ComputerWeekly.com Research Library

Powered by Bitpipe.com

Storage Security Research

  • Top 10 cyber security stories of 2021

    Sponsored by: ComputerWeekly.com

    Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.

  • IT Priorities 2020: Covid-19 consolidates storage push to cloud

    Sponsored by: ComputerWeekly.com

    The emphasis on home and remote working has been felt in storage and backup as in all areas of IT, with continued evolution towards the cloud and as-a-service storage and backup.

  • A Computer Weekly buyer's guide to Colocation

    Sponsored by: ComputerWeekly.com

    Colocation is an increasingly appealing option for data storage. In this 17-page buyer's guide, Computer Weekly looks at the constraints of migration, environmental considerations and datacentre opportunities in Africa.

  • Backup: A Critical Security Tool as you Transition to a Fully Remote Workforce

    Sponsored by: Barracuda

    In this webinar presented by Stasia Hurley, Senior Product Marketing Manager for data protection at Barracuda, see why making sure your backup strategy up to date is especially important during the COVID-19-caused transition.

  • SHEDDING LIGHT ON OEM STORAGE SUPPORT

    Sponsored by: Service Express

    If you are being strong-armed into replacing your current storage with the newest equipment, remember that the “one-option-only” perception is just an illusion. Access this white paper to learn 6 must-know facts before your next storage buy.

  • Computer Weekly - 19 November 2019: Is facial recognition happening too fast?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.

  • IT Priorities 2020: Covid-19 consolidates storage push to cloud

    Sponsored by: ComputerWeekly.com

    The emphasis on home and remote working has been felt in storage and backup as in all areas of IT, with continued evolution towards the cloud and as-a-service storage and backup.

  • Royal Holloway: Rowhammer – From DRAM faults to escalating privileges

    Sponsored by: ComputerWeekly.com

    Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them

  • CW Europe September 2019: Netherlands authorities halt datacentre construction and call for a policy rethink

    Sponsored by: ComputerWeekly.com

    The Netherlands has for years attracted datacentre investment and has seen major construction projects. Amsterdam alone has 33 datacentres within a radius of 20km. So when the local authority in Amsterdam and Haarlemmermeer called an immediate halt to datacentre construction, it was a shock.

  • Infographic: 2019 Europe IT Priorities, Storage

    Sponsored by: ComputerWeekly.com

    In this infographic, we take a look at what the most popular primary and secondary storage initiatives are in 2019 as well as how much storage will be maintained on-premise across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

  • Computer Weekly – 12 February 2019: The Met Office storms ahead on data analytics

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, find out how the Met Office takes 2TB of weather data every hour and turns it into useful business insight. We examine whether Amazon's presence in the retail market is putting off other retailers from using its public cloud services. And we look at the new 802.11ax wireless networking standard. Read the issue now.

  • Containers: Making security and business sense

    Sponsored by: ComputerWeekly.com

    In this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from startups.

  • Storage performance: From fundamentals to bleeding edge

    Sponsored by: ComputerWeekly.com

    In this guide we look at LUN provision and management, RAID and flash storage, plus tuning for analytics workloads and key emerging technologies that can give your organisation a competitive advantage in mission-critical operations, such as storage-class memory, NVMe flash and persistent memory.

  • CW ASEAN: European data law - be aware and prepare

    Sponsored by: ComputerWeekly.com

    Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.

  • Computer Weekly Buyer's Guide to EU General Data Protection Regulation

    Sponsored by: ComputerWeekly.com

    In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.

  • Cloud Storage and Backup Market Rundown

    Sponsored by: Cohesity

    Check out this e-guide for a comprehensive overview of some of the storage industries most fundamental topics— like replication vs. backup—to make sure you are taking advantage of everything they have to offer your organization.

  • The Security of Software Containers & Sandboxing

    Sponsored by: CloudPassage

    Sandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.

  • Building the Best Backup Plan for Today's Storage Environment

    Sponsored by: Iron Mountain

    In this expert-guide, learn about how your offline backups could be the key to keeping your data safe from the online threat of ransomware. Then, explore how dangerous over-protecting your information can be, and how a data retention policy can keep that from happening, and more.

  • New Flash Use Cases Identified and What to Do about the NAND Flash Shortage

    Sponsored by: Silk

    Because we're in the midst of a worldwide NAND flash shortage, will once-lowered costs now rise? Download this guide as our editors evaluate the impact the NAND flash shortage has on the cost of SSDs (and how that compares per gigabyte to HDDs), as well as new use cases like flash as RAM.

  • SearchStorage Editors Examine the Leading All-flash Array Vendors

    Sponsored by: Pure Storage

    In this e-guide, we evaluate eight leading AFA vendors to let you decide which products best suit your organization. Read on as Logan Harbaugh, IT consultant and freelance reviewer with SearchStorage, breaks down how to select an AFA vendor based on functional specification, 3 essential purchasing considerations, and more.

  • Differentiating All-flash Array Vendors from their Counterparts

    Sponsored by: Western Digital

    Our experts compiled this guide to determining the most suitable AFA vendor for your enterprise—ensuring you choose one that not only provides snapshots and thin provisioning, but also active-active controllers and replication, and QoS. Read on to also gain access to instruction for a three-phase AFA implementation.

  • Object Storage Architecture: Mitigating Complexity, Capacity, and Archival Concerns

    Sponsored by: SanDisk Corporation

    This expert resource serves as your full guide to object storage implementation, with cloud workload, sync-and-share, API-accessible storage, and more use cases examined. Download now to gain full access, learning how object storage maintains the unstructured data deluge, and view an object vs. file vs. block storage bake off.

  • GDPR Developments Will Dominate Storage and Compliance in 2017

    Sponsored by: Arrow + NetApp

    In this expert guide, Storage Editor Antony Adshead and CEO of Vigitrust, Mathieu Gorge, discuss 2017's developments in the GDPR, as it pertains to regulatory compliance, and data backup. Read on to discover backup challenges associated with e-discovery, the evolution of data retention regulations, and more.

  • How Storage Is Catching Up with the DevOps Revolution

    Sponsored by: Pure Storage

    In this essential guide, discover why DevOps requirements are shifting how enterprises consume and deploy storage resources to a more-cloud focused approach. Download now to gain guidance on storage technologies most appropriate for Agile development, including VM-aware secondary storage, hyper-convergence, and more.

  • Storage Showdown: All-flash vs. Hybrid Arrays for Virtual Desktop Environments

    Sponsored by: Pure Storage

    Download this guide as Tom Fenton, Senior Validation Engineer at the Taneja Group, illustrates several critical factors to consider when deciding to use an all-flash or hybrid array in your virtual desktop environments. Here, you'll evaluate hybrid vs. all-flash on cost, ability access to cold data, compression and deduplication, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.