Top White Papers and Webcasts

  • Malware that encrypts a victim's data until the extortionist's demands are met is one of the most common forms of cybercrime. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses, indiscriminately. Ransomware attacks are pervasive and on the rise — no one is safe from them. This guide details the ransomware problem, how it works, how you can help reduce your exposure to ransomware attacks, and how cloud–based backup …

  • Most data protection solutions make you choose between two imperfect storage options: high-cost disk or high-maintenance tape. There is a third option: object storage as a backup target. This analyst research note discusses how object storage works, how it uniquely solves the data protection challenge, and how it helps you meet your backup SLAs at 70% less cost than purpose-build backup appliances. Authored by the storage experts at the Evaluator Group, this paper provides a TCO analysis. Learn how object …