CWjobs.co.uk

Welcome to CWJobs jobseeker   Register   or   Sign in    0 Saved jobs

10,380 ads for IT jobs from 783 companies

CWJobs Whitepaper Directory

Choose from hundreds of technology whitepapers from leading industry experts including IBM, Cisco, Symantec and Citrix.

Covering IT categories including Data Management, Networking, Security and much more; CWJobs Whitepaper Directory is a great source for technical whitepapers and IT information. What's more, it is completely free of charge

Stay in touch with the latest IT information, trends and research today!

carbonite

Results 1 - 25 of 59Sort Results By: Published Date | Title | Company Name
Published By: Carbonite     Published Date: Oct 10, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Jul 12, 2017
With IT departments stretched thin, it’s no wonder more businesses are looking to outsource their backup and disaster recovery (BDR) plan. The rise of disaster recovery as a service (DRaaS) is a big win for businesses that want their IT staff focusing on strategic business goals but still require a dependable, provable BDR deployment. Find out more by reading our white paper, 5 reasons to choose DRaaS. Carbonite DoubleTakeTM is now delivering leading DRaaS solutions for complex and mixed environments. Contact us to learn more.
Tags : 
information technology, disaster recovery, it development, outsource
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
Find out five good reasons to consider disaster recovery as a service (DRaaS) and use our buyer’s cheat sheet to make sure you are asking the right questions when evaluating a DRaaS solution.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Feb 22, 2017
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
backup, disaster, recovery, bdr, carbonite, environment
    
Carbonite
Published By: Carbonite     Published Date: Apr 09, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Apr 11, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
There are five essential steps to protecting data and applications from the most common causes of data loss and downtime. IT pros who follow these steps can feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through backup and disaster recovery (BDR) deployments.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Jan 04, 2018
It’s the moment every IT department dreads: A data loss event takes your business offline and the countdown clock begins. Despite spending countless hours safeguarding against and preparing for this moment, the impact of downtime is immediate and all-consuming. While IT pros can’t always avoid data loss events, they can prepare for them to ensure minimal downtime. To better understand the IT experience during a data disaster, EVault commissioned Spiceworks Voice of IT to survey IT pros regarding disaster recovery practices and perceptions. All survey respondents were based in the U.S. and have influence over backup/disaster recovery purchase decisions. This e-book will explore the impact of downtime and data loss on IT departments for small and midsize businesses.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 12, 2017
Research Now, a leading global research firm, recently surveyed 200 IT decision makers to compare satisfaction levels among four different backup and recovery solutions. Carbonite backup and recovery powered by EVault technology received the top ratings in several categories, including reliability and ease of use. Overall, Carbonite ranked #1 in five of the eight factors IT pros said were most important to them.
Tags : 
evault technology, reliability, recovery, ease of use, research now
    
Carbonite
Published By: Carbonite     Published Date: Aug 02, 2017
Carbonite Cloud Migration Powered by DoubleTake is an online service that enables migrations from any physical, virtual or cloud-based environment into VMware vSphere, vCloud Director, OpenStack, Amazon Web Services EC2 or Microsoft Azure infrastructure as a service (IaaS) cloud environments. The webbased console provides automated, centralized migration to the cloud. This document provides a detailed technical briefing on the functionality and use of Carbonite Cloud Migration and assumes that the reader will have at least a basic understanding of infrastructure as a service (IaaS).
Tags : 
carbonite, cloud, cloud-based environment, iaas. cloud migration
    
Carbonite
Published By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime associated with server migration have prevented many IT organizations from making the move to cloud. Some have valid concerns about cloud lock-in. Still, without cloud, IT teams are less agile, less flexible and less able to meet the demands of their business. With so much C-suite awareness of the cloud competitive edge, IT can no longer avoid taking this step. Carbonite DoubleTake™ Cloud Migration Center quickly and easily migrates physical, virtual and cloud workloads over any distance with minimal risk and near-zero downtime. The streamlined process automates 100 manual steps into five easy steps, automating everything from server discovery to target VM provisioning to the ultimate cutover. Using efficient real-time, byte-level replication technology, Cloud Migration Center creates a replica of the entire server being migrated and keeps it in sync with production systems. The migrated data can be validated without disrupting business operations, and downtime is
Tags : 
carbonite, cloud migration, automation, virtual workload, cloud workload
    
Carbonite
Published By: Carbonite     Published Date: Aug 02, 2017
The risk and downtime of server migration have locked many IT teams into platforms that are no longer ideal. Migrations are often delayed or avoided—whether it’s moving data to the cloud or back on premises, or upgrading the hardware of the database software. This results in lost opportunities, unnecessary costs, and a lack of agility that today’s IT teams can no longer afford. Carbonite Move Powered by DoubleTake quickly and easily migrates physical, virtual, and cloud workloads over any distance with minimal risk and near-zero downtime. Using efficient real-time, byte-level replication technology, Carbonite Move creates a replica of the data, application, database, or entire server being migrated and keeps it in sync with the production system. The migrated data can be validated without disrupting business operations, and downtime is limited to the seconds or minutes required for cutover to the new server.
Tags : 
carbonite, doubletake, risk mitigation
    
Carbonite
Published By: Carbonite     Published Date: Oct 12, 2017
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses.
Tags : 
ransomware, malware, cybercrime, lockscreen, encryption
    
Carbonite
Published By: Carbonite     Published Date: Jan 04, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually. According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands. No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Apr 09, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually.1 According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands.2 No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.3 Ransomware is the equivalent of catastrophic data loss, except
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 05, 2017
Data protection often seems like a clash between competing interests: the need to protect data, against the need to protect access to data. The challenge lies in deploying the right protection across the different systems and types of data, since they each require different forms of protection. IT pros need confidence that the protection they deploy can: •Ensure long-term survivability of historical data •Deliver data securely to different waypoints. •Extend protection as environments change.
Tags : 
data protection, data security, carbonite, data recovery, data resiliency, data backup
    
Carbonite
Published By: Carbonite     Published Date: Jan 04, 2018
Data protection often seems like a clash between competing interests: the need to protect data, against the need to protect access to data. The challenge lies in deploying the right protection across the different systems and types of data, since they each require different forms of protection.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 12, 2017
Testing full recoveries of IT environments requires a proven methodology. Establishing and meeting RTOs, configuring a cloud recovery system, and tracking your changing environment are all critical components of a successful cloud recovery operation. In this expert Technical Guide, learn how Jamie Evans, Senior Manager of Disaster Recovery as a Service (DRaaS) for EVault, helps clients complete a full recovery of their systems.
Tags : 
cloud, recovery, vlan, data center, draas
    
Carbonite
Published By: Carbonite     Published Date: Apr 09, 2018
No one ever wants a recovery to go south—whether it’s your first or 50th time completing a data recovery operation. But your organization will experience a bit more anxiety when it goes to perform its first recovery using a new solution. If the phrase “successful recovery”, in your experience, has applied to only a few applications or a limited set of files, it’s understandable that you may be anxious the first time you test a recovery of your entire environment. Know this: you can successfully conduct a full recovery of your environment the first time as well as every time thereafter. This is the challenge and opportunity that I face every day in my role: to deliver successful cloud recovery for my clients no matter what. While we never guarantee that a recovery will occur without some hiccups during the process, I can point to the fact that every cloud recovery that I have overseen has met our agreed upon service levels whether that guarantee is for a 1-hour recovery, a 24-hour rec
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Jul 18, 2018
© 2018 Carbonite, Inc. All rights reserved. Case study Diamond Foods’ Diamond of California® nuts are household staples for shoppers across the U.S. But constantly filling grocery store shelves with snacks requires intricate supply chain management that relies on critical business data, including complex spreadsheets and enterprise resource planning files, to keep production and deliveries on schedule. “If our critical servers go down or we lose important data on employee laptops, it has a direct impact on our bottom line,” says Kentrell Davis, Senior Client Support Services Analyst at Diamond Foods.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
Data protection is a balancing act between the need to protect data and the need to protect access to data. The trick lies with deploying the right protection across the different systems and types of data, since they each require different forms of protection.
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
With more and more employees spread around the globe, IT teams face a conundrum: how to secure an increasing amount of data traveling outside the network while preserving workforce productivity in an increasingly interconnected and global market. It’s up to IT decision-makers to protect and secure company data in a way that promotes user access without imposing overly restrictive or cumbersome device policies. When it comes to protecting data on laptops and mobile devices, several key factors are essential for today’s businesses:
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 10, 2018
In the last few years, businesses have changed the way they protect data. Studies show they’re abandoning traditional backup and recovery in favor of disaster recovery as a service (DRaaS).1 With DRaaS, businesses enjoy the luxury of keeping a replica of their data hosted at a remote site that they can fail over to in an emergency—without bearing any of the infrastructure costs or maintenance responsibilities. All infrastructure and maintenance is the responsibility of the provider. Gartner predicts that global DRaaS revenue will reach $3.4 billion by 2019. The firm cited several reasons for the shift:
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Apr 09, 2018
The core technology behind Disaster Recovery as a Service (DRaaS) has evolved for decades. More recently, DRaaS has linked to the cloud, and finally hit its stride. Today it can provide unprecedented availability options to companies who don’t have secondary data centers dedicated to business continuity. Before now, only IT teams with additional IT budget, staff and geographic locations could effectively hedge against downtime, and disasters. But today’s DRaaS means that businesses of all sizes have the peace of mind that comes with knowing a replica of their data and systems is hosted at a remote site that they can fail over to—without bearing any of the infrastructure costs or maintenance responsibilities. All infrastructure and maintenance is the responsibility of the DRaaS provider. And the technology ensures that a replica is not only available, but always current and immediately available. This attractive value proposition led Gartner to predict that global DRaaS revenue will rea
Tags : 
    
Carbonite
Published By: Carbonite     Published Date: Oct 12, 2017
There are five essential pieces to a sound backup and disaster recovery (BDR) plan, and IT pros who follow these steps are able to feel confident in their long-term organizational plan. Read this expert guide from Ben Maas, an independent consultant and system architect who has guided many companies through BDR deployments, to learn these five fundamentals. Understand how to size your environment, evaluate your BDR capabilities, and test your system for any surprises.
Tags : 
bdr, recovery capabilities, backup data repositories, data center, over - the - wire, remote
    
Carbonite
Start   Previous   1 2 3    Next    End
Search