You've requested...

Public cloud and backup policies: 3 tips before accepting a contract

If a new window did not open, click here to view this asset.

Download this next:

CW ASEAN: European data law - be aware and prepare

Organisations across the ASEAN region will soon have to comply with another piece of data protection legislation – the General Data Protection Regulation (GDPR) that will apply to any company that collects the personal data of Europeans. In this month’s edition of CW ASEAN, we look at how ASEAN is gearing up for the GDPR, the current state of compliance and law’s impact on businesses.

Also in this issue:

  • Personal data of 46.2 million Malaysian mobile subscribers leaked in huge breach: The potential record data breach is only the latest example of the dangers of ‘low and slow’ attacks, which remain dormant inside networks for years without anyone noticing before doing any damage.
  • Veritas takes stock of data management position with more offerings in pipeline: Software supplier Veritas says it has delivered on its promises, but there is still work to do in realizing its data management vision before the upcoming European Union General Data Protection Regulation.
  • Hong Kong cloud firm tests Excelero NVMe for video analytics: Vivavo claims to be running Excelero NVMesh NVMe storage at near-bare metal performance to support real-time analytics for facial and behavioral recognition on closed-circuit television.

These are also closely related to: "Public cloud and backup policies: 3 tips before accepting a contract"

  • IT Project: Hyper-converged infrastructure

    The term hyper-convergence means different things to different people. But at its core, hyper-convergence brings together servers and storage network resources that are managed as a single unit using software. In some ways, it signals a return to a mainframe-like architecture before the rise of client-server, distributed computing model. In this e-guide, learn more about the benefits of hyper-convergence and how you can derive the greatest value from your investment in hyper-converged infrastructure. Plus, read about the movers and shakers in the hyper-converged market and why NVMe is a rapidly rising storage star.

  • Fight back against ransomware. Learn how to do it here.

    In the past, many enterprises considered backup and recovery of their data to be the last line of defense against ransomware. However, with the evolution of cyber threats, its critical for IT teams to realize that true ransomware resiliency begins with backup and recovery as a part of a comprehensive strategy.

     

    In this article, you will go over new trends and threats in the technology industry as well as the best practices you are looking for to help you mitigate those risks and keep your data protected as it should be.

     

    Read on to learn more and see the importance of backup and recovery as part of an overall comprehensive, multi-layered, cybersecurity strategy.

Find more content like what you just read:

  • Backup solutions: Extend your data protection with Veritas

    Regardless of how strong your IT security is, a truly holistic approach to data protection requires a flexible and scalable data backup and recovery solution. Read on to understand the growing threat of ransomware and learn about backup solutions that can help you ensure your data is secure, backed up and always accessible.

    Download

  • Computer Weekly - 29 June 2021: Is the UK government planning to rewrite GDPR?

    In this week's Computer Weekly, a government taskforce on post-Brexit regulations has recommended changes to GDPR in the UK – we examine the implications. The NHS has launched a new data strategy - we look at what it means for your medical records. And we ask how to avoid the performance problems that affect private cloud. Read the issue now.

    Download

  • 6 ways to strengthen backup against cyber threats

    There were 19 ransomware attacks every second in 2021, and many are reporting that costs will surpass $20 billion this year, according to SonicWall. Read this datasheet to discover how to integrate backup processes into your cyber resilience plan and view 6 ways Veritas’ solutions can protect you from these threats.

    Download

  • Improve your organization’s cyber resilience with Veritas

    Cyber threats leave devastating impacts. Bolstering attack surfaces with a strong foundation that detects, defends, and recovers effectively is crucial for a business to keep its operations moving forward without disruption. This ESG

    Download

  • Cost-effective & cloud-native data protection from Veritas

    Access this product overview to learn how Veritas aims to help customers reduce the costs of cloud native data protection by enabling them to only pay for resources as needed, move data to lower-cost storage tiers, dynamically provision cloud compute resources and ensure protection requirements are always met.

    Download

  • Product overview: Veritas strategy for hybrid multi-cloud

    Read this product overview to learn about Veritas’ strategy for designing and managing intelligent hybrid multi-cloud environments for any type of application or IT service.

    Download

  • Backup solutions: Fight ransomware threats with Veritas

    As ransomware attacks evolve and become more sophisticated, it’s of paramount importance for your business to be able to adapt to rapidly changing threat vectors to avoid service downtime and data loss. Access this product overview to learn how you can help your organization establish a robust ransomware resiliency strategy.

    Download

  • 5 ways NetBackup combats modern ransomware threats

    Ransomware attacks are becoming more prevalent and damaging.Front-line defense is not enough to defend against sophisticated ransomware attacks. Enterprises need a multi-layered resiliency framework that bolsters their overall cybersecurity strategy. This resource covers 5 ways Veritas NetBackup promotes resiliency in your cyber security strategy.

    Download

  • Best practices for remote data backups

    This guide provides tips and best practices for your organisation's offsite data backups. It addresses questions you need to ask to determine which remote backup approach is the right fit for your organisation. In this e-guide, discover which remote backup strategy is right for your organisation.

    Download

  • How to control your cloud environment and expenses

    The cloud offers major advantages for organizations, but if it’s not managed closely your budget can get out of control without you realizing it. Read on to learn more about a solution that helps better manage the cloud.

    Download

  • 5 reasons to implement SaaS protection today

    As the growth of SaaS solutions continues to grow by double digits year after year, organizations are consuming more SaaS products than ever before. It does’t matter if your business is using Microsoft 365, Google Workspace, Box, or others – learn about an enterprise-centric SaaS backup and protection solution and control your data.

    Download

  • 10 tips for ransomware

    Every organization needs to be aware of the threat of ransomware. Today, ransomware affects everyone from enterprises to SMBs. This means it is not a matter of if, but when you will be attacked. However, it is not an invincible opponent. Ransomware is only as strong as your organizations weakest link. Read on to learn more and harden your security.

    Download

  • ESG showcase: Introducing Veritas Cloud Scale Technology

    Read this ESG Showcase to understand why it has never been more pressing for organizations to employ autonomous intelligent data management to help them keep pace with organizational and business needs.

    Download

  • Backup deduplication: a complete guide

    There are many elements to consider in picking the backup deduplication technology that fits best. How do zone-level and block-level deduplication compare? What about inline versus post-processing deduplication? What are the differences between deduplication and compression? Check out this complete e-guide to backup deduplication.

    Download

  • Creating a simple, scalable infrastructure with Veritas

    A simple and scalable infrastructure enables data protection across a multi-cloud environment. To assist businesses in their digital transformations, Veritas has emerged as a partner. Explore this infographic to learn how Veritas can help businesses create more agile, protected and cost-effective infrastructures.

    Download

  • CW Middle East - July-September 2021: Pandemic speeds up edtech revolution in Gulf

    One of the lessons the Covid-19 pandemic has taught governments across the world is that education providers can still teach when their premises are inaccessible. Read how organisations in the Gulf region's education sector have been quick to adopt the latest education technology, known as edtech, to help in this endeavour.

    Download

  • Computer Weekly – 30 July 2019: Digital takes the racing line in Formula One

    In this week's Computer Weekly, we talk to the CIO of Formula One racing team Haas F1 to find out how technology is helping to compete with better-funded rivals. We examine the latest best practice advice on disaster planning. And we look at what the troubles at Deutsche Bank tell us about the rise of fintech startups. Read the issue now.

    Download

  • How Australian organisations are coping with big data storage challenges

    In this e-guide, read about how Australian organisations are coping with the storage challenges of big data, why flash storage is still too expensive for some companies and how NetApp is evolving to keep up with changes in the industry.

    Download

  • Essential SaaS Disaster- & ransomware-recovery capabilities

    This 451 Research report explores how Veeam is enhancing its disaster-recovery and ransomware-recovery capabilities as market demand for these products and services increases. Open now to learn about its products’ strengths, weaknesses, opportunities, threats and more.

    Download

  • Buyer's guide to backup and recovery software

    In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.

    Download

  • Focus ASEAN: Enterprise Mobility

    With 4G networks and mobile apps that do almost everything from filing corporate expenses to locating an item in a warehouse, enterprise mobility now enables not only managers but also rank and file workers to be more competitive and efficient.

    Download

  • Backup and recovery: Who is the leader?

    Enterprises are constantly challenged with managing data growth across complex multi-cloud environments which brings larger attack surfaces and increased threat risk. To find out what solution Gartner has put in the Magic Quadrant 17 times now, read on to learn more.

    Download

  • CW APAC – October 2020: Trend Watch: Storage

    In this handbook, Computer Weekly takes a peek at future storage technologies, such as helium and DNA, and offers some valuable tips on how to keep cloud storage costs under control. Read the issue now.

    Download

  • Multi-Cloud Management

    In this e-guide, we take a closer look at how some organisations are overcoming the challenges of multi-cloud, and – in turn – reaping the rewards of expanding the range of suppliers they source services from.

    Download

  • Backup fundamentals in the age of cloud

    In this e-guide we look at backup fundamentals like choosing incremental or differential backup as well as using snapshots to replace traditional backup. We also provide an overview of strategic considerations for backup in the age of the cloud as well as surveys of the key backup products for SMEs and enterprise deployment.

    Download

  • Backup fundamentals in the age of cloud

    In this e-guide we look at backup fundamentals like choosing incremental or differential backup as well as using snapshots to replace traditional backup. We also provide an overview of strategic considerations for backup in the age of the cloud as well as surveys of the key backup products for SMEs and enterprise deployment.

    Download

  • CW APAC, February 2021: Buyer’s guide to data management

    In this handbook, focused on data management in the Asia-Pacific region, Computer Weekly looks at best practices, Alibaba’s use of databases, the role of artificial intelligence in handling information and data trends to look out for

    Download

  • How IT teams can achieve more powerful computing

    Access this expert handbook to understand how branching out to HPC service providers, especially colocation, ultimately enables an organization's IT teams to achieve a whole new tier of computing power.

    Download

  • 6 best practices for cloud data protection

    With enterprises storing a higher volume of information in the cloud, data protection has become imperative for security teams. This blog overviews best practices for cloud data protection. These measures include backing up your data, evaluating your built-in security and using file-level encryption. Read on to unlock 3 more best practices.

    Download

  • CW Benelux November 2020-January 2021: Dutch Alzheimer's app helps dementia patients

    An app aimed at helping dementia patients and their families has been developed by the Alzheimer Society in the Netherlands and has been welcomed with enthusiasm.

    Download

  • Computer Weekly – 14 March 2017: UK digital strategy lacks vision and ambition

    In this week's Computer Weekly, we examine the UK government's new digital economy strategy and hear why critics labelled it unambitious and lacking imagination. The recent AWS cloud outage puts the spotlight on cloud and disaster recovery. And we look at the next generation of storage technology. Read the issue now.

    Download

  • Computer Weekly - 26 July 2022: Inside Russia's Ukraine information operations

    In this week's Computer Weekly, we get the inside track on Russia's disinformation operations attempting to spread propaganda and cyber threats about the invasion of Ukraine. Our new buyer's guide looks at customer and employee experience management. And we assess 10 top Kubernetes backup suppliers. Read the issue now.

    Download

  • Beat data fragmentation in the cloud with Rubrik

    Run through this e-book to familiarize yourself with Rubrik’s cloud-native data protection solutions for hybrid and multicloud environments which integrate with AWS, Azure, and Google Cloud Platform to protect native workloads.

    Download

  • Transition from MPLS to SASE and SD-WAN

    In this e-book, dive into the nitty gritty of MPLS contracts and uncover tips, steps, and an overall strategy you can use to transition from MPLS to newer, more affordable, agile WAN alternatives without break the bank.

    Download

  • News update: Keep your finger on the pulse of the latest tech trends

    In this week's Computer Weekly, we find out how Formula 1 chief Ross Brawn is turning to digitization to enhance the fan experience of Grand Prix racing. We also learn how virtual reality is being used to deliver healthcare services. And our experts examine the ethical concerns around artificial intelligence. Read the issue now.

    Download

  • MicroScope – February 2020: The power to transform

    In this issue, MicroScope asks experts what to expect in 2020, and the channel shares why change is necessary to thrive in different business environments

    Download

  • Computer Weekly – 6 September 2022: Out with the old at Asda

    In this week's Computer Weekly, we talk to Asda's CIO Carl Dawson about the supermarket's cloud-oriented renovation of its technology stack. We narrate the security woes at Twitter. And we examine best practices for data backup. Read the issue now.

    Download

  • 5 steps to creating a strong data archiving strategy

    Although archiving is essential, it's not always straightforward. Download this Storage Handbook to discover how to best formulate an archiving process for your growing data sets.

    Download

  • Effectively leveraging cloud-based contracts

    Cloud contracts offer great benefits, but they can put organisations at significantly greater risk than conventional IT service contracts. This report by consultant Bob Fawthrop explains how to mitigate the risks.

    Download

  • Computer Weekly – 26 May 2020: Can Lady Gaga and Madonna get people to take IT security seriously?

    In this week's Computer Weekly, after hackers threatened to release data from a US law firm's celebrity clients, will people finally take cyber security seriously? Designing software for older users makes systems better for all – we examine how. And the IT chief at TSB explains how the bank recovered from its 2018 IT disaster. Read the issue now.

    Download

  • Data protection in the age of Brexit and GDPR

    This 40-page expert guide digs into the Brexit implications for data protection and how the GDPR is driving data protection maturity. Download it now to take advantage of this exclusive offer and to ensure your organization is fully compliant with the regulation.

    Download

  • Compliance and Cloud Security eBook

    SearchSecurity.com presents a comprehensive guide to compliance and cloud security. Our experts cover all the angles in order to help clarify security and compliance issues associated with cloud computing.

    Download

  • CW APAC, November 2021: Expert guide to storage management

    In this handbook, Computer Weekly looks at how firms are rising to the storage challenge and Lenovo's viewpoint on the Asia-Pacific region's market opportunities

    Download

  • Computer Weekly - 3 March 2020: What will points-based immigration mean for IT recruitment?

    In this week's Computer Weekly, we look at the government's new points-based immigration rules and assess the implications for the tech sector. IR35 tax rules change in April – we find out how IT contractors need to prepare. And we examine whether the rise of cloud is really displacing the datacentre. Read the issue now.

    Download

  • Accelerate your cloud migration

    Your business cannot afford to have excessive downtime when migrating massive workloads from on-premises. Access this brief to explore Riverbed’s Cloud Accelerator, which is designed to expedite your cloud migration by eliminating network inhibitors inherent with today’s data-rich and distributed collaboration environments.

    Download

  • Managing Cloud Computing Risk

    Have you done your best to reduce the risk of harm to your company in the event of a service interruption? In this e-guide by SearchCloudSecurity.com, gain expert insight on how to manage the risk of cloud outages as well as uncover a framework you can implement for evaluating cloud computing risk.

    Download

  • Top 10 storage stories of 2019

    Computer Weekly's storage content decodes trends and offers practical and technical advice. So, looking at the key storage stories of 2019, we see all the main developments reflected.

    Download