Backups
How to Build a Lightning- Fast, Multi-Petabyte Backup Repository
IT teams are facing exponential data growth. It's natural to worry about exceeding capacity, wondering...
Upgrade to State-of-the-Art Log Management
Most log messages traditionally come from three types: system logs of servers, network devices, and applications....
The Gorilla Guide to Rapid Restores with Flash and Cloud
Welcome to this Gorilla Guide covering enterprise data protection, backup, and recovery. The purpose...
Data Storage Considerations for Security Analytics
Log analytics has taken increasing importance over the years. In particular, applications that use log...
Penetration Testing For Dummies
Target, test, analyze, and report on security vulnerabilities with pen-testing Pen-Testing is necessary...
7 Critical Reasons for Office 365 Backup
You have one more reason added to the 6 critical reasons to protect your Office 365 data. This 5-minute...
Quest Toad for Oracle Tips and Tricks
Toad® for Oracle has been the IT community's tool of choice for more than a decade. With Toad, you are...
Security and risk management in the wake of the Log4j vulnerability
Security leaders agree: Log4j has irrevocably changed the risk landscape. Get a quick refresher on the...
GigaOm Radar for Data Storage for Kubernetes
Kubernetes adoption is quickly accelerating, and enterprises are now in a transition phase. In the last...
NetBackup is Unified Data Protection for the Cloud-Ready Enterprise
As technology evolves, so does NetBackup. This eGuide explores four key use cases that show how NetBackup...
Redefining Modern Enterprise Storage for Mission-critical Workloads
The digital business demands being placed on enterprise-scale IT organizations are now so extreme that...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.