Restore Deleted Reports

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

Buyer's guide to backup and recovery software
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: In this handbook, learn more about the market for backup and recovery software and key data protection capabilities to look out for.
Posted: 14 Jul 2022 | Published: 14 Jul 2022

TechTarget ComputerWeekly.com

Webinar: Protecting Critical SaaS Data Before It’s Too Late
sponsored by Spanning Cloud Apps
WEBCAST: This webinar goes through the best practices for SaaS data protection. Presented by industry experts, it touches on the key points for understanding how to ensure SaaS data protection and how to find the right provider.
Posted: 05 May 2014 | Premiered: Apr 1, 2014

Spanning Cloud Apps

EMC Isilon Best Practices for Hadoop Data Storage
sponsored by EMC IT Solutions India Private Limited
WHITE PAPER: This white paper describes the best practices for setting up and managing the HDFS service on an EMC Isilon cluster to optimize data storage for Hadoop analytics.
Posted: 31 Mar 2014 | Published: 28 Feb 2014

EMC IT Solutions India Private Limited

Backup to the Cloud is Still Cloudy
sponsored by ExaGrid Systems, Inc.
WHITE PAPER: This informative paper addresses the cloud as it relates to data backup. In all cases, it is assumed that a backup application is in place and that data will be backed up locally and then replicated to the cloud for disaster recovery. Read on now to learn more.
Posted: 18 Dec 2013 | Published: 18 Dec 2013

ExaGrid Systems, Inc.

What to Look For In a Backup Solution to Deliver Improved Business Continuity
sponsored by Datto, Inc.
WHITE PAPER: This expert guide provides tips on building a holistic backup solution that protects your business from potentially devastating downtime, no matter what the cause. Access now to learn how you can implement a successful business continuity plan and give your enterprise a competitive edge.
Posted: 26 Jun 2014 | Published: 26 Jun 2014

Datto, Inc.

Enterprise Data Backup - The Power of Recovery
sponsored by Rand Secure Data
WHITE PAPER: Explore this informative white paper to find out what is needed in a backup and restore solution to ensure that your data is safe, and how one vendor incorporates all these necessities into one, successful backup solution optimized for data security and recoverability.
Posted: 10 Mar 2014 | Published: 13 Jan 2014

Rand Secure Data

Enterprise Architects Challenged to Manage Data Explosion
sponsored by Red Hat
WHITE PAPER: This whitepaper explains how Red Hat Storage Server allows enterprises to quickly and confidently deliver business applications that minimize cost, complexity, and risk while increasing architectural flexibility.
Posted: 02 Jul 2014 | Published: 29 Nov 2013

Red Hat

Recovering from Ransomware: Data Protection Strategy Guide
sponsored by Citrix
EGUIDE: With a constantly evolving IT landscape, the nature of disaster recovery planning is changing rapidly. Now, rather than just preparing for a natural disaster or manmade event, IT professionals must also be prepared to recover from ransomware and other cyberattacks. In this e-guide you will learn 2 quick steps for recovering from ransomware.
Posted: 12 Dec 2016 | Published: 07 Dec 2016

Citrix

Wherever It Goes, Data on Employee Endpoint Devices Demands Corporate Protection
sponsored by Code42
WHITE PAPER: BYOD offers a lot of benefits in terms of productivity and mobility, but it also presents a number of challenges when it comes to protection for endpoint data. This white paper highlights a cloud-powered data protection and management platform built to handle these challenges.
Posted: 11 Jun 2014 | Published: 30 May 2014

Code42