Phil Goodwin
IBM's decision to OEM Cohesity DataProtect, which will be part of IBM's new Storage Defender data protection software portfolio, gives an immediately competitive solution for data protection in virtual infrastructure environments, an area w...
Responding to a cyberattack requires IT (ITOps), security (SecOps), legal, and other stakeholders to act in a coordinated manner, but bringing such disparate entities together in the middle of a crisis is challenging. CYGNVS' (pronounced "c...
SaaS application data is among the least protected data of all corporate data. Many SaaS vendors offer only minimal backup, restore, and retention capabilities. Yet SaaS apps are among the fastest-growing drivers of data creation. Backup an...
These event proceedings were presented at the IDC Directions conferences in Boston and Santa Clara in March 2023.Data logistics, as the name implies, is the task of capturing, storing, moving, protecting, and assuring data availability. Wel...
This IDC Tech Buyer Presentation offers practical guidance for implementing zero trust within backup environments. Backup data sets are often a target for cyber-ransomers. In some cases, they delete the backup so it can't be used to recover...
This IDC Tech Buyer Presentation provides a glossary of business continuity terms. The data protection market is rife with terms that sound similar but have subtle differences and may be confused with similar terms that are used interchange...
Cyber Recovery as a Service Perspective
DataOps Market Glance Update
IDC's Worldwide Storage and Computing Infrastructure Software Platforms Taxonomy, 2021
More results