ComputerWeekly.com Research Library

Powered by Bitpipe.com

Backup Software White Papers

  • ESG White Paper: Storage's Role in Addressing the Challenges of Ensuring Cyber Resilience

    Sponsored by: IBM

    Download this ESG paper to take a deeper look at the concept of cyber resilience, which puts in place recovery solutions to get back to normal as quickly as possible in the event of an attack.

  • Computer Weekly – 21 March 2023: The risks of an imbalance in AI

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, a leading AI expert explains the risks of an arms race in artificial intelligence caused by the domination of private sector providers. Our latest buyer's guide examines ways to reduce IT's energy use. And we analyse the latest damning revelations from the Post Office scandal inquiry. Read the issue now.

  • RPO vs. RTO: Key Differences Explained

    Sponsored by: Parsec Labs

    However similar in acronym, the definitions of RPO and RTO differ, as do their computing needs, cost implications, and how to build them into a variety of resilience plans. Read this custom TechTarget e-guide on RPO vs. RTO: Key Differences Explained to set the record straight.

  • Computer Weekly – 4 October 2022: Putting APIs to work

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.

  • 6 Steps For Resiliency Against Cyber Threats

    Sponsored by: Veritas

    There were 19 ransomware attacks every second in 2021, and many are reporting that costs will surpass $20 billion this year, according to SonicWall. Read this datasheet to discover how to integrate backup processes into your cyber resilience plan and view 6 ways Veritas’ solutions can protect you from these threats.

  • Buyer's guide to backup and recovery software

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.

  • Infographic: 5 considerations before buying data center backup software

    Sponsored by: TechTarget ComputerWeekly.com

    Trying to cross-correlate how one vendor implements a product feature and comparing it to another vendor's features can be a daunting task. Backup and recovery software moves data through almost the entire data center infrastructure, so implementing it, training staff and obtaining support for it is no small feat.

  • CloudCasa Offers Bring-Your-Own Storage for Kubernetes Backup

    Sponsored by: Catalogic Software

    CloudCasa now enables users to bring their own storage for backups alongside a handful of other new features, including security posture review capabilities and cross-cloud Kubernetes cluster restorations. Get the full scoop on these latest CloudCasa updates in the following TechTarget expert guide.

  • Compass®for Edge Computing

    Sponsored by: Cobalt Iron

    With Cobalt Iron Compass, you can eliminate the complexity and costs normally associated with edge computing backup processes. Download this datasheet to find out how and to discover the essential benefits of leveraging this solution for edge computing backup.

  • COBALT IRON COMPASS®Data Protection for a Remote World

    Sponsored by: Cobalt Iron

    With Cobalt Iron Compass, customers can remotely manage, monitor, track, patch, and protect backup hardware and software—all from a single dashboard. Download the datasheet here to ensure your team can confidently keep your company’s data protection healthy, stable, and secure while working remote.

  • End-to-end Data Protection for the Modern Data Center with Cobalt Iron Compass

    Sponsored by: Cobalt Iron

    Cobalt Iron introduced their Compass platform to drive down cost and fully manage, configure, and maintain data protection processes for you. Access this ESG paper for an in-depth, 3rd party look at Cobalt Iron Compass and the benefits of its fully managed, immutable data and ransomware protection.

  • Computer Weekly – 20 October 2020: Why is IBM splitting in two and what does it mean for CIOs?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, IBM is splitting in two, hiving off its services business to focus on hybrid cloud – we examine what it means for CIOs. Our new buyer's guide looks at how intelligent workload management can cut cloud complexity. And we analyse how getting backup right can help tackle ransomware threats. Read the issue now.

  • Leading Dutch IT Services Provider Gets Complete Office 365 Protection

    Sponsored by: Barracuda

    After successive failures to protect data with their previous backup provider occurred, Truston knew they needed a more efficient off-site backup solution for their O365 data. Download this case study to discover the results of Truston investing in Barracuda Essentials.

  • Global provider and awarding body of British education consigns archaic data backup to history books.

    Sponsored by: Barracuda

    Access this case study to learn the 5 improvements that NCC Education saw in day-to-day archiving and backup operations when they implemented Barracuda Essentials.

  • How to Test Your Company’s Disaster Preparedness

    Sponsored by: Ensono Limited

    Companies that encounter the most surprises during a disaster are the ones that don’t test their BCDR plans or perform tests that aren’t as close to reality as possible. Access this data sheet to learn the questions you should be asking about your BCDR plan, why testing will make your BCDR plans stronger, and helpful scenarios to test.

  • Enterprise Anti-ransomware Backup Solution Profile

    Sponsored by: Cobalt Iron

    Cybersecurity software is the best means to detect and prevent ransomware, but it can’t always stop it. That is where enterprise backup solutions come in. Access this paper from DCIG to discover 5 distinguishing features of anti-ransomware backup solutions.

  • Computer Weekly - 3 December 2019: Meet the most influential people in UK technology

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we reveal our 10th annual list of the 50 most influential people in UK technology, and profile this year's UKtech50 winner, Demis Hassabis, CEO and founder of AI pioneer DeepMind. Also: we examine how continuous software development can improve application security. Read the issue now.

  • A Computer Weekly buyer's guide to supply chain resilience

    Sponsored by: TechTarget ComputerWeekly.com

    The Covid-19 pandemic has put the limits of the supply chain to the test. In this 18-page buyer's guide, Computer Weekly looks at how supply chain management has changed since, what action has been taken to handle it, and why data and automation is enhancing adaptability.

  • CW EMEA - April 2023: Under attack and stressed out

    Sponsored by: TechTarget ComputerWeekly.com

    In this month's CW EMEA, we look at how cyber attacks are taking a toll on security professionals, damaging their mental health and forcing some to quit. We also look at Finland's allure for tech entrepreneurs, how software is enabling a new business model for a Swedish car manufacturer, and the importance of backup testing. Read the issue now.

  • Achieving Persistent Backup for Kubernetes

    Sponsored by: Catalogic Software

    Explore this expert guide to learn how persistent backup for Kubernetes can be achieved with CloudCasa and learn how new backup strategies are changing IT approaches to container management.

  • SD-WAN: The Most Critical Design Considerations

    Sponsored by: NBN

    Experts agree that SD-WAN is the most efficient way to direct network traffic throughout your WAN and lower costs, but you have to ensure you choose the option that meets your architecture, business and performance needs. Access this expert e-guide to delve into the most critical considerations for designing your SD-WAN architecture.

  • Protecting Data in the Cloud

    Sponsored by: Datavita

    There are a variety of techniques that can be used for cloud backup and data protection. Access this e-guide to learn the advantages and disadvantages of 3 types of cloud backup.

  • Top Data Backup Tips Target Remote Protection and the Cloud

    Sponsored by: Datavita

    As the workforce went almost completely remote, cybersecurity has become a growing concern because home networks are typically less secure than business ones. Check out this e-guide to learn 5 backup tips to get through a time like no other.

  • Breaking Down Industry Leading Data Protection Vendors & Options

    Sponsored by: TechTarget Data Backup

    Read this editorial handbook to compare numerous features and functionality of 13 industry-leading data protection vendors that provide virtualization-specific functionality as well as backup protection for organizations of all sizes.

  • Ransomware Backup Protection Requires Comprehensive Approach

    Sponsored by: TechTarget Data Backup

    Read on to discover just how ransomware can infiltrate data backups, what organizations can do to best prepare for this new problem and general guidelines for better backup practices.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.