Securing the Digital Frontier: Inside Dell and AMD’s Zero Trust Approach
sponsored by Dell Technologies & AMD
PRODUCT OVERVIEW:
Dell and AMD have created a cyber resilient architecture that utilizes a zero-trust strategy, embracing the idea that system components are vulnerable at each link in the chain and offering protection at every point. Download this product overview, which provides an analysis of how Dell and AMD's cooperative zero-trust can secure your business.
Posted: 12 Nov 2024 | Published: 12 Nov 2024
|
|
|
CW APAC May 2023 – Expert advice on security and threat intelligence
sponsored by TechTarget ComputerWeekly.com
EZINE:
Computer Weekly looks at the software supply chain, Mimecast's email security, Australian data breaches and Singapore's threat intelligence.
Posted: 18 May 2023 | Published: 18 May 2023
|
|
|
Buyer's guide to backup and recovery software
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE:
In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.
Posted: 14 Jul 2022 | Published: 14 Jul 2022
|
|
|
Infographic: 5 considerations before buying data center backup software
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Trying to cross-correlate how one vendor implements a product feature and comparing it to another vendor's features can be a daunting task. Backup and recovery software moves data through almost the entire data center infrastructure, so implementing it, training staff and obtaining support for it is no small feat.
Posted: 14 Jun 2022 | Published: 14 Jun 2022
|
|
|
Data backup failure: Top 5 causes and tips for prevention Infographic
sponsored by TechTarget ComputerWeekly.com
EBOOK:
Backups are central to any data protection strategy, and they are critical to any disaster recovery plan. Unfortunately, backup failure is all too common. When you look at the reasons for failure, the same issues come up again and again. Download this exclusive infographic and find more about how to prevent backup failure.
Posted: 17 May 2022 | Published: 17 May 2022
|
|
|
Cloud backup vs traditional backup
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Cloud backup vs. traditional backup is an important discussion. While the cloud backup market is soaring, traditional backup players may also have much to offer your organisation. In this e-guide we look over the advantages and disadvantages of both backup offers.
Posted: 08 Feb 2021 | Published: 06 Dec 2019
|
|
|
A Computer Weekly buyer's guide to data protection
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
Data protection is now an unavoidable consideration in business, and the costs of not getting it right are higher than ever. In this 14-page buyer's guide, Computer Weekly looks at the larger fines coming out of the EU's GDPR, the importance of focusing on business value and the advantages of building compliance into your company's culture.
Posted: 08 Feb 2021 | Published: 20 Aug 2019
|
|
|
Ransomware Backup Protection Requires a Comprehensive Approach
sponsored by Informa TechTarget
RESOURCE:
We've curated the most current and sought-after features from our editorial staff in one, easy-to-digest guide so enterprises like yours have a resource to help them safeguard their backups from ransomware. Simply click claim my guide to access the exclusives inside, including how to operate post-attack and 4 ways to test your recovery plan.
Posted: 08 Feb 2021 | Published: 03 Dec 2019
|
|
|
Backup fundamentals in the age of cloud
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide we look at backup fundamentals like choosing incremental or differential backup as well as using snapshots to replace traditional backup. We also provide an overview of strategic considerations for backup in the age of the cloud as well as surveys of the key backup products for SMEs and enterprise deployment.
Posted: 08 Feb 2021 | Published: 29 May 2019
|
|
|
No deal Brexit: Ideal or Ordeal?
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
In this e-guide, we bring together the latest advice for businesses on what leaving the EU without a deal would mean for your data protection strategy.
Posted: 08 Feb 2021 | Published: 28 Feb 2019
|
|
|
Focus: backup, replication and snapshots
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
We walk you from the basics of backup methods to the pros and cons of different ways of protecting data and key issues in virtual machine backup.
Posted: 08 Feb 2021 | Published: 27 Jun 2017
|
|
|
A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE:
This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016
|
|
|
WAN Acceleration and Optimization FAQ
sponsored by Riverbed Technology, Inc.
PRESENTATION TRANSCRIPT:
Learn more about WAN acceleration and optimization by reading this interview conducted by Chris Griffin, Assistant Editor for SearchDisasterRecovery.com. Here he asks Jeff Boles, Senior Analyst with the Taneja Group, the questions your organization needs to know in order to increase the performance of its WAN.
Posted: 04 Aug 2009 | Published: 01 Aug 2009
|
|
|
Bloor Research - Data Discovery Spotlight
sponsored by Talend
ANALYST REPORT:
In this Spotlight Report, Research Director Philip Howard explains why data discovery is of fundamental importance to data integration, data quality, and many other projects ranging from business intelligence through master data management to data governance and data archival. Read on to learn more about the importance of data discovery.
Posted: 28 Jul 2009 | Published: 28 Feb 2009
|
|
|
Enterprise Backup and Recovery Considerations: How to Maintain Your Restore-Readiness
sponsored by Sirius Computer Solutions
WHITE PAPER:
IT systems are vulnerable to a variety of disruptions. This paper will focus on common processes and procedures that should be part of any effective enterprise backup/restore system.
Posted: 08 Jul 2009 | Published: 26 Jun 2009
|
|
|
ESG Brief: FalconStor VTL Hyper-Accelerates Backup
sponsored by FalconStor Software
ANALYST BRIEF:
Even with the addition of a virtual tape library (VTL) solution to the backup environment, performance bottlenecks caused by inefficiencies on the host side of the backup process remain a challenge. This can now be addressed with an add-on to FalconStor VTL that accelerates backups four to eight-fold and reduces impact on production servers.
Posted: 16 Jun 2009 | Published: 01 May 2009
|
|
|
Storage magazine Online June 2009: Heal Thyself
sponsored by TechTarget Storage
EZINE:
A trend in storage product messaging these days is the theme of self-healing storage - the ability of a system to detect and repair hard disk problems automatically. In this month's cover story, independent storage expert Marc Staimer explains how and how well they work. This electronic issue also includes features on storage efficiency...
Posted: 28 May 2009 | Published: 28 May 2009
|
|
|
Backup School 2009
sponsored by EMC Backup and Recovery Solutions
PRESENTATION TRANSCRIPT:
This Advanced Backup School seminar presentation is guaranteed to provide you with time-tested advice and techniques that will make backup easier. Renowned backup guru W. Curtis Preston will review the basics - but will also be going into in-depth detail on the newest issues, technologies, and solutions surrounding backup.
Posted: 27 May 2009 | Published: 26 May 2009
|
|
|
Backup and Recovery for Microsoft Exchange Server - Data Domain Deduplication Storage Best Practices Guide
sponsored by EMC Backup and Recovery Solutions
WHITE PAPER:
In many companies, Microsoft Exchange is now commonly viewed as a mission-critical application. Protecting Exchange information is critical and backup is still the primary method used. This paper focuses on the traditional backup and recovery practices for Microsoft Exchange Server along with solutions from Data Domain.
Posted: 08 May 2009 | Published: 08 May 2009
|
|
|
Backing Up Virtual Servers
sponsored by BakBone
PRESENTATION TRANSCRIPT:
In this presentation transcript, backup expert, Mark Bowker, answers questions regarding virtual server environments and how their deployment affects the backup process.
Posted: 06 May 2009 | Published: 15 Apr 2009
|
|
|
Continuous Data Protection
sponsored by FalconStor Software
PRESENTATION TRANSCRIPT:
If your company seeks to eliminate or drastically reduce backup windows to create faster point-in-time recoveries for more mission-critical apps, CDP software is a viable alternative to traditional backup software. Take a few minutes to read this presentation transcript to learn more about the technology.
Posted: 06 May 2009 | Published: 28 Apr 2009
|
|
|
Storage Magazine Online May 2009: Put Dedupe to the Test
sponsored by TechTarget Storage
EZINE:
In this month's Storage Magazine Online cover story, our resident backup expert, W. Curtis Preston, shows how to test various systems against your data so you can make the right decisions. Plus, check out features on recession-proof storage tips, four-tier storage design, and Continuous Data Protection (CDP).
Posted: 05 May 2009 | Published: 01 May 2009
|
|
|
Presentation Transcript: Consolidate and Simplify Backup and Recovery for Your VMware Environment
sponsored by EMC Backup and Recovery Solutions
PRESENTATION TRANSCRIPT:
In this presentation you will learn about this powerful solution, hear about specific deployments and the resulting benefits.
Posted: 16 Apr 2009 | Published: 15 Apr 2009
|
|
|
Great Things Happen on the Road to Disaster Recovery
sponsored by AppAssure Software, Inc.
CASE STUDY:
In the event of a disaster, Raycom needed to be able to minimize downtime and recover their systems quickly. Read this case study and discover how Replay AppImage can restore Exchange data and provide reliable backup.
Posted: 14 Apr 2009 | Published: 10 Apr 2009
|
|
|
e-Guide: Windows Server Disaster Recovery - Planning for the Worst
sponsored by AppAssure Software, Inc.
EDITORIAL RESOURCE GUIDE:
The impact of natural, random and man-made disasters on Windows Server applications, especially email, and their subsequent disruption can cripple an organization. This white paper offers advice for protecting your existing Windows Server infrastructure from disruptive application outages.
Posted: 09 Apr 2009 | Published: 09 Apr 2009
|
|