ComputerWeekly.com Research Library

Powered by Bitpipe.com

Backups White Papers

  • RPO vs. RTO: Key Differences Explained

    Sponsored by: Parsec Labs

    However similar in acronym, the definitions of RPO and RTO differ, as do their computing needs, cost implications, and how to build them into a variety of resilience plans. Read this custom TechTarget e-guide on RPO vs. RTO: Key Differences Explained to set the record straight.

  • The Long Road Ahead to Ransomware Preparedness

    Sponsored by: Cohesity

    In this latest eBook from ESG, you’ll learn research-backed methods to mitigate and respond to evolving ransomware threats, recover your data, ensure business continuity, and refuse the ransom.

  • Validation Of Cohesity Accelerated Recovery From Ransomware

    Sponsored by: Cohesity

    In this report, Evaluator Group reveals how Cohesity covers the core tenets of ransomware protection, including using backup data to reduce the risk of production systems being compromised and getting the business back online as quickly as possible following an attack. Read the report to get the detailed analysis from Evaluator Group.

  • Computer Weekly – 4 October 2022: Putting APIs to work

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.

  • Computer Weekly - 26 July 2022: Inside Russia's Ukraine information operations

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we get the inside track on Russia's disinformation operations attempting to spread propaganda and cyber threats about the invasion of Ukraine. Our new buyer's guide looks at customer and employee experience management. And we assess 10 top Kubernetes backup suppliers. Read the issue now.

  • Greater Ransomware Protection with Data Isolation and Air Gap Technologies

    Sponsored by: Commvault

    Commvault Complete™ Backup & Recovery software includes several layers and tools to protect and restore your data and applications. Check out this white paper to learn the key advantages and value of Commvault data protection with data isolation and air gapping in the fight against ransomware.

  • Buyer's guide to backup and recovery software

    Sponsored by: TechTarget ComputerWeekly.com

    In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.

  • Infographic: 5 considerations before buying data center backup software

    Sponsored by: TechTarget ComputerWeekly.com

    Trying to cross-correlate how one vendor implements a product feature and comparing it to another vendor's features can be a daunting task. Backup and recovery software moves data through almost the entire data center infrastructure, so implementing it, training staff and obtaining support for it is no small feat.

  • Data backup failure: Top 5 causes and tips for prevention Infographic

    Sponsored by: TechTarget ComputerWeekly.com

    Backups are central to any data protection strategy, and they are critical to any disaster recovery plan. Unfortunately, backup failure is all too common. When you look at the reasons for failure, the same issues come up again and again. Download this exclusive infographic and find more about how to prevent backup failure.

  • Step-by-step disaster recovery planning guide

    Sponsored by: TechTarget ComputerWeekly.com

    IT disaster recovery is a fundamental task for all organisations. Reasons range from legal and regulatory compliance to the ability to function after an outage. In this e-guide we outline in detail the key steps of disaster recovery planning.

  • CloudCasa Offers Bring-Your-Own Storage for Kubernetes Backup

    Sponsored by: Catalogic Software

    CloudCasa now enables users to bring their own storage for backups alongside a handful of other new features, including security posture review capabilities and cross-cloud Kubernetes cluster restorations. Get the full scoop on these latest CloudCasa updates in the following TechTarget expert guide.

  • The vulnerability of backup in a predominantly remote + cloud world

    Sponsored by: TechTarget ComputerWeekly.com

    Backup is fundamental to IT, but things have changed a lot recently. The pandemic has had a key impact in this. In this e-guide we look at the effects of the pandemic on backup, including the increased prevalence of remote working and use of the cloud.

  • Best Practices for Microsoft 365 Business Continuity

    Sponsored by: Spanning Cloud Apps

    Explore this e-book to learn about Spanning 360, enterprise-class, end-to-end protection for Microsoft 365 that is purpose built, cloud-native, and is easy to install, manage, and use.

  • Infographic: 10-step guide for testing backups

    Sponsored by: TechTarget ComputerWeekly.com

    Creating and adopting a data backup plan is only the first step to protect enterprises against the possibility of a system failure. To achieve complete data protection, it is also necessary to establish a backup testing strategy. Here are ten recommendations to ensure that your organization's data will always be safe, secure and rapidly available.

  • Ransomware Questions to Ask for Optimal Backup Protection

    Sponsored by: Commvault

    PH

  • CloudCasa Backup-as-a-Service

    Sponsored by: Catalogic Software

    Explore this Evaluator Group product brief to learn about the usage and deployment of Catalogic CloudCasa and see what sets it apart from the competition.

  • CloudCasa - Kubernetes and Cloud Database Backup as a Service

    Sponsored by: Catalogic Software

    CloudCasa helps organizations quickly and easily backup their complex cloud applications from Kubernetes environments to cloud databases, without extensive prior expertise. Read on learn more about CloudCasa’s offerings, including free storage management via one centralized platform that makes it easy to back up and recover your critical data.

  • Ransomware: How to Protect and Recover Your Data From this Growing Threat

    Sponsored by: Catalogic Software

    Check out this white paper to learn how to protect and recover your data from the growing threat that is ransomware and discover how Catalogic Software for modern data protection may be able to help.

  • Modern Data Protection for Databases

    Sponsored by: Rubrik

    Access this e-book to view the full advantages of modern database protection including what that entails and how it can deliver more value while giving precious time back to DBAs and backup admins.

  • Top 20 Questions to Ask When Modernizing Your Backup

    Sponsored by: Rubrik

    Explore this white paper to discover how to effectively evaluate modern data protection solutions in the marketplace, detailing the top 20 questions to ask prospective vendors.

  • Ransomware Recovery, Rubrik Special Edition

    Sponsored by: Rubrik

    Dive into this Ransomware Recovery e-book to learn a sensible approach to recovering quickly from ransomware attacks that can’t be avoided.

  • The Gorilla Guide to Backup & Recovery Best Practices

    Sponsored by: Rubrik

    Check out this e-book for backup & recovery best practices including why traditional backup/DR could be failing you, how to fight the scourge of ransomware, and what it takes to stay one step ahead of the bad guys.

  • Top 10 “Must Have” Qualities for a Modern Backup and Recovery Solution

    Sponsored by: Rubrik

    Check out this white paper to learn 10 “must have” factors required for a modern backup and recovery solution based on the experience of real users, who write about their experience with Rubrik on IT Central Station.

  • Achieving Persistent Backup for Kubernetes

    Sponsored by: Catalogic Software

    Explore this expert guide to learn how persistent backup for Kubernetes can be achieved with CloudCasa and learn how new backup strategies are changing IT approaches to container management.

  • Computer Weekly – 20 July 2021: Ripe for change – mixing digital innovation with traditional winemaking

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we find out how global winemaker Concha y Toro uses the latest tech to enhance 150-year old traditional processes. Pharma giant GSK explains how an API strategy is changing its business model. And we talk to retailers using video technology to bridge the gap between in-store and online selling. Read the issue now.

Browse by Report Type: Backups White Papers | Backups Multimedia | Backups IT Downloads

See more topics related to: Backups

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2023 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.