Exclusive content for IT Pros in the know

Premium Editorial

We have gathered our editorially written E-Books, E-Zine, guides and research to save you the effort of having to track such premium content down on your own, ultimately helping you to solve your toughest IT challenges more effectively – and faster – than ever before.

Premium Editorial By Topic

      • Devising a security strategy for the modern network

        The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update their network security strategy to take into account the latest devices coming online, they must also prepare for the future, too. This TechGuide looks at the options for network defense today and in the near future, including how to spot vulnerabilities and how to rank them, too, so infosec pros can respond to inevitable attacks quickly and efficiently.

        View E-Handbook
      • Nailing down a business case for Oracle Fusion Applications

        Oracle Fusion Applications, a suite of enterprise resource planning applications, get a lot of air time. Still, evidence has shown that adoption has yet to hit a blistering pace. While Oracle promises the new applications will bring genuine business value to an organization, some of the hurdles -- among them, cost -- have kept businesses away.

        In this three-part guide, readers will benefit from an in-depth look at how well -- to the surprise of many users -- Oracle Fusion Apps thrive in the cloud. Further, they'll learn why and how to determine the best fit for their organization from Oracle's catalog. First, IT writer Robert Sheldon drills down on the development of Oracle Fusion Cloud Services -- how they came to be and where they're headed. And he gives a rundown of services offered. Next, Alyssa Johnson, Oracle Applications Users Group president, sits down for an interview and details the future of Oracle ERP systems and Fusion Apps. To close, ComputerWeekly writer Lindsay Clark explores the reasons -- despite high expectations for enterprise cloud applications and at least one notable example of a company running them -- Fusion Applications have yet to see a mass conversion.

        View E-Handbook
      • Cultivating IT Talent

        19 August 2014

        Includes:
        • Morrison Utility Services fills in holes faster with ETAdirect
        • Why digitisation transforms supplier relationships
        View E-Zine
      • Three new takes on WAN optimization

        Once considered new technology, WAN optimization is now widespread, and enterprises are including it in their networks from the start. Now that WAN optimization is mature, what's the next step for WAN management? Application delivery optimization and WAN aggregation are now on the radar, as is an all-in-one solution that integrates WAN optimization with management and security.

        View E-Handbook
    • Page 1 of 1
      • Implement backup data deduplication with deduplicating disk backup targets

        While many companies have embraced backup data deduplication as a key component of their backup operations, others are still evaluating the technology to determine where it will fit within their data protection infrastructures. Initially available from just a few hardware vendors, backup dedupe is now available in hardware and software versions with varying capabilities and capacities. Deduplicating disk backup targets remains a popular way to implement backup data dedupe, and there are alternatives for file-based and virtual tape library devices.

        We describe the key features you'll need to consider when evaluating a deduplicating backup disk system, including ingest rates, deduplication ratios, ease of implementation, compatibility with backup and restore apps, and support of APIs that can improve performance and distribute the dedupe process between hardware and software resources.

        View E-Handbook
      • How snapshot and CDP integrate with an organization's data backup strategy

        Technologies that have traditionally been managed separately are increasingly becoming integrated into the backup process. Two of these technologies, snapshot and continuous data protection (CDP), have been growing in popularity for a number of reasons. Snapshot and CDP have been around for years, but now they are being merged with backup software -- people may have used them in the past for various tasks as part of their data backup strategy, but they have always been managed separately. A number of backup software products now offer CDP and some have the ability to integrate with array-based snapshot technology. This handbook explores why one expert believes replication, CDP and snapshots are keys to a successful data backup strategy; how virtualization gives CDP a big boost; and the many types of snapshots available today.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • What is data protection?

        Data backups have evolved to the point that they are hardly recognizable. For many organizations, the days of producing a nightly backup to tape are over. Exponential data growth and the need for near real-time data protection have driven organizations to abandon legacy backups in favor of next generation disk-based solutions.

        This E-Book is a primer on modern data protection techniques. The first chapter focuses on the types of backup targets available today, from tape libraries and VTLs to deduplicating disk arrays, integrated backup appliances and the cloud, as well as advantages to using each type of backup target. The second chapter looks at the capabilities that backup software platforms offer today. The third chapter looks at backup challenges IT teams face, including backing up large amounts of data, mobile device backup and BYOD, virtual server backup, and slow restore times.

        View E-Book
      • Implementing data replication: Balancing cost vs. convenience

        Access this exclusive disaster recovery handbook about data replication for insight from industry pros such as Brien Posey and Paul Kirvan, and learn about replication tools today, asynchronous vs. synchronous replication, and replication for virtual machines. Read on to arm yourself with the replication know-how needed to navigate this space in 2013.

        View E-Handbook
      Page 1 of 1
    • Page 1 of 1
      • Connect to the disconnected world of remote backups

        Remote backup of data on endpoint devices like laptops and smart phones is a challenge for IT staffs. Because these devices are often disconnected from an organization's network, data created and stored on these devices can go unprotected for considerable lengths of time. In a study of 140 IT managers in the U.S., remote laptop backup software vendor Druva Software reported that 89 respondents said their organizations didn't have a laptop backup policy. Endpoint devices can be backed up incrementally over the Internet with deduplication; the backup process can operate in the background while the user is working.

        This Drill Down takes a look at remote backups today, focusing on the challenges and solutions available to address endpoint device backup. You will learn the approaches for backing up laptops today so you can decide which approach is right for your organization's specific needs.

        View E-Handbook
      • Best practices: Laptop and mobile backups today

        Laptop and mobile backup are emerging areas for data protection. However, many organizations today do not have a strategy in place for protecting information on laptops and mobile devices. The reason for this is twofold. Many IT teams have assumed that little data is stored on laptops and mobile devices that isn’t stored elsewhere on the network (and thus backed up). Many organizations have policies in place which require laptop users to save any data they want backed up on network drives. This Handbook offers practical advice for organizations that are getting started with laptop/mobile backups with an overview of the technology available today and advice about what should and should not be backed up. Check out an article outlining the state of laptop/mobile backups software today, a tip on cloud backup vs. in-house backup for laptop backup and an expert Q&A on laptop backup.

        View E-Handbook
      • Cloud backup tutorial: Using cloud data protection

        Despite pronouncements by some that cloud backup isn't just marketing hype, serious doubts remain about the security of cloud data protection. In this tutorial on cloud backup, you will learn the pros and cons cloud backup, how cloud storage is changing data protection and disaster recovery and the differences in the cost of cloud backup vs. traditional backup. Get advice from our experts, learn how to choose the best cloud data protection service, and more.

        View E-Book
      Page 1 of 1
    • Page 1 of 1
      • Data encryption and cloud backup tutorial

        Data storage backups are a necessary element of data protection plan, but they're often the biggest source of security woes. There are currently four major areas where data security intersects with the data backup world: tape encryption, cloud backup security, key management and data deletion/destruction. Learn everything you need to know about keeping your backups secure in this tutorial. Learn best practices, time-saving tips, and data storage backup pitfalls to avoid in this tutorial presented by SearchDataBackup.com.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • What you should know about the deduplication process

        Deduplication technology is mature and there are a variety of options available depending on your organization's specific needs. This e-book compares hardware- and software-based deduplication, source and target deduplication, global deduplication and things to consider about how dedupe is performed to help readers make the right dedupe decisions for their organization.

        View E-Book
      •  
      Page 1 of 1
    • Page 1 of 1
      • Plugging into the data backup appliance

        IT pros continue to move away from tape for backup, opting instead for backup to disk. And users performing disk-based backup have a number of options to choose from. There are a variety of disk backup-specific appliances, each offering differing capabilities and price points, which can be split into three main categories -- VTLs, deduplicating disk arrays, and integrated backup appliances. This handbook on the state of the backup appliance looks at the variety of disk backup appliances available today, from deduplicating VTLs to integrated backup appliances that offer software, media server and storage bundled together. Understand the pros and cons of each type of device and important developments in the disk backup world and learn how to compare and contrast the disk backup appliance options available today to help you make decisions about upgrading your backup solution.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Conquer the endpoint backup challenge

        Endpoint backup has typically been left to end users or ignored altogether. However, the increased use of smartphones and tablets is driving interest in the technology. Also, the software is evolving and converging with other technologies aimed at increasing user productivity. One challenge for backing up laptops and mobile devices is that they aren't always connected to a corporate network. They must be backed up over the Internet -- which can be troublesome -- or when they reconnect. Depending on how much time passes between backups, this could leave a good deal of data unprotected.

        This handbook looks at how vendors are addressing the challenges associated with backing up these devices, the convergence of mobile backup with file sharing and security, confusion about the difference between file sync and backup, and how to choose a solution that is right for your organization's needs.

        View E-Handbook
      •  
      Page 1 of 1
    • Page 1 of 1
      • Aligning the linear tape file system for enterprise data archiving

        LTFS or Linear Tape File System allows data on LTO-5 and later tapes to be searched as if it were on disk. When LTFS emerged a few years ago, many predicted it would be a boon for long-term data archiving. That hasn't really proven to be true -- at least not for enterprise data archiving. The technology has taken off in the media and entertainment industry, and other industries that require long-term retention of video, but LTFS integration has been slow among tape library and backup software vendors.

        That may be changing, however, with a number of tape library vendors announcing library-wide LTFS support. It is possible that some of the latest developments in this space along with the push to store vast amounts of data for analytics may push LTFS into use for enterprise data archiving, but it is still unclear if the technology will move beyond its current niche.

        View E-Handbook
      • Take the temperature of tape systems technology

        Tape media, drive and library technology advances with increasing capacity and innovations aimed at making data more accessible. While many shops have moved to disk for backup, tape systems are still the go-to for long term data retention, as tape is still the most cost-effective method for storing massive amounts of data. Tape libraries have become denser, allowing more data to be stored in a given footprint, while advanced robotics allow tapes to be accessed and loaded very rapidly. There are also developments happening on the software side like LTFS that allow data on tape to be read as if it were on disk. However, developments in the tape world happen slowly, and LTFS has not been integrated at the tape library level as quickly.

        This handbook offers information on developments in the tape market including tape media and libraries, LTFS, tape vaulting and using tape for long-term archiving.

        View E-Handbook
      Page 1 of 1

Featured E-ZINES on searchDataBackup.comView all >>

  • Storage magazine

    Storage magazine keeps IT and storage managers up to date on new storage technologies, and how those techs can meet emerging business requirements.

  • Information Security magazine

    Information Security is the leading publication for enterprise security professionals, providing in-depth coverage of security technologies, practices and trends.

ALL TECHTARGET E-ZINES

Featured E-BOOKS on searchDataBackup.comView all >>

  • Overcome today's disaster recovery challenges

    The use of devices not connected to a local network is a challenge for IT staffs tasked with protecting data on those devices. Completing backups within a reasonable timeframe has become an issue for organizations. Some organizations are opting for alternatives to traditional backup to address these challenges. The cloud has been pushed as an alternative to tape for offsite storage for disaster recovery. However, there are challenges with this approach and with protecting applications running in the cloud.

  • Cloud storage challenges and choices

    Our comprehensive e-book tackles the cloud storage challenges and business decisions that surround cloud storage investments, and breaks them into three areas of concentration: architecture, availability and return on investment.

    Get the latest updates on architectural choices when using the cloud for storage, including cloud controllers and application programming interfaces. We provide a short list of technical capabilities to look for in a cloud controller and questions to ask your service provider. Learn which metrics your peers are using to determine if cloud storage projects are meeting their potential, and what sort of service levels you can expect from providers or hybrid projects. Discover how to leverage the most cutting-edge cloud technologies and how not to get taken advantage of when choosing a cloud storage strategy/service.

OTHER FEATURED E-BOOKS

Featured E-HANDBOOKS on searchDataBackup.comView all >>

  • Devising a security strategy for the modern network

    The network of today's enterprise is larger and more diverse than ever, which means there's more for hackers to attack. So as enterprises update their network security strategy to take into account the latest devices coming online, they must also prepare for the future, too. This TechGuide looks at the options for network defense today and in the near future, including how to spot vulnerabilities and how to rank them, too, so infosec pros can respond to inevitable attacks quickly and efficiently.

  • Nailing down a business case for Oracle Fusion Applications

    Oracle Fusion Applications, a suite of enterprise resource planning applications, get a lot of air time. Still, evidence has shown that adoption has yet to hit a blistering pace. While Oracle promises the new applications will bring genuine business value to an organization, some of the hurdles -- among them, cost -- have kept businesses away.

    In this three-part guide, readers will benefit from an in-depth look at how well -- to the surprise of many users -- Oracle Fusion Apps thrive in the cloud. Further, they'll learn why and how to determine the best fit for their organization from Oracle's catalog. First, IT writer Robert Sheldon drills down on the development of Oracle Fusion Cloud Services -- how they came to be and where they're headed. And he gives a rundown of services offered. Next, Alyssa Johnson, Oracle Applications Users Group president, sits down for an interview and details the future of Oracle ERP systems and Fusion Apps. To close, ComputerWeekly writer Lindsay Clark explores the reasons -- despite high expectations for enterprise cloud applications and at least one notable example of a company running them -- Fusion Applications have yet to see a mass conversion.

OTHER FEATURED E-HANDBOOKS