Computer Data Recovery Reports

A Security Assessment of Android Full-disk Encryption
sponsored by TechTarget ComputerWeekly.com
EGUIDE: This article in our Royal Holloway Security Series describes an attack on Android 5.0 full disk encryption and discusses potential countermeasures.
Posted: 08 Feb 2021 | Published: 02 Aug 2016

TechTarget ComputerWeekly.com

PHD Virtual RTA Tool
sponsored by PHD Virtual
WEBCAST: This webcast provides information on a virtual Recovery time Actual (RTA) tool that will help you accurately calculate RTOs. Find out how your organization can achieve this goal (hint: no install is needed, just somewhere to run the executable).
Posted: 31 Jan 2014 | Premiered: Nov 11, 2013

PHD Virtual

Cloud Archiving for Cold and Not-So-Cold Storage
sponsored by Iron Mountain
EGUIDE: This expert guide delves into the cloud archiving market and discusses 4 aspects enterprises should look into when considering a cloud archive solution. Discover how a cloud provider can help your enterprise meet archive regulatory requirements at the lowest possible cost.
Posted: 04 Aug 2016 | Published: 02 Aug 2016

Iron Mountain

Data Management Guidelines: Four Records Retention Issues To Address
sponsored by Symantec Corporation
EGUIDE: This e-guide details data management guidelines to help you determine what you should keep when implementing a records retention policy. Learn about four issues that can occur if you retain too much unnecessary data, including access trouble, cost influx, and more.
Posted: 26 Nov 2014 | Published: 26 Nov 2014

Symantec Corporation

Take Control of Your Data - A Guide to Understanding Storage Technologies
sponsored by HPE and Intel®
WHITE PAPER: Take a look at this informative guide to discover how you can master your storage needs with HP's industry-leading solution.
Posted: 14 Mar 2014 | Published: 31 Aug 2013

HPE and Intel®

Dealing with Data Growth: Storage and Backup Strategies
sponsored by Simplify IT
EGUIDE: This e-guide, from SearchDataBackup.com, examines how the proliferation of business information has contributed to the current state of data protection.
Posted: 05 Dec 2013 | Published: 05 Dec 2013

Simplify IT

Webinar: Protecting Critical SaaS Data Before It’s Too Late
sponsored by Spanning Cloud Apps
WEBCAST: This webinar goes through the best practices for SaaS data protection. Presented by industry experts, it touches on the key points for understanding how to ensure SaaS data protection and how to find the right provider.
Posted: 05 May 2014 | Premiered: Apr 1, 2014

Spanning Cloud Apps

Could the WannaCry Decryptor Work on Other Ransomware Strains?
sponsored by Cisco Umbrella
EGUIDE: After the global outbreak of the WannaCry ransomware, researchers created decryptor tools that could save affected files. In this guide, expert Matthew Pascucci explains how the tools work and if they work on other ransomware strains.
Posted: 01 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella

Building the Business Case for Integrated Backup Appliances
sponsored by Symantec Corporation
WHITE PAPER: This white paper addresses the benefit of investing in an all-in-one backup appliance to cut costs while reducing management overhead and complexity.
Posted: 14 Feb 2014 | Published: 14 Feb 2014

Symantec Corporation

Navigating Ransomware Recovery
sponsored by Cisco Umbrella
EGUIDE: The decisions and road to recovery will involve several stakeholders and real costs. So, when organizations must make the tough decision of whether to pay a ransom, rebuild the system, or file a report, there are many factors to consider. Use this e-guide to help you plan and map out steps to avoid rushing into bad choices that can’t be reversed.
Posted: 20 Apr 2020 | Published: 11 Feb 2020

Cisco Umbrella