Phil Goodwin
IBM's decision to OEM Cohesity DataProtect, which will be part of IBM's new Storage Defender data protection software portfolio, gives an immediately competitive solution for data protection in virtual infrastructure environments, an area w...
Responding to a cyberattack requires IT (ITOps), security (SecOps), legal, and other stakeholders to act in a coordinated manner, but bringing such disparate entities together in the middle of a crisis is challenging. CYGNVS' (pronounced "c...
SaaS application data is among the least protected data of all corporate data. Many SaaS vendors offer only minimal backup, restore, and retention capabilities. Yet SaaS apps are among the fastest-growing drivers of data creation. Backup an...
This IDC study provides a detailed description of our storage and computing infrastructure software platforms taxonomy. This taxonomy is made up of two core secondary markets, which are further broken down into five functional markets speci...
These event proceedings were presented at the IDC Directions conferences in Boston and Santa Clara in March 2023.Data logistics, as the name implies, is the task of capturing, storing, moving, protecting, and assuring data availability. Wel...
This IDC Tech Buyer Presentation offers practical guidance for implementing zero trust within backup environments. Backup data sets are often a target for cyber-ransomers. In some cases, they delete the backup so it can't be used to recover...
Cloud Data Logistics FoCloud Prediction Explained
Cloud Data Logistics FoDI Prediction Explained
Cyber Recovery as a Service Perspective
More results