Analyst Location
United States
Coverage
- Cloud computing
- System infrastructure software
- Cloud and virtualization system software
- Storage
- Governance, risk and compliance infrastructure
Regions
Johnny Yu
-
Responding to a cyberattack requires IT (ITOps), security (SecOps), legal, and other stakeholders to act in a coordinated manner, but bringing such disparate entities together in the middle of a crisis is challenging. CYGNVS' (pronounced "c...
-
SaaS application data is among the least protected data of all corporate data. Many SaaS vendors offer only minimal backup, restore, and retention capabilities. Yet SaaS apps are among the fastest-growing drivers of data creation. Backup an...
-
This IDC Survey Spotlight provides insight into buyers’ intentions surrounding containerized application protection over the next two years based on IDC’s Future Enterprise Resiliency and Spending Survey, Wave 10, from November 2023. As org...
-
This IDC study evaluates and highlights the most important criteria that differentiate prominent vendors providing container data management capabilities. Storage administrators need to be able to perform the same back-end tasks for contain...
-
This IDC study examines the 12 most prominent cyber-recovery vendors on a worldwide basis. Each has its unique market position, and this evaluation is intended to help IT buyers identify short-list candidates for the buyer's specific scenar...
-
Archiving: How Long to Keep Data in the CLoud
-
Causes for Container Repatriation
-
Considerations When Transitioning from On-Premises to Cloud Archiving
More results for Planned Research