IT Management  >   Systems Operations  >   Storage Management  >  

Offsite Data Storage

RSS Feed   
Offsite Data Storage Reports
 
Veeam: Advanced Integration for Pure Storage
sponsored by Veeam Software
WHITE PAPER: Implementing an agile data protection and recovery system can protect against system failures and inadvertent data corruption or loss. Read this white paper to learn about Veeam’s Availability Suite which provides comprehensive data protection capabilities and the benefits of partnering this suite with all-flash.
Posted: 29 Jan 2020 | Published: 29 Jan 2020

Veeam Software

Disaster Recovery Planning Ahead
sponsored by OffSiteDataSync and Veeam
EBOOK: A disaster recovery plan will help your organization resume business operations within an acceptable timeframe should an outage or emergency occur. Access this e-book to learn why disaster recovery plans are necessary for businesses of all sizes and get guidance for putting your plan into action.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

OffSiteDataSync and Veeam

Why Your Disaster Recovery/ Business Continuity Plan Should Prioritize Data Breach Prep
sponsored by Cirrus Data Solutions
EGUIDE: We live in an era of data breaches, and a disaster recovery plan that doesn’t account for this could put your enterprise, your employees, and your customers at risk. Read this expert guide to learn more about recent incidents of identity theft and data breaches, and 10 disaster recovery/business continuity best practices worth considering.
Posted: 29 Jan 2020 | Published: 28 Jan 2020

Cirrus Data Solutions

Qumulo’s Hybrid File Software on HPE Apollo 4000 Systems vs. Dell EMC Isilon
sponsored by Qumulo
WHITE PAPER: Access this white paper for an in-depth comparison of Qumulo and Isilon hybrid cloud fie storage offerings, covering scalability, visibility, licensing, deployment options, and hybrid cloud capabilities.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

Qumulo

An Introduction to Data Catalogs: The Future of Data Management
sponsored by Alation
WEBCAST: with a data catalog, enterprises can find, understand, trust, use, and reuse data. making it a key technology to overcome these challenges. Tune into this webinar to hear Dave Wells, senior analyst at Eckerson Group, explain what makes data catalogs central to data analysis, data curation, data governance, and data science.
Posted: 21 Apr 2020 | Premiered: Jan 24, 2020

Alation

Essential Guide to Data Lakes
sponsored by Matillion
EBOOK: Since the term “data lake” was first introduced in 2010, data lakes and various similar solutions have exploded in popularity. But businesses looking into data lakes may be asking themselves: What is a data lake? And how can we use one? Read this e-book to learn the essentials of data lakes and how to derive value from them.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Matillion

Interactive Data Science and BI on the Hadoop Data Lake
sponsored by Dremio
WEBCAST: Simplifying your data pipeline and reducing your reliance on complicated IT processes is critical—not only make it easier to access your information, but also to help manage future changes to your data architecture, like moving to the cloud.Watch this webcast to learn how Dremio can interact with a variety of data repositories.
Posted: 27 Jan 2020 | Premiered: Jan 27, 2020

Dremio

Security Advisory: Is Your Enterprise Data Being "Phoned Home"?
sponsored by ExtraHop
WHITE PAPER: Organizations give too little thought towards how their data is being used by the third-party vendors they partner with. Unfortunately, there are growing instances of data misuse. This white paper highlights 4 examples and shares best practices for ensuring data security, privacy and compliance.
Posted: 17 Jun 2020 | Published: 17 Jun 2020

ExtraHop

COVID-19 Related Data Security Threats
sponsored by Trend Micro
RESOURCE: The global health crisis is dangerous enough as it is which makes the added concern of cyber threats almost overwhelming. Access this resource from Trend Micro to learn what they have observed from studying this type of attack in order to explain how to effectively fight back against them.
Posted: 20 May 2020 | Published: 20 May 2020

Trend Micro

Cloudian Solutions for Ransomware
sponsored by Cloudian
DATA SHEET: With the WORM approach, once data is written, it cannot be changed or deleted until a certain amount of time has passed, and because the data cannot be modified, it cannot be encrypted, making malware ineffective. Check out this datasheet to learn the 3 ways that WORM-equipped storage can be deployed to protect your apps.
Posted: 19 Mar 2020 | Published: 19 Mar 2020

Cloudian
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info