CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

back up

Results 1 - 25 of 1077Sort Results By: Published Date | Title | Company Name
Published By: NetShelter - CyrusOne     Published Date: Oct 12, 2011
This whitepaper outlines issues that arise when planning for growth of IT infrastructure and explains how the colocation of data centers can provide scalability, enabling users to modify capacity quickly to meet fluctuating demand.
Tags : 
cyrus one, data center, texas, infrastructure, capacity, planning, colocation, scablability, costs, demand, data storage, backup, cyrus 1, houston, dallas, interoperability, network architecture, network management, cloud computing, data center design and management
    
NetShelter - CyrusOne
Published By: bChannels     Published Date: Dec 11, 2018
IT service continuity undoubtedly is at or near the very top of every IT organization’s list of strategic initiatives, considering the dramatic costs and implications of downtime. Download this informative whitepaper for some compelling reasons to upgrade.
Tags : 
    
bChannels
Published By: Intel Corp.     Published Date: Aug 08, 2012
This report describes how improving the efficiency of data storage, deduplication solutions has enabled organizations to cost-justify the increased use of disk for backup and recovery. However, the changing demands on IT storage infrastructures have begun to strain the capabilities of initial deduplication products. To meet these demands, a new generation of deduplication solutions is emerging which scale easily, offer improved performance and availability and simplify management and integration within the IT storage infrastructure. HP refers to this new generation as "Deduplication 2.0.
Tags : 
assessing, deduplication, 2.0, second, generation, storeonce, deduplication, appliance, efficiency, data, storage, backup, storage, it management, data management, bandwidth management, grid computing, infrastructure, internetworking hardware, server hardware
    
Intel Corp.
Published By: Quest     Published Date: Jul 07, 2012
When disaster strikes, don't waste hours and dollars recovering critical data. vRanger delivers blazing-fast speed and granular recovery for your VMware applications and data. Get your free trial today.
Tags : 
applications, data, delivers, protection, disaster, security, recovery, backup, restoration, control, save, remote, central server, virtual, virtual data backup, backup, infrastructure, network performance management, remote access, internet security
    
Quest
Published By: Acronis     Published Date: Dec 28, 2011
Virtualization platforms are different from physical platforms. The virtualization benefits extend to management and support for tightly integrated backup and recovery solutions. Solutions designed exclusively for virtual infrastructure backup provide a host of key benefits and should be leveraged whenever possible.
Tags : 
virtualization, virtualization software, disaster recovery, backup virtual machines, vmware backup, backup hyper-v, p2v, vmware data recovery, backup virtual server, virtualization backup, virtual backup, server migration, migrate from physical to virtual, v2v, migrate from virtual to virtual, acronis, security management, security policies, cloud computing
    
Acronis
Published By: Datto Inc.     Published Date: Jan 31, 2013
Datto shares 10 tips for MSPs to increase profit, improve visibility, and strengthen customer satisfaction -- all without breaking the bank.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business, smb, downtime, instant virtualization, disaster recovery, managed-service provider, msp, recovery time objective, rto, recovery point objective, rpo, risk assessment, datto
    
Datto Inc.
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
    
Limelight Networks
Published By: Limelight Networks     Published Date: Feb 21, 2018
From the boardroom to the backroom, everyone is looking for ways to protect their digital content from cyber threats like DDoS attacks, unauthorized access or theft. In this white paper, we’ll discuss ten different ways to protect your digital content, ensure high availability and maintain superior quality of experience for every digital visitor.
Tags : 
    
Limelight Networks
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks
Published By: Symantec     Published Date: Feb 09, 2007
Imagine being able to eliminate your backup windows and recovery individual Exchange messages, folders, and mailboxes - without mailbox backups. Read this document to find out how Backup Exec 11d for Windows Servers provides the gold standard in continuous, cost-effective, high-performance disk-to-disk-to-tape backup and recovery.
Tags : 
storage, backup and recovery, email archiving, windows server, symantec, backup plan, backup, back-up, tape backup, disk backup
    
Symantec
Published By: EVault     Published Date: Mar 21, 2014
This simple, practical white paper will prove invaluable whether you’re starting fresh or looking to upgrade your current data protection system.
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business, security, data center
    
EVault
Published By: EVault     Published Date: Mar 21, 2014
Er zijn heel veel manieren om uw data te back-uppen – dan is het goed om te weten dat 12 Best Practices ze allemaal beslaan. Als u dit compacte whitepaper leest, kunt u in een paar minuten: •Bepalen of uw back-up en recovery systeem voldoet •Specifieke stappen bepalen om verbeteringen aan te brengen •Efficiëntie, betrouwbaarheid en kosten-effectiviteit verhogen Vul uw gegevens in en download
Tags : 
evault, cloud computing, cloud connected diaster, disaster recovery, natural disaster, better for business, security, data center
    
EVault
Published By: CopiaTECH     Published Date: Mar 18, 2008
Larger businesses have more to lose in terms of absolute dollars, but it is the narrow profit margin under which smaller businesses work which makes it important for them to have their information backed up. Learn how to protect your small business in this guide.
Tags : 
copiatech, security, network security, small business networks
    
CopiaTECH
Published By: EMC Corporation     Published Date: Oct 16, 2013
Backup and recovery is part of business and is essential to successful information management. Take fifteen minutes to find out how you can transform backup and recovery with disk-based, deduplication-optimized solutions from EMC.
Tags : 
backup environment, emc. transformation, customer profiling, best practices, technology, storage
    
EMC Corporation
Published By: Active Power     Published Date: Aug 30, 2011
This paper discusses the methods of implementing a short ride through system with higher reliability and predictability than with traditional methods
Tags : 
caterpillar, electrical and electronic, backups, caterpillar inc., high availability, backup power, backup power supply, battery backup, flywheel ups, green backup power, green power, uninterruptible power supply, critical power systems, ups backup power, ups power supply, storage, business technology, data center
    
Active Power
Published By: Druva     Published Date: Mar 30, 2016
Review these 20 real-world business reasons to move backup, archival and disaster recovery (DR) to a single, native cloud platform.
Tags : 
druva, backup and recovery, cloud, archival and backup recovery, data management
    
Druva
Published By: Druva     Published Date: Sep 27, 2017
The public cloud’s reliability, security, and scalability offers the transformational potential to move disparate workloads to a single cloud platform for greater efficiency and agility. Discover 20 real-world benefits gained when moving backup, archival and disaster recovery to a single, native cloud platform.
Tags : 
backup recovery, disaster recovery, public cloud, security cloud, native cloud
    
Druva
Published By: Cisco     Published Date: Jun 21, 2016
Adversaries and defenders are both developing technologies and tactics that are growing in sophistication. For their part, bad actors are building strong back-end infrastructures with which to launch and support their campaigns. Online criminals are refining their techniques for extracting money from victims and for evading detection even as they continue to steal data and intellectual property.
Tags : 
    
Cisco
Published By: CloudEndure     Published Date: Mar 23, 2016
In January 2016, 141 professionals — directors, CIOs and managers of large, small and mid-sized companies — were surveyed for a comprehensive disaster recovery (DR) survey. The results of this survey reveal some important truths about DR, backup, availability goals, downtime costs, and responses. For instance, did you know the top risk to system availability continues to be human error? This benchmark survey report reviews the challenges and best practices of companies using or looking to implement DR solutions. Read this report to compare your DR experiences with those of your peers.
Tags : 
cloudendure, disaster recovery, best practices, disaster recovery survey, cloud computing
    
CloudEndure
Published By: Akamai Technologies     Published Date: Mar 19, 2019
All three of our stories in this issue of the State of the Internet / Security report are about things most organizations aren’t examining. Whether the cause is that organizations don’t perceive some issues as important to their environment, if they don’t have tooling to monitor these issues, or if the resources to monitor this traffic are not available, this traffic is often being overlooked. Each of the stories in this issue of the State of the Internet / Security report looked at aspects of security (credential abuse/APIs/IPv6) that are often overlooked by the mainstream but are nevertheless important to day-to-day operations. These stories create a backdrop for what we expect to see in the upcoming quarters and years.
Tags : 
    
Akamai Technologies
Published By: Datto Inc.     Published Date: Jan 31, 2013
This IT solutions provider’s experience with enterprise storage vendors taught his one thing; you can’t cram an enterprise storage solution into a small to midsize business.
Tags : 
backup, data recovery, business continuity, channel, hybrid-cloud, bdr, virtualization, small to medium-sized business, smb, downtime, instant virtualization, disaster recovery, managed-service provider, msp, recovery time objective, rto, recovery point objective, rpo, risk assessment, datto
    
Datto Inc.
Published By: Box     Published Date: Jun 22, 2018
Like other IT leaders, you know you have to modernize your IT infrastructure to become more productive, efficient, agile and competitive. So what's holding you back? Many organizations are still devoting anywhere from 60% to 80% of their time, energy, human resources and budget to supporting legacy systems rather than develop transformative solutions. Our new eBook, Your 3-step roadmap to IT modernization, will help you align your approach to IT with the way your business works today — and the way you will work in the digital age: • Increased mobility, multiple device formats and distributed workgroups • Greater collaboration with outside organizations, including customers, suppliers and partners • Essential enterprise risk management features such as compliance, legal, security and data governance Here you'll learn the three stages of IT modernization — from realigning your infrastructure to updating business processes — so you take the right steps.
Tags : 
    
Box
Published By: AstuteIT_ABM_EMEA     Published Date: Feb 28, 2018
Die Cloud ist in fast jedem Bereich des Enterprise Computing zur Normalität geworden. Sie ist ein wesentlicher Bestandteil der Geschäftswelt und sollte als neuer Standard betrachtet werden. Datensicherung – insbesondere Backup, Archivierung und Disaster Recovery – steht zurzeit ganz oben auf der Liste der Cloud-Aktivitäten. Doch haben Sie auch Ihren Public Cloud Vertrag vor der Unterzeichnung sorgfältig durchgelesen und ausgehandelt, sodass er Ihren Geschäftsanforderungen entspricht? Oder haben die zahllosen Seiten mit rechtlichen Bestimmungen Sie dazu verleitet, zu schnell zu unterschreiben Ihre Rechtsabteilung muss selbstverständlich das gesamte Dokument umfassend prüfen. Im Folgenden finden Sie zudem drei wichtige Punkte, die Sie bei der Zusammenarbeit mit Ihrem Cloud-Anbieter berücksichtigen sollten.
Tags : 
unterzeichnung, public, cloud, vertrages, beachten, sollten
    
AstuteIT_ABM_EMEA
Published By: Astute IT DACH     Published Date: Feb 28, 2018
Die Cloud ist in fast jedem Bereich des Enterprise Computing zur Normalität geworden. Sie ist ein wesentlicher Bestandteil der Geschäftswelt und sollte als neuer Standard betrachtet werden. Datensicherung – insbesondere Backup, Archivierung und Disaster Recovery – steht zurzeit ganz oben auf der Liste der Cloud-Aktivitäten. Doch haben Sie auch Ihren Public Cloud Vertrag vor der Unterzeichnung sorgfältig durchgelesen und ausgehandelt, sodass er Ihren Geschäftsanforderungen entspricht? Oder haben die zahllosen Seiten mit rechtlichen Bestimmungen Sie dazu verleitet, zu schnell zu unterschreiben Ihre Rechtsabteilung muss selbstverständlich das gesamte Dokument umfassend prüfen. Im Folgenden finden Sie zudem drei wichtige Punkte, die Sie bei der Zusammenarbeit mit Ihrem Cloud-Anbieter berücksichtigen sollten.
Tags : 
unterzeichnung, public, cloud, vertrages, beachten, sollten
    
Astute IT DACH
Published By: Mimecast     Published Date: Jun 22, 2015
So, your organization has chosen to move to Office 365. Good choice. But how do you implement it and deal with the following issues:
Tags : 
microsoft office 365, offline emails, cloud backup, email security, data in the cloud, cyber attacks, networking, disaster recovery, hacker detection, internet security, phishing
    
Mimecast
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search