Johnny Yu
Responding to a cyberattack requires IT (ITOps), security (SecOps), legal, and other stakeholders to act in a coordinated manner, but bringing such disparate entities together in the middle of a crisis is challenging. CYGNVS' (pronounced "c...
SaaS application data is among the least protected data of all corporate data. Many SaaS vendors offer only minimal backup, restore, and retention capabilities. Yet SaaS apps are among the fastest-growing drivers of data creation. Backup an...
IBM launched a new ransomware protection product that uses content-based analytics to detect anomalies in snapshots as they are created. IBM Spectrum Sentinel helps narrow down when a ransomware intrusion occurs and identifies the last good...
This IDC study provides a detailed description of our storage and computing infrastructure software platforms taxonomy. This taxonomy is made up of two core secondary markets, which are further broken down into five functional markets speci...
This IDC Market Perspective is the second piece to a series about data classification and its relationship to storage software. It looks into market conditions and what buyers will look for in a data classification solution.IDC research has...
This IDC Market Note discusses the increased demand of having a data classification capability to combat data exfiltration and help organizations better leverage their data stores for modern workloads. It looks into where storage software v...
Causes for Container Repatriation
IT Infrastructure for Storage and Data Management Survey Q4 2022
IDC MarketScape: Worldwide Container Storage and Data Management 2023 Vendor Assessment
More results