Backups
How to Build a Lightning- Fast, Multi-Petabyte Backup Repository
IT teams are facing exponential data growth. It's natural to worry about exceeding capacity, wondering...
User Risk Report 2018
Risky end-user behaviours are impacting organisations around the world, with implications that can be...
The State of Office 365 Backup
Barracuda commissioned independent market researcher Centropy to conduct a survey of IT decision makers...
Ransomware Protection Checklist
Ransomware attackers are increasingly employing more sophisticated attacks and defeating existing defenses....
Adaptive Cloud Security for AWS
Amazon Web Services (AWS) is the largest provider of cloud computing services worldwide. AWS pioneered...
Cyber Security for Dummies
Protect your business and family against cyber attacks Cybersecurity is the protection against the unauthorized...
Real-world SLAs and Availability Requirements
Data protection technologies and processes are effective only when you establish clear objectives, then...
Cyber Attack Trends: Check Point’s 2022 Mid-Year Report
The war in Ukraine has dominated the headlines in the first half of 2022 and we can only hope that it...
Data Storage Considerations for Security Analytics
Log analytics has taken increasing importance over the years. In particular, applications that use log...
Prevent Ransomware From Cyber Disaster
Modern ransomware is one of the most significant cybersecurity threats to critical services, compute...
Learning SQL: Generate, Manipulate, and Retrieve Data
As data floods into your company, you need to put it to work right away—and SQL is the best tool for...
12 Steps for Stronger Ransomware Protection
Over the last few years, we have signed up hundreds of MSPs. We like to ask every new customer why they...
Sign up for IT Tech Publish Hub
As a subscriber you will receive alerts and free access to our constantly updated library of white papers, analyst reports, case studies, web seminars and solution reports.