Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Cloud computing risk management, governance and compliance

        Cloud computing risk management, governance and compliance processes are evolving as organizations increasingly turn to cloud services for storage, infrastructure and software needs, rather than running their own. But in moving to the cloud, enterprises also potentially expose themselves to myriad threats. In this SearchCompliance handbook, we examine how compliance officers reduce this risk.

        In the first story, Christine Parizo speaks with practitioners and experts about how to maintain security and compliance as part of a larger cloud computing risk management strategy, and offers a checklist of questions to ask your cloud providers about their GRC readiness. In our second piece, Ben Cole examines how services and tools have evolved in the face of regulatory and cloud risk management concerns. In our final piece, Karen Goulart discusses how enterprise cloud strategies reflect a renewed focus on security, and looks at why cost reduction is no longer the bottom line in cloud adoption.

        View E-Handbook
      • Develop your criteria for selecting VDI software

        Learn about the latest options for VDI platforms and get an overview of the vendors and products that IT has to choose from. Also, get more information about the decision-making process when determining if you need VDI, and whether you should choose VDI or Terminal Services.

        View E-Handbook
    • Page 1 of 1
      • Implement backup data deduplication with deduplicating disk backup targets

        While many companies have embraced backup data deduplication as a key component of their backup operations, others are still evaluating the technology to determine where it will fit within their data protection infrastructures. Initially available from just a few hardware vendors, backup dedupe is now available in hardware and software versions with varying capabilities and capacities. Deduplicating disk backup targets remains a popular way to implement backup data dedupe, and there are alternatives for file-based and virtual tape library devices.

        We describe the key features you'll need to consider when evaluating a deduplicating backup disk system, including ingest rates, deduplication ratios, ease of implementation, compatibility with backup and restore apps, and support of APIs that can improve performance and distribute the dedupe process between hardware and software resources.

        View E-Handbook
      • How snapshot and CDP integrate with an organization's data backup strategy

        Technologies that have traditionally been managed separately are increasingly becoming integrated into the backup process. Two of these technologies, snapshot and continuous data protection (CDP), have been growing in popularity for a number of reasons. Snapshot and CDP have been around for years, but now they are being merged with backup software -- people may have used them in the past for various tasks as part of their data backup strategy, but they have always been managed separately. A number of backup software products now offer CDP and some have the ability to integrate with array-based snapshot technology. This handbook explores why one expert believes replication, CDP and snapshots are keys to a successful data backup strategy; how virtualization gives CDP a big boost; and the many types of snapshots available today.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • What is data protection?

        Data backups have evolved to the point that they are hardly recognizable. For many organizations, the days of producing a nightly backup to tape are over. Exponential data growth and the need for near real-time data protection have driven organizations to abandon legacy backups in favor of next generation disk-based solutions.

        This E-Book is a primer on modern data protection techniques. The first chapter focuses on the types of backup targets available today, from tape libraries and VTLs to deduplicating disk arrays, integrated backup appliances and the cloud, as well as advantages to using each type of backup target. The second chapter looks at the capabilities that backup software platforms offer today. The third chapter looks at backup challenges IT teams face, including backing up large amounts of data, mobile device backup and BYOD, virtual server backup, and slow restore times.

        View E-Book
      • Implementing data replication: Balancing cost vs. convenience

        Access this exclusive disaster recovery handbook about data replication for insight from industry pros such as Brien Posey and Paul Kirvan, and learn about replication tools today, asynchronous vs. synchronous replication, and replication for virtual machines. Read on to arm yourself with the replication know-how needed to navigate this space in 2013.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Connect to the disconnected world of remote backups

        Remote backup of data on endpoint devices like laptops and smart phones is a challenge for IT staffs. Because these devices are often disconnected from an organization's network, data created and stored on these devices can go unprotected for considerable lengths of time. In a study of 140 IT managers in the U.S., remote laptop backup software vendor Druva Software reported that 89 respondents said their organizations didn't have a laptop backup policy. Endpoint devices can be backed up incrementally over the Internet with deduplication; the backup process can operate in the background while the user is working.

        This Drill Down takes a look at remote backups today, focusing on the challenges and solutions available to address endpoint device backup. You will learn the approaches for backing up laptops today so you can decide which approach is right for your organization's specific needs.

        View E-Handbook
      • Best practices: Laptop and mobile backups today

        Laptop and mobile backup are emerging areas for data protection. However, many organizations today do not have a strategy in place for protecting information on laptops and mobile devices. The reason for this is twofold. Many IT teams have assumed that little data is stored on laptops and mobile devices that isn’t stored elsewhere on the network (and thus backed up). Many organizations have policies in place which require laptop users to save any data they want backed up on network drives. This Handbook offers practical advice for organizations that are getting started with laptop/mobile backups with an overview of the technology available today and advice about what should and should not be backed up. Check out an article outlining the state of laptop/mobile backups software today, a tip on cloud backup vs. in-house backup for laptop backup and an expert Q&A on laptop backup.

        View E-Handbook
      • Cloud backup tutorial: Using cloud data protection

        Despite pronouncements by some that cloud backup isn't just marketing hype, serious doubts remain about the security of cloud data protection. In this tutorial on cloud backup, you will learn the pros and cons cloud backup, how cloud storage is changing data protection and disaster recovery and the differences in the cost of cloud backup vs. traditional backup. Get advice from our experts, learn how to choose the best cloud data protection service, and more.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Data encryption and cloud backup tutorial

        Data storage backups are a necessary element of data protection plan, but they're often the biggest source of security woes. There are currently four major areas where data security intersects with the data backup world: tape encryption, cloud backup security, key management and data deletion/destruction. Learn everything you need to know about keeping your backups secure in this tutorial. Learn best practices, time-saving tips, and data storage backup pitfalls to avoid in this tutorial presented by SearchDataBackup.com.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • What you should know about the deduplication process

        Deduplication technology is mature and there are a variety of options available depending on your organization's specific needs. This e-book compares hardware- and software-based deduplication, source and target deduplication, global deduplication and things to consider about how dedupe is performed to help readers make the right dedupe decisions for their organization.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Plugging into the data backup appliance

        IT pros continue to move away from tape for backup, opting instead for backup to disk. And users performing disk-based backup have a number of options to choose from. There are a variety of disk backup-specific appliances, each offering differing capabilities and price points, which can be split into three main categories -- VTLs, deduplicating disk arrays, and integrated backup appliances. This handbook on the state of the backup appliance looks at the variety of disk backup appliances available today, from deduplicating VTLs to integrated backup appliances that offer software, media server and storage bundled together. Understand the pros and cons of each type of device and important developments in the disk backup world and learn how to compare and contrast the disk backup appliance options available today to help you make decisions about upgrading your backup solution.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Aligning the linear tape file system for enterprise data archiving

        LTFS or Linear Tape File System allows data on LTO-5 and later tapes to be searched as if it were on disk. When LTFS emerged a few years ago, many predicted it would be a boon for long-term data archiving. That hasn't really proven to be true -- at least not for enterprise data archiving. The technology has taken off in the media and entertainment industry, and other industries that require long-term retention of video, but LTFS integration has been slow among tape library and backup software vendors.

        That may be changing, however, with a number of tape library vendors announcing library-wide LTFS support. It is possible that some of the latest developments in this space along with the push to store vast amounts of data for analytics may push LTFS into use for enterprise data archiving, but it is still unclear if the technology will move beyond its current niche.

        View E-Handbook
      • Take the temperature of tape systems technology

        Tape media, drive and library technology advances with increasing capacity and innovations aimed at making data more accessible. While many shops have moved to disk for backup, tape systems are still the go-to for long term data retention, as tape is still the most cost-effective method for storing massive amounts of data. Tape libraries have become denser, allowing more data to be stored in a given footprint, while advanced robotics allow tapes to be accessed and loaded very rapidly. There are also developments happening on the software side like LTFS that allow data on tape to be read as if it were on disk. However, developments in the tape world happen slowly, and LTFS has not been integrated at the tape library level as quickly.

        This handbook offers information on developments in the tape market including tape media and libraries, LTFS, tape vaulting and using tape for long-term archiving.

        View E-Handbook
      Page 1 of 1

Featured E-ZINES on searchDataBackup.comView all >>

  • Storage magazine

    Storage magazine keeps IT and storage managers up to date on new storage technologies, and how those techs can meet emerging business requirements.

  • Information Security magazine

    Information Security is the leading publication for enterprise security professionals, providing in-depth coverage of security technologies, practices and trends.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchDataBackup.comView all >>

  • Tap into enterprise data governance for business value

    Data governance is all about managing data as a business asset and ensuring that data is accurate, consistent, integrated, timely, complete and secure. This report examines the market trends for implementing data governance. Based on data from a recent survey of 317 business intelligence professionals, IT professionals and consultants, this SearchBusinessAnalytics Benchmark Report analyzes the responses and provides trend information on the increasing executive acceptance of the importance of managing data as a corporate asset, the current status and types of data governance initiatives, data quality and data governance benefits.

  • VM management and capacity prediction

    As hypervisor features have become more similar, the next vendor battleground will be over management software. Microsoft and VMware have similar capabilities, and now they'll look to make their products stand out by touting their management tools and complimentary products. Soon, IT pros won't spend time looking at unique features when they compare hypervisors; they will be looking at how an organization can use the hypervisor to improve workflows throughout the data center.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchDataBackup.comView all >>

  • Cloud computing risk management, governance and compliance

    Cloud computing risk management, governance and compliance processes are evolving as organizations increasingly turn to cloud services for storage, infrastructure and software needs, rather than running their own. But in moving to the cloud, enterprises also potentially expose themselves to myriad threats. In this SearchCompliance handbook, we examine how compliance officers reduce this risk.

    In the first story, Christine Parizo speaks with practitioners and experts about how to maintain security and compliance as part of a larger cloud computing risk management strategy, and offers a checklist of questions to ask your cloud providers about their GRC readiness. In our second piece, Ben Cole examines how services and tools have evolved in the face of regulatory and cloud risk management concerns. In our final piece, Karen Goulart discusses how enterprise cloud strategies reflect a renewed focus on security, and looks at why cost reduction is no longer the bottom line in cloud adoption.

  • Develop your criteria for selecting VDI software

    Learn about the latest options for VDI platforms and get an overview of the vendors and products that IT has to choose from. Also, get more information about the decision-making process when determining if you need VDI, and whether you should choose VDI or Terminal Services.

OTHER FEATURED E-HANDBOOKS