ComputerWeekly.com Research Library

Powered by Bitpipe.com

Storage Security Research

  • The Business-level Value of Dell EMC PowerMax

    Sponsored by: DELL EMC & INTEL

    This ESG report highlights an all-flash solution that gives organizations operational simplicity, scalability, and availability they require while also leveraging cutting-edge innovations like SCM and NVMe: Dell EMC PowerMax. Read on to learn more.

  • Deploying SQL Server on vSAN

    Sponsored by: VMware

    Read this e-book to dig into the core benefits of running SQL Server workloads on HCI, as well as to view one solution armed to lower total cost of ownership, capital expenditures, and operational expenses: VMware vSAN.

  • Making the Case for Lease vs. Buy Storage

    Sponsored by: DELL EMC & INTEL

    IDC finds that 53% of storage customers are leveraging leasing and financing to improve their operational flexibility. To see why so many organizations are making this strategic switch from buying to leasing storage and the benefits of doing so, read this IDC report.

  • Speed Up Demanding Workloads with a Dell EMC Isilon All-Flash Storage System

    Sponsored by: DELL EMC & INTEL

    If your organization works routinely with applications requiring high throughput, top-of-the-line storage is essential to give workers quick and easy access to data so they can finish projects on time. Download this paper to see how all-flash storage performs under these demanding requirements.

  • Computer Weekly - 19 November 2019: Is facial recognition happening too fast?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.

  • How APAC firms can slay the storage management beast

    Sponsored by: ComputerWeekly.com

    The data deluge and compliance requirements are shaping how Asia-Pacific firms are approaching storage management issues in the age of cloud. Read about the strategies that MinterEllison and the Rehabilitation Institute of Singapore are using to minimise storage complexity and manage data growth.

  • CW Europe September 2019: Netherlands authorities halt datacentre construction and call for a policy rethink

    Sponsored by: ComputerWeekly.com

    The Netherlands has for years attracted datacentre investment and has seen major construction projects. Amsterdam alone has 33 datacentres within a radius of 20km. So when the local authority in Amsterdam and Haarlemmermeer called an immediate halt to datacentre construction, it was a shock.

  • A Modern Approach to Protecting Business Data and Improving Application Performance

    Sponsored by: DataCore Software Corporation

    Your data lies at the core of unlocking competitive advantages for your organization—meaning you cannot afford to protect your data with any levels of uncertainty. Download this comprehensive e-book to learn how software-defined storage can help you do so and can bolster your DR/BC.

  • Infographic: 2019 Europe IT Priorities, Storage

    Sponsored by: ComputerWeekly.com

    In this infographic, we take a look at what the most popular primary and secondary storage initiatives are in 2019 as well as how much storage will be maintained on-premise across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

  • Computer Weekly – 12 February 2019: The Met Office storms ahead on data analytics

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, find out how the Met Office takes 2TB of weather data every hour and turns it into useful business insight. We examine whether Amazon's presence in the retail market is putting off other retailers from using its public cloud services. And we look at the new 802.11ax wireless networking standard. Read the issue now.

  • Containers: Making security and business sense

    Sponsored by: ComputerWeekly.com

    In this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from startups.

  • Storage performance: From fundamentals to bleeding edge

    Sponsored by: ComputerWeekly.com

    In this guide we look at LUN provision and management, RAID and flash storage, plus tuning for analytics workloads and key emerging technologies that can give your organisation a competitive advantage in mission-critical operations, such as storage-class memory, NVMe flash and persistent memory.

  • CW ASEAN: European data law - be aware and prepare

    Sponsored by: ComputerWeekly.com

    Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.

  • CW ANZ: Prepare for EU data law

    Sponsored by: ComputerWeekly.com

    Faced with the double whammy of complying with Australia's upcoming data breach notification law and Europe's new data protection rules, Australian firms are behind where they need to be in their compliance efforts. In this month's CW ANZ, learn how Australia is getting ready for the GDPR and the challenges they are facing in meeting the new laws.

  • Computer Weekly Buyer's Guide to EU General Data Protection Regulation

    Sponsored by: ComputerWeekly.com

    In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.

  • The Security of Software Containers & Sandboxing

    Sponsored by: CloudPassage

    Sandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.

  • Building the Best Backup Plan for Today's Storage Environment

    Sponsored by: Iron Mountain

    In this expert-guide, learn about how your offline backups could be the key to keeping your data safe from the online threat of ransomware. Then, explore how dangerous over-protecting your information can be, and how a data retention policy can keep that from happening, and more.

  • New Flash Use Cases Identified and What to Do about the NAND Flash Shortage

    Sponsored by: Kaminario

    Because we're in the midst of a worldwide NAND flash shortage, will once-lowered costs now rise? Download this guide as our editors evaluate the impact the NAND flash shortage has on the cost of SSDs (and how that compares per gigabyte to HDDs), as well as new use cases like flash as RAM.

  • SearchStorage Editors Examine the Leading All-flash Array Vendors

    Sponsored by: Pure Storage

    In this e-guide, we evaluate eight leading AFA vendors to let you decide which products best suit your organization. Read on as Logan Harbaugh, IT consultant and freelance reviewer with SearchStorage, breaks down how to select an AFA vendor based on functional specification, 3 essential purchasing considerations, and more.

  • Differentiating All-flash Array Vendors from their Counterparts

    Sponsored by: Western Digital

    Our experts compiled this guide to determining the most suitable AFA vendor for your enterprise—ensuring you choose one that not only provides snapshots and thin provisioning, but also active-active controllers and replication, and QoS. Read on to also gain access to instruction for a three-phase AFA implementation.

  • Object Storage Architecture: Mitigating Complexity, Capacity, and Archival Concerns

    Sponsored by: SanDisk Corporation

    This expert resource serves as your full guide to object storage implementation, with cloud workload, sync-and-share, API-accessible storage, and more use cases examined. Download now to gain full access, learning how object storage maintains the unstructured data deluge, and view an object vs. file vs. block storage bake off.

  • GDPR Developments Will Dominate Storage and Compliance in 2017

    Sponsored by: Arrow + NetApp

    In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.

  • How Storage Is Catching Up with the DevOps Revolution

    Sponsored by: Pure Storage

    In this essential guide, discover why DevOps requirements are shifting how enterprises consume and deploy storage resources to a more-cloud focused approach. Download now to gain guidance on storage technologies most appropriate for Agile development, including VM-aware secondary storage, hyper-convergence, and more.

  • Storage Showdown: All-flash vs. Hybrid Arrays for Virtual Desktop Environments

    Sponsored by: Pure Storage

    Download this guide as Tom Fenton, Senior Validation Engineer at the Taneja Group, illustrates several critical factors to consider when deciding to use an all-flash or hybrid array in your virtual desktop environments. Here, you'll evaluate hybrid vs. all-flash on cost, ability access to cold data, compression and deduplication, and more.

  • Flash Storage Caching Boosts Application Performance—but Requires Balance

    Sponsored by: Pure Storage

    Use this guide as a comprehensive resource for evaluating flash caching benefits, trade-offs, 3 main implementation models, and determine where to cache in order to leverage faster media and improve I/O performance.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.