ComputerWeekly.com Research Library

Powered by Bitpipe.com

Storage Security Research

  • Cloud Storage and Backup Market Rundown

    Sponsored by: Cohesity

    Check out this e-guide for a comprehensive overview of some of the storage industries most fundamental topics— like replication vs. backup—to make sure you are taking advantage of everything they have to offer your organization.

  • Veeam Backup for Microsoft Office 365 – Best Practices

    Sponsored by: Veeam Software

    Access this webcast to learn 3 key capabilities that Veeam Backup uses to deliver Office 365 data protection as well as the architecture’s components, storage options, deployment methods, tips for managing repositories and more.

  • Royal Holloway: Rowhammer – From DRAM faults to escalating privileges

    Sponsored by: ComputerWeekly.com

    Discover how Rowhammer attacks, created from a side effect in dynamic random-access memory (DRAM) that occurs due to increased density, can affect your company's cyber security and how best to protect against them

  • Backup: A Critical Security Tool as you Transition to a Fully Remote Workforce

    Sponsored by: Barracuda

    In this webinar presented by Stasia Hurley, Senior Product Marketing Manager for data protection at Barracuda, see why making sure your backup strategy up to date is especially important during the COVID-19-caused transition.

  • Why It’s Time to Rethink Your Storage Refresh

    Sponsored by: Pure Storage

    With an evergreen, upgradeable architecture, organizations can free themselves from the relentless legacy storage refresh cycle. Look over this datasheet to learn about Pure Storage Evergreen, a solution that enables continuous updates with no planned downtime and can lead to lower TCO by improving time management.

  • Machina Tools for Cloud Storage

    Sponsored by: Ionic Security

    A data security solution for multi-cloud storage should provide cross-cloud data security, automated incident responses, regulatory requirement tracking, and data security blind spot protection. Access this datasheet to explore a single interface multi-cloud solution that does all this while providing 3 key business benefits.

  • How Backup Vendors are Responding to Ransomware Attacks

    Sponsored by: Asigra

    Learn about the three ways backup and data protection vendors are responding to escalating ransomware threats – and which one of those options is proving to be the most effective countermeasure.

  • File-Based Storage Systems for the Cloud

    Sponsored by: Qumulo

    The cloud-based file storage landscape is constantly changing, making it important to keep up with the crucial offerings from different vendors. Unlock this white paper to learn which vendors to watch for and to hear about 3 crucial observations to enhance your multi-cloud data storage strategy.

  • Physical Servers Backup with Veeam: Best Practices and Configuration

    Sponsored by: Veeam Software

    However, when looking for a physical backup solution, it is often difficult to provide comprehensive protection with just one product. Explore this e-book to learn the multiple options to consider when researching physical server backup and recovery and to view a potential solution that offers central agent management and deployment.

  • Your SAN Zoning Crash Course

    Sponsored by: Cirrus Data Solutions

    Understanding the ins and outs of SAN zoning, as well as the factors that affect it, can be intimidating and having a reference guide can simplify the learning curve. Read this e-guide to discover which type of SAN zoning you should use, the difference between SAN zoning and VSANs, the common zoning schemas, and more.

  • Active Directory and Backup

    Sponsored by: Veeam Software

    A bad backup configuration can lead to many problems, most notably, failure to restore Microsoft Active Directory at all. Watch this webinar to learn how to configure AD backup jobs, avoid fails at restores, and verify the recoverability of every Active Directory backup.

  • Shedding Light on OEM Storage Support

    Sponsored by: Service Express

    If you are being strong-armed into replacing your current storage with the newest equipment, remember that the “one-option-only” perception is just an illusion. Access this white paper to learn 6 must-know facts before your next storage buy.

  • The Future of Flash Storage

    Sponsored by: Qumulo

    Most file products tightly coupled with their hardware, meaning they can’t take advantage of market innovations. Fortunately, there is an exception. Access this webinar to learn about current and future flash storage market trends, why legacy storage may not keep up with the data explosion, and how Qumulo plans to remain on the cutting edge.

  • Computer Weekly - 19 November 2019: Is facial recognition happening too fast?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, as the Information Commissioner calls on police forces to slow down the introduction of facial recognition, we examine the issues. We look at what the use of DevOps methods means for storage strategy. And we talk to Microsoft's global cyber security chief. Read the issue now.

  • How APAC firms can slay the storage management beast

    Sponsored by: ComputerWeekly.com

    The data deluge and compliance requirements are shaping how Asia-Pacific firms are approaching storage management issues in the age of cloud. Read about the strategies that MinterEllison and the Rehabilitation Institute of Singapore are using to minimise storage complexity and manage data growth.

  • CW Europe September 2019: Netherlands authorities halt datacentre construction and call for a policy rethink

    Sponsored by: ComputerWeekly.com

    The Netherlands has for years attracted datacentre investment and has seen major construction projects. Amsterdam alone has 33 datacentres within a radius of 20km. So when the local authority in Amsterdam and Haarlemmermeer called an immediate halt to datacentre construction, it was a shock.

  • Infographic: 2019 Europe IT Priorities, Storage

    Sponsored by: ComputerWeekly.com

    In this infographic, we take a look at what the most popular primary and secondary storage initiatives are in 2019 as well as how much storage will be maintained on-premise across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.

  • Computer Weekly – 12 February 2019: The Met Office storms ahead on data analytics

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, find out how the Met Office takes 2TB of weather data every hour and turns it into useful business insight. We examine whether Amazon's presence in the retail market is putting off other retailers from using its public cloud services. And we look at the new 802.11ax wireless networking standard. Read the issue now.

  • Containers: Making security and business sense

    Sponsored by: ComputerWeekly.com

    In this e-guide we look at why established security suppliers are finally adding containers to their repertoire, and how security pros must decide between trusted platform integration and the latest features from startups.

  • Storage performance: From fundamentals to bleeding edge

    Sponsored by: ComputerWeekly.com

    In this guide we look at LUN provision and management, RAID and flash storage, plus tuning for analytics workloads and key emerging technologies that can give your organisation a competitive advantage in mission-critical operations, such as storage-class memory, NVMe flash and persistent memory.

  • CW ASEAN: European data law - be aware and prepare

    Sponsored by: ComputerWeekly.com

    Businesses across ASEAN will soon have to comply with a new data protection law – the General Data Protection Regulation (GDPR) that will apply to companies that collect the personal data of Europeans. In this month's edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and its impact on businesses.

  • CW ANZ: Prepare for EU data law

    Sponsored by: ComputerWeekly.com

    Faced with the double whammy of complying with Australia's upcoming data breach notification law and Europe's new data protection rules, Australian firms are behind where they need to be in their compliance efforts. In this month's CW ANZ, learn how Australia is getting ready for the GDPR and the challenges they are facing in meeting the new laws.

  • Computer Weekly Buyer's Guide to EU General Data Protection Regulation

    Sponsored by: ComputerWeekly.com

    In this 12-page buyer's guide, we look at the tools that could be used for compliance, the incentive to create a smarter, leaner business, and the myths surrounding the new rules.

  • The Security of Software Containers & Sandboxing

    Sponsored by: CloudPassage

    Sandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.

  • Building the Best Backup Plan for Today's Storage Environment

    Sponsored by: Iron Mountain

    In this expert-guide, learn about how your offline backups could be the key to keeping your data safe from the online threat of ransomware. Then, explore how dangerous over-protecting your information can be, and how a data retention policy can keep that from happening, and more.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.