Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date Steps and Considerations to Build a Successful Business Resilience Plan Recovery Point Resilience plans are designed to help organizations adapt quickly to risks and disruptions, while maintaining key business workflows and safeguarding ... February 15, 2023 3:00pm Be Prepared, Not Scared of Ransomware Attacks Nicholas Hughes - Strategic Account Executive, Hitachi Vantara, and Graeme Down - Solutions Consultant, Hitachi Vantara With the rising threat of ransomware attacks, businesses need to have a fast, predictable, and reliable plan in place for when their systems are infec... February 10, 2023 10:00am Protecting Research Data with Cloudian and Gammer Jeremy Tang - Sr Technical Consultant at Gammer Group, Douglas Morrison - ICT Manager at AGRF Managing and protecting research data has become a challenge for many Higher Education and research organisations, and with volumes of research data g... 2 months ago | 37 mins The Future of Data Protection Using Cloud Object Storage Henry Baltazar, 451 Research; Drew Schlussel, Wasabi Technologies; Rick W. Vanover, Veeam While the on-prem versus cloud debate still rages on, the majority of enterprises have moved ahead with a hybrid cloud strategy, leveraging best-of-br... 2 months ago | 58 mins Benefits of FC-NVMe for Containerized ML Models Nishant Lodha, Marvell; Ramya Krishnamurthy, HPE; Rupin Mohan, HPE; Ajay Kumar , HPE; Ashish Neekhra, HPE Machine learning (ML) is the study and development of algorithms that improves with use of data. As it deals with the training data, the machine algor... March 9, 2023 6:00pm 5 Reasons Why Traditional Backup Doesn’t Work During a Ransomware Attack Nasuni's John Bilotti, CIO/CISO, Barrie Kuza, VP of Product Management and Anne Blanchard, Sr. Director of Product Marketing The evolution of ransomware has spurred many organizations to focus on plans for recovering from attacks as quickly and efficiently as possible. Compa... 4 months ago | 49 mins Don't take the Proactive Immutable Storage out of your IT security strategy Anthony Parry, Partner Account Manager and Richard Hornsby, Pre Sales Consultant CISO’s have stepped up protection of their businesses with prevention solutions, such as: AV / firewalls / identity & access management / PAM / ... BU... 7 months ago | 34 mins A Practical Guide to Ransomware: Immutable Backups with Wasabi + Veritas Drew Schlussel, Vilas Belagodu, and Andrew Smith Ransomware attacks are here to stay, impacting organizations small and large. The best preparation is a layered defense built on a foundation of redun... 3 months ago | 28 mins Immutable and Air-Gapped Backups are Dead... Ransomware 3.0 Killed Them John Burke - CTO, Nemertes | Pete Nourse - CRO & CMO, Peter Smith - Founder, The Cyber Badger As companies bolster their security strategies, attackers are finding new ways of spotting and exploiting vulnerabilities within corporate IT stacks t... 5 months ago | 40 mins Protecting Research Data with Cloudian and Gammer Jeremy Tang - Sr Technical Consultant at Gammer Group, Douglas Morrison - ICT Manager at AGRF Managing and protecting research data has become a challenge for many Higher Education and research organisations, and with volumes of research data g... 5 months ago | 37 mins Load more