ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Recovery Research

  • A Security Assessment of Android Full-disk Encryption

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.

  • A Guide to Cyber Risk

    Sponsored by: ComputerWeekly.com

    Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.

  • Recovering from Ransomware: Data Protection Strategy Guide

    Sponsored by: Citrix

    With a constantly evolving IT landscape, the nature of disaster recovery planning is changing rapidly. Now, rather than just preparing for a natural disaster or manmade event, IT professionals must also be prepared to recover from ransomware and other cyberattacks. In this e-guide you will learn 2 quick steps for recovering from ransomware.

  • Best Practices for Your Disaster Recovery/Business Continuity Plan

    Sponsored by: McKesson Corporation

    In this expert guide, discover 10 best practice tips to ensure your disaster recovery/business continuity plan meets your enterprise's data security needs. Also learn how backup and disaster recovery, historically treated as separately, are converging to provide a more cohesive data management plan.

  • Cloud Archiving for Cold and Not-So-Cold Storage

    Sponsored by: Iron Mountain

    This expert guide delves into the cloud archiving market and discusses 4 aspects enterprises should look into when considering a cloud archive solution. Discover how a cloud provider can help your enterprise meet archive regulatory requirements at the lowest possible cost.

  • Scale-Out NAS vs. Object Storage

    Sponsored by: SearchStorage.com

    This issue of storage magazine explores the strengths and weaknesses of scale-out NAS and object storage, offering expert advice on how to choose the right option for your enterprise's needs. Also discover tips to improve your storage efficiency, a breakdown of enterprise file sync and share deployment models, and more.

  • CDP vs. Legacy: Get the Most Out of Your Backup

    Sponsored by: SearchDataBackup.com

    The convergence of data backup, disaster recovery and archiving can save your enterprise money and storage space. Discover how continuous data protection technology can ease the convergence of backup software and primary storage and enable a storage system in which all the data in an enterprise is backed up whenever any change is made.

  • Data Backup Simplifies Disaster Recovery and Expands Its Use Cases

    Sponsored by: Pure Storage

    Data backup and disaster recovery have been converging to enable users to manage both tasks from the same platform and boost overall data protection. Discover some of the other ways in which backup products have evolved to protect your organization's data.

  • Customer Use Cases: Implementing Unified Data Protection Solutions

    Sponsored by: arcserve

    In this e-guide, witness how two institutions in the UK streamlined their data backup and recovery systems by implementing a Unified Data Protection (UDP) solution with physical and virtual server backup. Discover the benefits they achieved and how they successfully integrated this solution.

  • Six Steps to Buying Data Loss Prevention Products

    Sponsored by: Intel Security

    Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.

  • Bling Inside – Servers Get Flashy with Solid State

    Sponsored by: SearchStorage.com

    In this issue of Storage magazine, discover how to effectively inject new life into DAS and revive legacy storage architectures with server-side solid-state. Read on to access an article exploring state of the art of tape, and discover why it still has a solid place in enterprises as an archive tier.

  • Data Protection Methods: Mounting Backups vs. Recovering from Backups

    Sponsored by: Veritas

    This e-guide highlights important questions to ask before deciding on a data protection method and discusses the benefits and challenges associated with mounting backup versus recovery. Read on to see how mounting backups can significantly improve your data protection systems.

  • Storage magazine: Storage + Compute = Hyper-converged

    Sponsored by: SearchStorage.com

    In the March 2015 issue of Storage magazine, our experts provide a complete overview hyper-converged storage systems, look at some of the current trends – and problems – of virtual server storage, explore some not-so-obvious benefits and best practices of solid-state storage and more.

  • Credit Union of Colorado Achieves Recoverability and Compliance Through Information Management

    Sponsored by: Commvault

    This webcast to examines the management solution that the Credit Union of Colorado decided to implement in order to achieve a true information management strategy and ensure recoverability and compliance.

  • Case Study: Texas Tech University Requires Updated Backup & Recovery Software

    Sponsored by: Commvault

    Check out this informative case study to find out which software Texas Tech University implemented to meet their environments needs.

  • Legacy vs. Modern Data Protection Comparison Chart

    Sponsored by: Commvault

    In today's mobile society data can be stored on site or in the cloud, and can be accessed by a variety of devices. This increases the chance of a security breach. How can you make sure your data is protected?This infographic outlines eight benefits of modern data protection as compared to Legacy backup.

  • Simpana Total Value Infographic

    Sponsored by: Commvault

    This infographic outlines an integrated data management approach. It allows companies to reduce costs on backups, get faster file recovery, and more.

  • Data Management Guidelines: Four Records Retention Issues To Address

    Sponsored by: Symantec Corporation

    This e-guide details data management guidelines to help you determine what you should keep when implementing a records retention policy. Learn about four issues that can occur if you retain too much unnecessary data, including access trouble, cost influx, and more.

  • 5 Reasons Your Storage Snapshots Aren't Working

    Sponsored by: Commvault

    View this white paper to discover the secret 5 reasons your storage snapshots don't perform properly. Read on to learn about how a solution automates complex recovery processes and provides you with a granular recovery system.

  • The Top Five Email Archiving Challenges

    Sponsored by: Commvault

    This white paper explores how organizations can solve the top 5 challenges of email archiving. It also explains how a next-generation archive can simplify eDiscover and compliance, enable cloud strategies, and more.

  • Transforming Healthcare Data Management with Simpana Software

    Sponsored by: Commvault

    Learn about the only holistic approach to data and information management that is capable of protecting and recovering your healthcare data.

  • Simplify Your HIT Needs

    Sponsored by: Commvault

    Learn about a leading data management solution that will enable you to protect, access and manage healthcare data simply.

  • Data Management in the Cloud Era

    Sponsored by: Commvault

    This white paper explores the benefits of leveraging a single software platform for data management. Read on to find out why this tends to be the most effective way to deliver the needed capabilities while presenting the opportunity to simplify, reduce risk, and unlock value for managed data.

  • Head to Head Comparison: Two Top Backup Solutions Face Off

    Sponsored by: arcserve

    This white paper compares two backup/data recovery tools. It shows how each performs on a number of different areas including performance, costs, ease of use and more.

  • 7 Benefits You Realize with a Holistic Data Protection Approach

    Sponsored by: Commvault

    This white paper explains the 7 benefits of a holistic approach to data protection and highlights how legacy approaches struggle to keep up with modern demands.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.