Backups

5 Remote Work Threats and How to Protect Against Them
With the surge in remote work, many IT and security teams are forced to make security tradeoffs to maintain...

Security and risk management in the wake of the Log4j vulnerability
Security leaders agree: Log4j has irrevocably changed the risk landscape. Get a quick refresher on the...

Guidelines for an Effective Cybersecurity Incident Response Plan
Organizations with a cybersecurity incident response plan experience a lower average cost (by $2.46M)...

Sophos 2022 Threat Report
Interrelated threats target an interdependent world. We believe that shifting the timescale of attack...

Application Protection Report 2022: In Expectation of Exfiltration
Welcome to F5 Labs' Application Protection Report 2022. As in years past, the goal of this report is...

Maintaining ‘Business As Usual’ In Unusual Circumstances
The phrase 'business as usual' has a reassuring quality. It represents an ideal state in which the company...

Long-Term Data Retention with Veritas NetBackup
This white paper provides a technical overview of cloud storage as a long-term retention storage solution...

Why a Backup Strategy for Office 365 is Essential
This short, easy-to-read research paper by IDC provides their view on why having a backup of Office 365...

Ransomware Protection with Veritas NetBackup Appliances
Download this whitepaper to discover how to protect your backup and recovery infrastructure from attacks....

Real-world SLAs and Availability Requirements
Data protection technologies and processes are effective only when you establish clear objectives, then...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.