ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Recovery Research

  • How to Evolve Unstructured Data Management Processes

    Sponsored by: Igneous

    Download this Storage Switzerland paper for tactical guidance on evolving your company's unstructured data management and protection strategies and for 3 significant business benefits of implementing comprehensive UDM in your enterprise.

  • The State of Unstructured Data Management

    Sponsored by: Igneous

    The following State of Unstructured Data Management report details unstructured data growth trends, 3 critical management principles, and several approaches for handling unstructured data in your organization. Read it here.

  • Tape as an Airgap Against Ransomware

    Sponsored by: Fujifilm Recording Media USA, Inc.

    Join this webcast as Lead Analyst at Storage Switzerland George Crump and Security Strategist at Carbon Black David Balcar share ransomware defense tactics and examine the importance of airgapping infrastructure components. You'll also learn how to use tape as an airgap between ransomware attacks and your data.

  • Modern, Web-Scale Data Protection for the Cloud Era

    Sponsored by: Cohesity

    This solution brief introduces an alternative method of backup and recovery, converged data protection. Read on for the top 8 advantages of this approach, a chart comparing converged to legacy data protection, and a rundown of Cohesity's solution.

  • Streamline Operations with Easy, Flexible, and Fast Data Protection

    Sponsored by: Cohesity

    Legacy solutions for data backup and recovery can mean endless hours of managing different software and hardware siloes. This custom resource center will introduce you to a software-defined data protection solution that will allow you to manage all data protection from one single interface. Access it here.

  • No deal Brexit: Ideal or Ordeal?

    Sponsored by: ComputerWeekly.com

    In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.

  • Backup and Disaster Recovery for AWS Workloads

    Sponsored by: Veeam Software

    Watch this session to learn the essentials of protecting critical data and workloads in AWS, including discussions on the native AWS data backup options, low-cost alternatives for protecting data in AWS, and compliance and ransomware concerns.

  • Veeam Builds Your Availability All the Way to the Cloud

    Sponsored by: Veeam Software

    Alex Fraser and Nick Furnell from Veeam Software provide guidance on leveraging the public cloud as part of your organization's overall backup, recovery, and availability strategy. Tune in as they walk you through a demonstration of the benefits of Veeam Cloud Connect.

  • How Google Backs Up the Internet

    Sponsored by: Fujifilm Recording Media USA, Inc.

    Tune into this instructive video as Raymond Blum, Staff Site Reliability Engineer at Google, reveals Google's hybrid tape backup strategy. You'll find out how Google literally backs up the internet.

  • Why Microsoft Azure is Choosing Tape

    Sponsored by: Fujifilm Recording Media USA, Inc.

    Taken from Fujifilm's Global IT Executive Summit, in this clip Marvin McNett, Principal Developer Manager at Microsoft, details 5 concrete advantages of tape technology and why organizations will continue to use it in their data centers.

  • The True TCO of Tape

    Sponsored by: Fujifilm Recording Media USA, Inc.

    Lead Analyst of Storage Switzerland George Crump and Brad Johns discuss the TCO of tape vs. disk vs. cloud in this video, and in it you'll learn about tape's unique cost advantages for a 5-year and 10-year TCO. Tune in here.

  • Reintroducing Tape to the Disaster Recovery Process

    Sponsored by: Fujifilm Recording Media USA, Inc.

    Join George Crump, Lead Analyst at Storage Switzerland, as he breaks down 4 tactical advantages of using tape for Tier 3 and file data recovery, including power and cooling cost reductions and the ability to save 80% of the disk backup capacity you would normally have used.

  • StrongLink Autonomous Data and Storage Management

    Sponsored by: Fujifilm Recording Media USA, Inc.

    This resource highlights heterogeneous storage management software that simplifies data management and protection across local, network, and cloud storage. Read on to view its metadata identification and aggregation capabilities, as well.

  • Oak Ridge National Laboratory Case Study

    Sponsored by: Fujifilm Recording Media USA, Inc.

    Every month, Oak Ridge National Laboratory's supercomputer generates 1 PB of archive data, which must be managed and stored for easy and efficient file recall for its 1,200 users worldwide. To learn more about the active archive solution that ORNL implemented to meet these demands, check out the full case study here.

  • Managing the Data Archiving Avalanche

    Sponsored by: Fujifilm Recording Media USA, Inc.

    Highlighted in this resource is a 7-step plan for building a long-term, secure, scalable archiving strategy. Continue reading for insight on determining what data should be archived, how to reduce pressure on backup windows, and more.

  • Tape Storage: It's a New Game with New Rules

    Sponsored by: Fujifilm Recording Media USA, Inc.

    Clue into the latest tape technology advancements in this white paper, which includes details on 8 major tape enhancements, using tape for cybersecurity and data protection, tape's role in the cloud era, and more.

  • Business Continuity and Disaster Recovery (BC/DR) Planning Templates

    Sponsored by: TechTarget

    What if you had several, ready-to-go DR planning templates in your back pocket to seamlessly establish the bullet-proof availability that your company's high-transaction workloads demand? Now you can. Simply download SearchDisasterRecovery.com's 4 BC/DR Planning Templates for step-by-step instructions on conducting pandemic recovery, busin

  • Your expert guide to data protection strategy: backup, replication, snapshots and virtualisation

    Sponsored by: ComputerWeekly.com

    We walk you from the basics of backup methods to the pros and cons of different ways of protecting data and key issues in virtual machine backup.

  • Handbook: Choosing a Converged Data Protection Solution

    Sponsored by: SearchDataBackup.com

    This guidebook offers expert advice on evaluating converged data protection solutions, with consideration given to the value and risk of integrating data protection and management and what vendors have to offer. For assistance with assessing your company's options, read the guidebook here.

  • Scale-out Data Protection Promises to Revolutionize Recovery Capabilities

    Sponsored by: Commvault

    This ESG paper explains how to take control of your backup environment with scale-out data protection that can dynamically expand storage, deliver predictable cost and performance, and provide greater freedom in choice of hardware. Read on for more on how your enterprise could benefit from a similar approach.

  • Could the WannaCry Decryptor Work on Other Ransomware Strains?

    Sponsored by: Cisco Umbrella

    After the global outbreak of the WannaCry ransomware, researchers created decryptor tools that could save affected files. In this guide, expert Matthew Pascucci explains how the tools work and if they work on other ransomware strains.

  • GDPR Developments Will Dominate Storage and Compliance in 2017

    Sponsored by: Arrow + NetApp

    In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.

  • What you should know: Hot data backup techniques and trends

    Sponsored by: Hedvig Inc

    One of the new data backup techniques fundamentally changing the way people recover from a storage system failure is recovery-in-place. Discover best use cases and how to fully leverage recovery-in-place. Read on to learn six more business continuity management system trends shaping the industry.

  • Backup target features expand use cases and evolve for better data protection

    Sponsored by: Hedvig Inc

    Disk-based backup targets have evolved to become far more than just cheap disk arrays. It is vital to understand the different capabilities these systems can offer. In this guide discover new features such as in-place recovery - that allows a virtual machine to instantiate its data store directly from an appliance.

  • Recovering from Ransomware: Data Protection Strategy Guide

    Sponsored by: Citrix

    With a constantly evolving IT landscape, the nature of disaster recovery planning is changing rapidly. Now, rather than just preparing for a natural disaster or manmade event, IT professionals must also be prepared to recover from ransomware and other cyberattacks. In this e-guide you will learn 2 quick steps for recovering from ransomware.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.