Storage Backups Reports

Infographic: 5 ways backup can protect against ransomware
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Ransomware threatens to put your data beyond reach, so the best way to prepare is to have good-quality data you can restore from backup. This infographic looks at the top 5 steps CIOs should consider.
Posted: 05 May 2021 | Published: 06 May 2021

TechTarget ComputerWeekly.com

Computer Weekly - 3 December 2019: Meet the most influential people in UK technology
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, we reveal our 10th annual list of the 50 most influential people in UK technology, and profile this year's UKtech50 winner, Demis Hassabis, CEO and founder of AI pioneer DeepMind. Also: we examine how continuous software development can improve application security. Read the issue now.
Posted: 08 Feb 2021 | Published: 03 Dec 2019

TechTarget ComputerWeekly.com

Computer Weekly – 4 October 2022: Putting APIs to work
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, our latest buyer's guide looks at application programme interfaces (APIs) and how they can connect internal and external business processes. We examine the challenges and opportunities of using AI in healthcare. And we find out how retailers are turning to specialist apps to reduce food waste. Read the issue now.
Posted: 30 Sep 2022 | Published: 04 Oct 2022

TechTarget ComputerWeekly.com

Affordability and Reliability Are The Two Key Phrases When It Comes to Disaster Recovery Plans
sponsored by Iron Mountain
EGUIDE: Discover how consistent and thorough testing of your DR plan can prevent any major outages from happening in this expert guide. Read on to find out some quick and easy ways to put together a DR initiative without breaking the bank.
Posted: 23 Feb 2017 | Published: 22 Feb 2017

Iron Mountain

Building the Best Backup Plan for Today's Storage Environment
sponsored by Iron Mountain
EGUIDE: In this expert-guide, learn about how your offline backups could be the key to keeping your data safe from the online threat of ransomware. Then, explore how dangerous over-protecting your information can be, and how a data retention policy can keep that from happening, and more.
Posted: 27 Sep 2017 | Published: 21 Sep 2017

Iron Mountain

CloudCasa Offers Bring-Your-Own Storage for Kubernetes Backup
sponsored by Catalogic Software
EGUIDE: CloudCasa now enables users to bring their own storage for backups alongside a handful of other new features, including security posture review capabilities and cross-cloud Kubernetes cluster restorations. Get the full scoop on these latest CloudCasa updates in the following TechTarget expert guide.
Posted: 11 Mar 2022 | Published: 11 Mar 2022

Catalogic Software

Off-site Backup Versus Cloud Backup: Comparing Your Options
sponsored by Hitachi Vantara Corporation
EGUIDE: What's the difference between off-site backup and cloud backup? And, more importantly, which approach is right for your organization? Download this expert guide to find out with a head-to-head comparison of the two, as well as 4 considerations to help you select your strategy.
Posted: 12 Feb 2019 | Published: 08 Feb 2019

Hitachi Vantara Corporation

Protecting Data in the Cloud
sponsored by Datavita
EGUIDE: There are a variety of techniques that can be used for cloud backup and data protection. Access this e-guide to learn the advantages and disadvantages of 3 types of cloud backup.
Posted: 10 Feb 2021 | Published: 08 Feb 2021

Datavita

Everything You Need to Know about Snapshots
sponsored by TechTarget Storage
EZINE: Download this issue of Storage Magazine to ensure the up-to-date protection and rapid recovery of data by complementing backups with snapshots, and read additional articles such as: hyper-convergence, a boon for data protection?
Posted: 04 Nov 2016 | Published: 04 Nov 2016

TechTarget Storage

How can Cloud Computing Data Protection be Achieved?
sponsored by Dell EMC and Intel®
EGUIDE: Go inside this expert-guide by 25 year industry veteran Chris Evans to learn the 3 main ways to implement cloud computing data protection.
Posted: 26 Jun 2017 | Published: 20 Jun 2017

Dell EMC and Intel®