retest, we've got you covered: we just released the 2nd edition of our Verified BC/DR Planning Templates! Simply answer a few simple survey questions

  • Doppelgangers: The Many Identities of the Modern Data Catalog

    Sponsored by: Alation

    Download this 451 Research report to dig into the ins and outs of data catalogs. The details covered inside include current catalog usage and adoption plans, a view of the data catalog provider and product landscape, and more.

  • Navigating Ransomware Recovery

    Sponsored by: Cisco Umbrella

    The decisions and road to recovery will involve several stakeholders and real costs. So, when organizations must make the tough decision of whether to pay a ransom, rebuild the system, or file a report, there are many factors to consider. Use this e-guide to help you plan and map out steps to avoid rushing into bad choices that can’t be reversed.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.