ComputerWeekly.com Research Library

Powered by Bitpipe.com

Data Recovery Research

  • The True TCO of Tape

    Sponsored by: Fujifilm Recording Media USA, Inc.

    Lead Analyst of Storage Switzerland George Crump and Brad Johns discuss the TCO of tape vs. disk vs. cloud in this video, and in it you'll learn about tape's unique cost advantages for a 5-year and 10-year TCO. Tune in here.

  • Reintroducing Tape to the Disaster Recovery Process

    Sponsored by: Fujifilm Recording Media USA, Inc.

    Join George Crump, Lead Analyst at Storage Switzerland, as he breaks down 4 tactical advantages of using tape for Tier 3 and file data recovery, including power and cooling cost reductions and the ability to save 80% of the disk backup capacity you would normally have used.

  • StrongLink Autonomous Data and Storage Management

    Sponsored by: Fujifilm Recording Media USA, Inc.

    This resource highlights heterogeneous storage management software that simplifies data management and protection across local, network, and cloud storage. Read on to view its metadata identification and aggregation capabilities, as well.

  • Managing the Data Archiving Avalanche

    Sponsored by: Fujifilm Recording Media USA, Inc.

    Highlighted in this resource is a 7-step plan for building a long-term, secure, scalable archiving strategy. Continue reading for insight on determining what data should be archived, how to reduce pressure on backup windows, and more.

  • Tape Storage: It's a New Game with New Rules

    Sponsored by: Fujifilm Recording Media USA, Inc.

    Clue into the latest tape technology advancements in this white paper, which includes details on 8 major tape enhancements, using tape for cybersecurity and data protection, tape's role in the cloud era, and more.

  • Your expert guide to data protection strategy: backup, replication, snapshots and virtualisation

    Sponsored by: ComputerWeekly.com

    We walk you from the basics of backup methods to the pros and cons of different ways of protecting data and key issues in virtual machine backup.

  • A Security Assessment of Android Full-disk Encryption

    Sponsored by: ComputerWeekly.com

    This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.

  • A Guide to Cyber Risk

    Sponsored by: ComputerWeekly.com

    Insurer Allianz Global Corporate & Specialty (AGCS) examines the latest trends in cyber risk and emerging perils around the globe.

  • Scale-out Data Protection Promises to Revolutionize Recovery Capabilities

    Sponsored by: Commvault

    This ESG paper explains how to take control of your backup environment with scale-out data protection that can dynamically expand storage, deliver predictable cost and performance, and provide greater freedom in choice of hardware. Read on for more on how your enterprise could benefit from a similar approach.

  • Could the WannaCry Decryptor Work on Other Ransomware Strains?

    Sponsored by: Cisco Umbrella

    After the global outbreak of the WannaCry ransomware, researchers created decryptor tools that could save affected files. In this guide, expert Matthew Pascucci explains how the tools work and if they work on other ransomware strains.

  • GDPR Developments Will Dominate Storage and Compliance in 2017

    Sponsored by: Arrow + NetApp

    In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.

  • What you should know: Hot data backup techniques and trends

    Sponsored by: Hedvig Inc

    One of the new data backup techniques fundamentally changing the way people recover from a storage system failure is recovery-in-place. Discover best use cases and how to fully leverage recovery-in-place. Read on to learn six more business continuity management system trends shaping the industry.

  • Backup target features expand use cases and evolve for better data protection

    Sponsored by: Hedvig Inc

    Disk-based backup targets have evolved to become far more than just cheap disk arrays. It is vital to understand the different capabilities these systems can offer. In this guide discover new features such as in-place recovery - that allows a virtual machine to instantiate its data store directly from an appliance.

  • Recovering from Ransomware: Data Protection Strategy Guide

    Sponsored by: Citrix

    With a constantly evolving IT landscape, the nature of disaster recovery planning is changing rapidly. Now, rather than just preparing for a natural disaster or manmade event, IT professionals must also be prepared to recover from ransomware and other cyberattacks. In this e-guide you will learn 2 quick steps for recovering from ransomware.

  • Best Practices for Your Disaster Recovery/Business Continuity Plan

    Sponsored by: McKesson Corporation

    In this expert guide, discover 10 best practice tips to ensure your disaster recovery/business continuity plan meets your enterprise's data security needs. Also learn how backup and disaster recovery, historically treated as separately, are converging to provide a more cohesive data management plan.

  • Cloud Archiving for Cold and Not-So-Cold Storage

    Sponsored by: Iron Mountain

    This expert guide delves into the cloud archiving market and discusses 4 aspects enterprises should look into when considering a cloud archive solution. Discover how a cloud provider can help your enterprise meet archive regulatory requirements at the lowest possible cost.

  • Scale-Out NAS vs. Object Storage

    Sponsored by: SearchStorage.com

    This issue of storage magazine explores the strengths and weaknesses of scale-out NAS and object storage, offering expert advice on how to choose the right option for your enterprise's needs. Also discover tips to improve your storage efficiency, a breakdown of enterprise file sync and share deployment models, and more.

  • CDP vs. Legacy: Get the Most Out of Your Backup

    Sponsored by: SearchDataBackup.com

    The convergence of data backup, disaster recovery and archiving can save your enterprise money and storage space. Discover how continuous data protection technology can ease the convergence of backup software and primary storage and enable a storage system in which all the data in an enterprise is backed up whenever any change is made.

  • Data Backup Simplifies Disaster Recovery and Expands Its Use Cases

    Sponsored by: Pure Storage

    Data backup and disaster recovery have been converging to enable users to manage both tasks from the same platform and boost overall data protection. Discover some of the other ways in which backup products have evolved to protect your organization's data.

  • Customer Use Cases: Implementing Unified Data Protection Solutions

    Sponsored by: arcserve

    In this e-guide, witness how two institutions in the UK streamlined their data backup and recovery systems by implementing a Unified Data Protection (UDP) solution with physical and virtual server backup. Discover the benefits they achieved and how they successfully integrated this solution.

  • Six Steps to Buying Data Loss Prevention Products

    Sponsored by: Intel Security

    Data loss prevention (DLP) products allow organizations to protect sensitive data that could cause grave harm if stolen or exposed. There are six important steps an organization should follow when looking to procure the right DLP products and tools for your enterprise.

  • Bling Inside – Servers Get Flashy with Solid State

    Sponsored by: SearchStorage.com

    In this issue of Storage magazine, discover how to effectively inject new life into DAS and revive legacy storage architectures with server-side solid-state. Read on to access an article exploring state of the art of tape, and discover why it still has a solid place in enterprises as an archive tier.

  • Data Protection Methods: Mounting Backups vs. Recovering from Backups

    Sponsored by: Veritas

    This e-guide highlights important questions to ask before deciding on a data protection method and discusses the benefits and challenges associated with mounting backup versus recovery. Read on to see how mounting backups can significantly improve your data protection systems.

  • Storage magazine: Storage + Compute = Hyper-converged

    Sponsored by: SearchStorage.com

    In the March 2015 issue of Storage magazine, our experts provide a complete overview hyper-converged storage systems, look at some of the current trends – and problems – of virtual server storage, explore some not-so-obvious benefits and best practices of solid-state storage and more.

  • Credit Union of Colorado Achieves Recoverability and Compliance Through Information Management

    Sponsored by: Commvault

    This webcast to examines the management solution that the Credit Union of Colorado decided to implement in order to achieve a true information management strategy and ensure recoverability and compliance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.