Data Storage Security Reports

Infographic: 2019 Europe IT Priorities, Storage
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this infographic, we take a look at what the most popular primary and secondary storage initiatives are in 2019 as well as how much storage will be maintained on-premise across Europe. Survey results taken from the 2019 IT Priorities survey carried out by ComputerWeekly.com, ComputerWeekly.de and LeMagIT.fr.
Posted: 08 Feb 2021 | Published: 23 Apr 2019

TechTarget ComputerWeekly.com

Top 10 cyber security stories of 2021
sponsored by TechTarget ComputerWeekly.com
EBOOK: Cyber security was once again top of the agenda for IT leaders in 2021, with a barrage of news and analysis making it hard to separate the wheat from the chaff and the genuine insight from the self-promotional nonsense. However, there were some stand-out cyber security stories in the past 12 months that were indubitably worthy of attention.
Posted: 26 Jan 2022 | Published: 26 Jan 2022

TechTarget ComputerWeekly.com

CW Nordics February 2017
sponsored by TechTarget ComputerWeekly.com
EZINE: In this first issue of CW Nordics in 2017, we take a look what CIOs in the region are expecting in the year ahead. We asked a select group of CIOs and analysts in Denmark, Finland, Norway and Sweden what IT projects are at the top their priority lists.
Posted: 08 Feb 2021 | Published: 23 Feb 2017

TechTarget ComputerWeekly.com

Buyer's Checklist to Purpose-Built Storage for Virtual Servers
sponsored by TechTarget Data Center
EBOOK: This Buyer's Checklist on Purpose-Built Storage for Virtual Servers describes how these storage systems differ from traditional arrays, provides insights into some of their unique features and offers guidance on evaluating, purchasing and deploying these storage systems.
Posted: 02 May 2014 | Published: 02 May 2014

TechTarget Data Center

Expert Analysis of LTFS: Role in Backup, Media & Entertainment, and Beyond (Podcast)
sponsored by Oracle Corporation
PODCAST: In this podcast, Storage Decisions speaker Jon Toigo discusses the role of LTFS for backup, how it works, and the requirements for implementation. He also provides a glimpse into the LTFS future and explains why more IT professionals are embracing it as general purpose storage.
Posted: 15 Jul 2013 | Premiered: Jul 15, 2013

Oracle Corporation

CW Europe – Forecast: Cloudy with Dry Spells
sponsored by TechTarget ComputerWeekly.com
EZINE: In Europe cloud is restricted and hybrid setups make use of local compute and storage.
Posted: 09 Feb 2016 | Published: 08 Feb 2016

TechTarget ComputerWeekly.com

Improved Scalability and Availability are the Keys to Better Storage Management
sponsored by EMC & Arrow
WHITE PAPER: This white paper highlights the benefits of scale-out NAS solution from EMC that can keep up with exponential data growth, increased regulations and compliance mandates. This solution provides the flexibility and availability that traditional storage approaches can't provide.
Posted: 22 Apr 2014 | Published: 28 Jun 2013

EMC & Arrow

Storage Showdown: All-flash vs. Hybrid Arrays for Virtual Desktop Environments
sponsored by Pure Storage
EGUIDE: Download this guide as Tom Fenton, Senior Validation Engineer at the Taneja Group, illustrates several critical factors to consider when deciding to use an all-flash or hybrid array in your virtual desktop environments. Here, you'll evaluate hybrid vs. all-flash on cost, ability access to cold data, compression and deduplication, and more.
Posted: 20 Apr 2017 | Published: 20 Apr 2017

Pure Storage

Case Study: SSB Wind Systems, End-To-End Service Mitigates Information Risks
sponsored by Iron Mountain
CASE STUDY: This short white paper discusses how one organisation transformed its data and records management processes through end-to-end off-site data protection and records management services.
Posted: 16 Oct 2013 | Published: 31 Dec 2012

Iron Mountain

The Security of Software Containers & Sandboxing
sponsored by CloudPassage
EGUIDE: Sandboxes became prevalent after security pros realized malware was making its way past antivirus software and infecting networks. Inside, security expert Matthew Pascucci identifies the differences between software containers and sandboxing and dives into the security benefits within the two.
Posted: 24 Jan 2018 | Published: 22 Jan 2018

CloudPassage