You've requested...

Managing the Information That Drives the Enterprise STORAGE

If a new window did not open, click here to view this asset.

Download this next:

Your expert guide to data protection strategy: backup, replication, snapshots and virtualisation

Data protection is vital to all organisations. But there are many ways to approach it. From traditional and agent-based to approaches tailored to virtual environments to replication and snapshots. We walk you from the basics of backup methods to the pros and cons of different ways of protecting data and key issues in virtual machine backup.

These are also closely related to: "Managing the Information That Drives the Enterprise STORAGE"

  • On-prem Backup Solution for CIO Hosted Production Apps

    The IBM CIO organization faced challenges in managing backups for its on-premises infrastructure. To streamline this, they implemented a centralized, cloud-based data protection solution using IBM technology and Cobalt Iron's Compass platform. This provided a self-service portal for over 400 application owners to manage backups for critical data. Key benefits included:

    • Robust cybersecurity features
    • Support for multiple workloads like containers, VMs, and databases
    • A consistent user experience across the backup infrastructure

    This unified platform increased productivity and efficiency for application owners. Read this full case study to learn more about IBM's backup strategy transformation.

  • Modernizing backup and recovery to meet today's demands

    Traditional backup solutions can't meet today's enterprise needs due to remote work, data growth, and cyber threats. This white paper introduces a modernized, hyperconverged data protection platform with:

    • Hyperconvergence for a unified architecture
    • Analytics-driven automation for reliability
    • Integrated security against ransomware
    • As-a-service delivery to cut costs and simplify operations
    • And more

    The full white paper explains how this modernized backup and recovery strategy meets current enterprise demands. Read on to find out how you can strengthen data protection for your business.

Find more content like what you just read:

  • Security leader's guide to remote work data backup

    This white paper explores how enterprises can establish secure remote backup and data protection with Cobalt Iron Compass. Inside, you’ll learn how your business can run hands-free backup and ensure data recoverability - all while simplifying management. Read the full white paper now to learn more.

    Download

  • Beyond the Firewall

    This white paper uncovers insights from leading CISOs on today's top security challenges, including third-party breaches, resource constraints, and evolving attack tactics. Inside, you'll find out how CISOs can build more resilient, responsive security strategies. Read on now to learn more.

    Download

  • Simplify NAS Backup

    In this product overview, you'll learn how you can simplify your network attached storage (NAS) backup with a modern approach that delivers policy-based service level management, faster recovery, and cloud integration. Read on to find out how Compass NAS Agent can streamline your data protection strategy.

    Download

  • Securing Backup Environments: Beyond Zero Trust

    Traditional security approaches like zero-trust may not be enough to protect critical backup environments from modern cyber threats. In this white paper, you'll discover how the Zero Access model in Cobalt Iron Compass can provide advanced cyber resilience to safeguard your backup data. Read the full white paper now to learn more.

    Download

  • Cloudflare One for Data Protection

    Data occupies an increasingly important and complex role in the way modern organizations run, but as a result, it has become a primary focus for attackers. Cloudflare One’s data protection suite is built to stay at the forefront of these distinctly modern risks. Download this product overview to learn more.

    Download

  • Countdown to GDPR

    In this week's Computer Weekly, with the EU General Data Protection Regulation (GDPR) coming in to force this year, we look at the challenges for businesses to comply by the 25 May deadline. We examine the future for HPE as CEO Meg Whitman steps down. And we find out how hyper-converged systems affect your backup strategy. Read the issue now.

    Download

  • A Computer Weekly E-guide to NAS

    In the guide we look at the fundamentals of NAS and the use cases it best suits, the range of file access storage products available including in the cloud and in hybrid operation between cloud and datacentre. We also examine the question of NAS backup, looking at the challenges that have accompanied it and the solutions available.

    Download

  • 10 Recovery Objectives Best Practices

    Recovery objectives are the foundational metric for building your disaster recovery strategy. Building your backup and recovery strategy based on your recovery objectives can provide you with confidence that when disaster hits, you are ready to recover with minimal data loss and impact on business processes and protect your business’s brand.

    Download

  • Best practices for remote data backups

    This guide provides tips and best practices for your organisation's offsite data backups. It addresses questions you need to ask to determine which remote backup approach is the right fit for your organisation. In this e-guide, discover which remote backup strategy is right for your organisation.

    Download

  • Backup fundamentals in the age of cloud

    In this e-guide we look at backup fundamentals like choosing incremental or differential backup as well as using snapshots to replace traditional backup. We also provide an overview of strategic considerations for backup in the age of the cloud as well as surveys of the key backup products for SMEs and enterprise deployment.

    Download

  • It's hyper converged-with-everything in today's datacentre

    In this e-guide we look at the key hyper-converged vendors and their products, as well as hyper-converged tailored to disaster recovery, backup, cloud functionality, and the software-defined hyper-converged products available.

    Download

  • Backup deduplication: a complete guide

    There are many elements to consider in picking the backup deduplication technology that fits best. How do zone-level and block-level deduplication compare? What about inline versus post-processing deduplication? What are the differences between deduplication and compression? Check out this complete e-guide to backup deduplication.

    Download

  • Backup still fundamental but the cloud changes things

    In this e-guide we round up the key ways backup has changed since tape was king and look at developments such as backup appliances, the use of the cloud as a backup target and even the need for backups to protect your workloads in the cloud.

    Download

  • Containers and storage 101: The fundamentals of container storage

    In this e-guide we look at the basics of Docker storage and backup, key containers capabilities in storage vendors' offers and how containers can be incorporated into the private cloud environment.

    Download

  • Secure Efficient and Flexible Capacity Tier for Veeam Backups

    PH

    Download

  • Storage trends 2016: Storage priorities, cloud appliances and NAS vs object storage

    This guide offers a collection of our most popular articles on storage-related issues from the first few months of 2016.

    Download

  • CW APAC: August 2023 – Expert advice on storage and backup

    In this handbook, focused on storage and backup in the Asia-Pacific region, Computer Weekly looks at why 3-2-1 backup is still relevant, how researchers are overcoming restraints found in typical DNA storage systems, Dell's latest offerings and the future of HDDs.

    Download

  • SAN block access storage in the age of cloud and hyper-converged

    In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.

    Download

  • SAN block access storage in the age of cloud and hyper-converged

    In this e-guide we look at the key decision points when it comes to choosing SAN (or NAS) vs software-defined storage and hyper-converged. We also look at the fundamentals of block access storage vs file and object and also look at how these services are provided in the big three cloud providers' universes.

    Download

  • CW APAC, February 2020: Expert Advice: Container Storage

    In this handbook, focused on storage in the Asia-Pacific region, Computer Weekly looks at how container applications can make companies more agile, the cost benefits of data storage and the most common data storage myths that need to be debunked.

    Download

  • 8 Benefits of a Backup Service for Microsoft 365

    Read this e‑book, “8 Benefits of a Backup Service for Microsoft 365”, to understand what makes cloud‑based backup services so appealing for companies using Microsoft 365 — and why it may be just the thing to keep your business running.

    Download

  • CW APAC, November 2021: Expert guide to storage management

    In this handbook, Computer Weekly looks at how firms are rising to the storage challenge and Lenovo's viewpoint on the Asia-Pacific region's market opportunities

    Download

  • CW APAC – October 2020: Trend Watch: Storage

    In this handbook, Computer Weekly takes a peek at future storage technologies, such as helium and DNA, and offers some valuable tips on how to keep cloud storage costs under control. Read the issue now.

    Download

  • A Computer Weekly buyer's guide to containerisation in the enterprise

    Containerisation is becoming a key part of IT strategy. In this 12-page buyer's guide, Computer Weekly looks at how it can help businesses in a post-pandemic world, assesses the main considerationsfor Kubernetes backup and discusses how to manage enterprise-class containerisation.

    Download

  • A Computer Weekly buyer's guide to flash storage

    Companies have come to count on the high performance of their flash storage services. In this 12-page buyer's guide, Computer Weekly looks at the cost of a variety of options, what the big three cloud providers have to offer and how the issue of reliability is being addressed.

    Download

  • A Computer Weekly buyer's guide to flash storage

    Companies have come to count on the high performance of their flash storage services. In this 12-page buyer's guide, Computer Weekly looks at the cost of a variety of options, what the big three cloud providers have to offer and how the issue of reliability is being addressed.

    Download

  • The vulnerability of backup in a predominantly remote + cloud world

    Backup is fundamental to IT, but things have changed a lot recently. The pandemic has had a key impact in this. In this e-guide we look at the effects of the pandemic on backup, including the increased prevalence of remote working and use of the cloud.

    Download

  • Buyer's guide to backup and recovery software

    In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.

    Download

  • UK IT Priorities 2019

    The results of our 2019 IT Priorities survey are in, and they show the good news that IT budgets are rising faster than they have for many years. Cloud remains the top spending priority for this year, but IT automation is growing fast as a major investment area.

    Download

  • UK IT Priorities 2019

    The results of our 2019 IT Priorities survey are in, and they show the good news that IT budgets are rising faster than they have for many years. Cloud remains the top spending priority for this year, but IT automation is growing fast as a major investment area.

    Download

  • Why you should have a disaster recovery testing plan in place

    With this guide, gain a better understanding of why a disaster recovery testing plan is important, how to efficiently conduct tests, and some tools and terms that you will encounter along the way.

    Download

  • AWS vs Azure vs Google: 5 key benefits each for cloud file storage

    In this e-guide: The big three offer cloud file storage that can ease hybrid cloud operations, with consistency between cloud and on-premise as well as greater enterprise application compatibility.

    Download

  • Data Protection Ascends the Business Agenda

    This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.

    Download

  • UK IT Priorities 2016

    Every year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming 12 months. Our research offers a unique insight into the purchasing decisions of IT decision-makers worldwide.

    Download

  • CW Benelux November 2020-January 2021: Dutch Alzheimer's app helps dementia patients

    An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.

    Download

  • Cloud backup vs traditional backup

    Cloud backup vs. traditional backup is an important discussion. While the cloud backup market is soaring, traditional backup players may also have much to offer your organisation. In this e-guide we look over the advantages and disadvantages of both backup offers.

    Download

  • Computer Weekly – 21 March 2023: The risks of an imbalance in AI

    In this week's Computer Weekly, a leading AI expert explains the risks of an arms race in artificial intelligence caused by the domination of private sector providers. Our latest buyer's guide examines ways to reduce IT's energy use. And we analyse the latest damning revelations from the Post Office scandal inquiry. Read the issue now.

    Download

  • DRaas and the key decision points in DR-as-a-service

    In this e-guide we look at the key decisions you'll need to make about the blend of DRaas your organisation wants, which of the key cloud providers are best for which elements of DR service delivery, the pros and cons of moving elements of disaster recovery to the cloud and which to keep closer to home, and the 12 key steps to DRaas deployment.

    Download

  • A Computer Weekly buyer's guide to on-site, off-site and cloud-based disaster recovery

    With businesses becoming increasingly dependent on data to function, being able to recover quickly from an IT systems failure is critical. In this 14-page buyer's guide, Computer Weekly looks at the various options available when implementing disaster recovery.

    Download

  • 400,000 Residents Impacted by a Cyberattack: Recovery Strategy

    Yes, cyberattacks can compromise businesses – but they can also disrupt entire cities. This case study digs into how an attack sent the City of New Orleans into a state of emergency, temporarily impacting nearly 400,000 residents. To learn about the city's recovery strategy, which included a storage transformation, keep reading.

    Download

  • Data protection: Not just about personal data and compliance

    Despite the focus on data protection, many organisations are still leaving their data wide open for attack through the digital equivalent of leaving the front door open and the windows unlocked from a hacker perspective.

    Download

  • Focus: Private cloud

    The private cloud is often viewed as a stepping stone for enterprises keen to tap into the business agility benefits of cloud without ceding total control over where their applications and workloads run. For some organisations, such deployments act as a test bed environment, where they can work out where best to run their workloads.

    Download

  • Europe IT Priorities 2016

    Every year, Computer Weekly and TechTarget conduct a global survey of our readers to understand their technology spending priorities for the coming 12 months. Our research offers a unique insight into the purchasing decisions of IT decision-makers worldwide.

    Download

  • Top 10 storage stories of 2019

    Computer Weekly's storage content decodes trends and offers practical and technical advice. So, looking at the key storage stories of 2019, we see all the main developments reflected.

    Download

  • 451 Research: Enterprise Buyers’ Guide to Data Protection 2024

    The Enterprise Buyers' Guide to Data Protection 2024 is designed to highlight key market trends and challenges while providing information on what capabilities and processes organizations should consider implementing.

    Download

  • StorPool Storage Overview: Linearly Scalable Primary Storage Platform

    Dual-controller, shared-disk storage arrays have long been the default for storage systems. However, this paradigm is quickly proving unsuitable. To meet your performance and data requirements, consider the efficacy of solutions like StorPool Storage, in this product overview. Read on to tap into the top 8 benefits.

    Download

  • Middle East IT Priorities 2016

    Computer Weekly's annual global survey of readers has once again revealed what CIOs around the world, including an increasing number of Middle East based IT leaders, are planning over the next 12 months.

    Download

  • Computer Weekly – 7 May 2024: Casting a critical eye on HMRC's IR35 checker tool

    In this week's Computer Weekly, we investigate what has been going on with the HMRC's Check Employment Status for Tax (CEST). We also speak to the CIO of Danfoss about making datacentres greener and explore the issue of restoring data and system backups after a ransomware or cyber attack. Read the issue now.

    Download

  • Ransomware Trends Report 2024

    This research report examines the latest ransomware trends and their impacts, including how backups are targeted, the true financial costs, and the need for better alignment between IT and security teams. Learn how to enhance your data protection and cyber resilience strategy. Read the full Research Content.

    Download

  • Cloud computing storage key management

    Jagat Paudel addresses key management in cloud computing storage in this thesis from our Royal Holloway security series.

    Download

  • CW ANZ: Taming the data beast

    Software-defined storage (SDS), which promises greater transparency and control over data, is an increasingly important tool in the enterprise technology armoury. In this issue of CW ANZ, we look at how Australian enterprises are turning to SDS to improve data management and direct data to different tiers of storage or to applications.

    Download

  • Computer Weekly – 22 November 2022: Cyber criminals target World Cup Qatar 2022

    In this week's Computer Weekly, as the FIFA World Cup opens in Qatar, we examine the cyber security threats from criminals targeting the event. We report from the Gartner Symposium on the latest predictions for enterprise software development. And we talk to the CIO of Kyiv City Council about managing IT in the shadow of war. Read the issue now.

    Download

  • Computer Weekly - 26 July 2022: Inside Russia's Ukraine information operations

    In this week's Computer Weekly, we get the inside track on Russia's disinformation operations attempting to spread propaganda and cyber threats about the invasion of Ukraine. Our new buyer's guide looks at customer and employee experience management. And we assess 10 top Kubernetes backup suppliers. Read the issue now.

    Download