ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Recovery Research

  • Data-as-as-Service solves traditional security problems

    Sponsored by: HammerSpace

    Join Jon McLachlan, host of The Security Podcast of Silicon Valley, as he sits down with Anand Ganesh, Founding Software Architect at Hammerspace, to discuss how storageless data and Data-as-as-Service solve traditional B2B data protection and security problems like encrypting data at rest.

  • Compass®for Edge Computing

    Sponsored by: Cobalt Iron

    With Cobalt Iron Compass, you can eliminate the complexity and costs normally associated with edge computing backup processes. Download this datasheet to find out how and to discover the essential benefits of leveraging this solution for edge computing backup.

  • COBALT IRON COMPASS®Data Protection for a Remote World

    Sponsored by: Cobalt Iron

    With Cobalt Iron Compass, customers can remotely manage, monitor, track, patch, and protect backup hardware and software—all from a single dashboard. Download the datasheet here to ensure your team can confidently keep your company’s data protection healthy, stable, and secure while working remote.

  • End-to-end Data Protection for the Modern Data Center with Cobalt Iron Compass

    Sponsored by: Cobalt Iron

    Cobalt Iron introduced their Compass platform to drive down cost and fully manage, configure, and maintain data protection processes for you. Access this ESG paper for an in-depth, 3rd party look at Cobalt Iron Compass and the benefits of its fully managed, immutable data and ransomware protection.

  • Inventa for Wealth Management

    Sponsored by: 1Touch.io

    With 1touch.io’s Inventa, an AI-based sustainable data discovery tool, firms can move forward with their own digital initiatives while effortlessly staying on top of privacy requirements. Read this paper to learn how your organization can ensure sustainable data discovery and reduce the burden on data science teams with Inventa.

  • Mergers & Acquisitions: Accelerate Data Discovery & Integration

    Sponsored by: Aparavi

    Finding, classifying, integrating, and migrating M&A data is far from straightforward and can be challenging when data is siloed and 80% of all corporate data is unstructured. Download this datasheet to learn how to enact rapid, accurate data discovery and integration using the Aparavi Platform.

  • A Security Engineer’s Nightmare

    Sponsored by: Cribl.io

    For security pros, preventing breaches and ensuring data privacy is hectic enough – having an incompetent system on top of these challenges can introduce new levels of stress. Read this white paper to learn how Cribl is helping security engineers log information and incidents so they can focus their efforts on more important tasks.

  • Leading Dutch IT Services Provider Gets Complete Office 365 Protection

    Sponsored by: Barracuda

    After successive failures to protect data with their previous backup provider occurred, Truston knew they needed a more efficient off-site backup solution for their O365 data. Download this case study to discover the results of Truston investing in Barracuda Essentials.

  • Backup fundamentals in the age of cloud

    Sponsored by: ComputerWeekly.com

    In this e-guide we look at backup fundamentals like choosing incremental or differential backup as well as using snapshots to replace traditional backup. We also provide an overview of strategic considerations for backup in the age of the cloud as well as surveys of the key backup products for SMEs and enterprise deployment.

  • Equifax and the 147 Million: One Individual’s Story from behind the Headlines

    Sponsored by: Auth0

    What is it like to have your data compromised or your identity stolen? In this video, sit down with one of the 147 million victims of the notorious 2017 Equifax data breach as they share their experience regarding the long-term impacts of this incident and their struggle to seize back control from identity thieves.

  • searchDisasterRecovery's Verified BC/DR Planning Templates

    Sponsored by: TechTarget

    What if you were hit with a ransomware attack or experienced a malfunction in its data center sprinkler system? Whether your company is in the early stages of establishing a DR plan or it's time to retest, we've got you covered: we just released the 2nd edition of our Verified BC/DR Planning Templates! Simply answer a few simple survey questions

  • Doppelgangers: the many identities of the modern data catalog

    Sponsored by: Alation

    Download this 451 Research report to dig into the ins and outs of data catalogs. The details covered inside include current catalog usage and adoption plans, a view of the data catalog provider and product landscape, and more.

  • Protect & recover your data with StorageCraft Ransomware Recovery Solutions

    Sponsored by: StorageCraft Technology Corporation

    The following resource highlights a set of solutions from StorageCraft with which you can combat these attacks. Access now to view the advantages of deploying them and to ensure your last line of defense against ransomware is as resilient as ever.

  • In Your Data Archive Strategy, How Long is Long Enough?

    Sponsored by: Beta Systems

    It is important for organizations of all sizes to develop a strong data retention strategy that addresses the entire data lifecycle. Read this e-guide to distinguish which data is worth saving and discover the 5 components of a data strategy and how each component plays an important role in data archiving.

  • Druva Data Protection for Vmware Cloud on AWS

    Sponsored by: Druva

    As companies look to reduce costs, increase agility and improve the efficiency of their data center operations, they are selectively moving workloads to the cloud. The result has been the creation of a new business model known as hybrid cloud.

  • What Is Cloud-Based Backup and Recovery?

    Sponsored by: Druva

    This white paper describes the benefits, features, and capabilities of cloud-based backup and recovery, alongside recommendations for companies considering a cloud-based data protection solution. Read on to view 7 practical use cases and to see if this strategy is a good fit for your company.

  • The Role of Cloud Backup and Recovery in Protecting Against Ransomware Attacks

    Sponsored by: Rubrik

    Neither traditional nor native no relational database tools deliver the necessary backup and recovery capabilities required to protect against ransomware. Dive into this ebook to research a solution meant to work with non-relational databases and applications while filling in 5 key gaps left by traditional backup and scripted solutions.

  • Protecting NAS at Scale with Rubrik

    Sponsored by: Rubrik

    Protecting this data requires a solution that is designed and built to protect terabytes to petabytes of unstructured data. Explore this e-book to learn about a three-phase approach to NAS protection that benefits users in a wide range of areas—capacity and scale among them—and which overcomes the drawbacks of NDMP.

  • Buyer's Guide to Backup and Recovery

    Sponsored by: Rubrik

    This guide discusses how the emergence of cloud data management provides opportunities for protecting data, capturing new value, and making data available whenever, wherever it is needed.

  • A Computer Weekly buyer’s guide to data protection

    Sponsored by: ComputerWeekly.com

    Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.

  • No-deal Brexit: Ideal or Ordeal?

    Sponsored by: ComputerWeekly.com

    In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.

  • Cloud backup vs traditional backup

    Sponsored by: ComputerWeekly.com

    Cloud backup vs. traditional backup is an important discussion. While the cloud backup market is soaring, traditional backup players may also have much to offer your organisation. In this e-guide we look over the advantages and disadvantages of both backup offers.

  • Navigating Ransomware Recovery

    Sponsored by: Cisco Umbrella

    The decisions and road to recovery will involve several stakeholders and real costs. So, when organizations must make the tough decision of whether to pay a ransom, rebuild the system, or file a report, there are many factors to consider. Use this e-guide to help you plan and map out steps to avoid rushing into bad choices that can’t be reversed.

  • Navigating VMware and Cloud Backups

    Sponsored by: Clumio

    VMware VM backups and cloud backups can improve workload protection by securing data but navigating the tools themselves can be intimidating. Dive into this e-guide to learn 6 VMware VM backup best practices and 3 cloud backup security guidelines to help you navigate this tricky landscape.

  • Top 20 Cloud Backup Services for 2019

    Sponsored by: Druva

    To keep your pulse on the latest cloud backup developments, download this e-guide. Inside, our experts share 7 considerations for selecting a cloud backup service, examine 20 top cloud backup services to simplify the selection process, and explain how the public cloud is improving data protection.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.

Cookie Preferences