Search Disaster Recovery
Login Register
Explore the Network
  • TechTarget Network
  • Data Backup
  • Storage
  • Security
  • CIO
  • Search Disaster Recovery
    • Cloud DR
    • Facilities & Operations
    • Planning and Management
    Other Content
    • News
    • Features
    • Tips
    • Webinars
    • Sponsored Sites
    • More
      • Answers
      • Conference Guides
      • Definitions
      • Opinions
      • Podcasts
      • Quizzes
      • Tech Accelerators
      • Tutorials
      • Videos
  • Follow:

News

Vendor Resources
  • When Disaster Strikes A Guide to Data Recovery and Business Continuity –White Paper
  • Step-by-step disaster recovery planning guide –eBook
  • Computer Weekly – 17 April 2018: Can China's Alibaba successfully take on the ... –Ezine
Latest TechTarget resources
  • Data Backup
  • Storage
  • Security
  • CIO
Search Data Backup
  • SaaS shared responsibility model: What vendors don't cover

    Don't let your organization lose cloud data to misplaced trust and thin vendor protections. Learn what providers don't cover and ...

  • 4 long-term backup options for enterprise data

    Data backups ensure copies of critical data are available in the event of a crisis or failure. When backing up long-term data, ...

  • Ways to protect data platforms from turnover risk

    Departing data employees can take valuable Institutional knowledge. Protect it with consistent documentation, a central ...

Search Storage
  • Can AI save the storage admin?

    AI initiatives have created a surge of data, making traditional storage management insufficient. How much can AI help solve the ...

  • AI brings storage admin challenges of trust, tech and liability

    Storage admins should stock up on aspirin as the continued enterprise AI adoption throughout 2026 will continue to create new ...

  • IBM FlashSystem adds 105 TB modules with agentic AI smarts

    IBM FlashSystem refresh includes a high-capacity flash module amid a memory supply crunch and automated data placement at block ...

Search Security
  • How to evaluate NGFW products to strengthen cybersecurity

    Next-generation firewalls are critical tools in today's evolving threat landscape. Learn how to evaluate and select an NGFW that ...

  • CISO's guide to demonstrating cyber resilience

    Elevating cybersecurity to a state of resilience requires a security team to adapt and strengthen defenses. The result should be ...

  • CISO's guide: How to prevent business email compromise

    Business email compromise feeds on professional email norms -- and exploits emotions such as fear or urgency. Learn what BEC is, ...

Search CIO
  • 5 pillars of an agentic AI strategy

    Agentic AI is forcing CIOs to rethink IT strategy. Success depends on identifying key use cases, assessing data readiness, ...

  • AI failure examples: What real-world breakdowns teach CIOs

    The real risk of AI isn't experimentation—it's deployment. Leaders must address governance, data gaps and oversight before ...

  • ESG for IT: How CIOs can drive environmental sustainability

    Sustainability as a business initiative has rocketed up the priority list as investors, consumers and legislators demand ...

  • About Us
  • Editorial Ethics Policy
  • Meet The Editors
  • Contact Us
  • Advertisers
  • Partner with Us
  • Media Kit
  • Corporate Site
  • Contributors
  • Reprints
  • Answers
  • Definitions
  • E-Products
  • Events
  • Features
  • Guides
  • Opinions
  • Photo Stories
  • Quizzes
  • Tips
  • Tutorials
  • Videos

©2025 TechTarget, Inc. d/b/a Informa TechTarget. All Rights Reserved.

Privacy Policy
Cookie Preferences
Cookie Preferences
Do Not Sell or Share My Personal Information

Close