Johnny Yu
-
Responding to a cyberattack requires IT (ITOps), security (SecOps), legal, and other stakeholders to act in a coordinated manner, but bringing such disparate entities together in the middle of a crisis is challenging. CYGNVS' (pronounced "c...
-
SaaS application data is among the least protected data of all corporate data. Many SaaS vendors offer only minimal backup, restore, and retention capabilities. Yet SaaS apps are among the fastest-growing drivers of data creation. Backup an...
-
IBM launched a new ransomware protection product that uses content-based analytics to detect anomalies in snapshots as they are created. IBM Spectrum Sentinel helps narrow down when a ransomware intrusion occurs and identifies the last good...
-
This IDC study evaluates and highlights the most important criteria that differentiate prominent vendors providing container data management capabilities. Storage administrators need to be able to perform the same back-end tasks for contain...
-
This IDC study examines the 12 most prominent cyber-recovery vendors on a worldwide basis. Each has its unique market position, and this evaluation is intended to help IT buyers identify short-list candidates for the buyer's specific scenar...
-
Market Analysis Perspective: Worldwide Storage and Computing Infrastructure Software Platforms, 2023
This IDC Market Analysis Perspective (MAP) summarizes key demand and supply trends driving the storage software and operating systems and environments (OSEs) markets, which are components of the Storage and Computing Infrastructure Software...
-
Archiving + Cold Data in the Cloud
-
Causes for Container Repatriation
-
Cloud-based Archiving Approaches
More results for Planned Research