www.itpro.com Open in urlscan Pro
151.101.66.114  Public Scan

Submitted URL: https://futureplc.slgnt.eu/optiext/optiextension.dll?ID=0wx0qo5VKgCkKmcevtqhAKv+vttSEiOGChf4q6+4qm_5KazKDPEmZPadwXWgT92A5tp...
Effective URL: https://www.itpro.com/security/cyber-attacks/368461/storages-role-in-addressing-the-challenges-of-ensuring-cyber?utm_s...
Submission: On August 05 via api from US — Scanned from DE

Form analysis 2 forms found in the DOM

GET https://www.itpro.com/search

<form class="search-box" action="https://www.itpro.com/search" method="GET" data-analytics-id="search-submit" data-before-rewrite-localise="/search" data-component-tracked="19">
  <label for="search-input" class="sr-only">Search IT Pro</label>
  <input tabindex="0" type="search" name="searchTerm" placeholder="Search IT Pro" class="search-input" id="search-input">
  <button type="submit" class="search-submit" aria-label="Search">
    <span class="search-icon">
      <svg class="icon-svg" xmlns="http://www.w3.org/2000/svg" viewBox="0 0 1000 1000">
        <path d="M720 124a422 422 0 1 0-73 654l221 222 132-131-222-222a422 422 0 0 0-58-523zm-92 504a291 291 0 1 1-412-412 291 291 0 0 1 412 411z"></path>
      </svg> </span>
  </button>
</form>

POST https://newsletter-subscribe.futureplc.com/v2/submission/submit

<form data-hydrate="true" class="newsletter-form__form newsletter-form__form--inbodyContent" method="POST" action="https://newsletter-subscribe.futureplc.com/v2/submission/submit"><input data-hydrate="true" type="hidden"
    class="form__hidden-input form_input form__hidden-input form__hidden-input--inbodyContent" name="NAME"><input data-hydrate="true" type="email" class="form__email-input form_input form__email-input form__email-input--inbodyContent" name="MAIL"
    required="" placeholder="Your Email Address"><input data-hydrate="true" type="hidden" class="form__hidden-input form_input form__hidden-input form__hidden-input--inbodyContent" name="NEWSLETTER_CODE" value="ITP_STD"><input data-hydrate="true"
    type="hidden" class="form__hidden-input form_input form__hidden-input form__hidden-input--inbodyContent" name="LANG" value="EN"><input data-hydrate="true" type="hidden"
    class="form__hidden-input form_input form__hidden-input form__hidden-input--inbodyContent" name="SOURCE" value="60"><input data-hydrate="true" type="hidden"
    class="form__hidden-input form_input form__hidden-input form__hidden-input--inbodyContent" name="COUNTRY"><label class="form__checkbox-label"><input data-hydrate="true" type="checkbox"
      class="form__checkbox-input form_input form__checkbox-input form__checkbox-input--inbodyContent" name="CONTACT_OTHER_BRANDS">Contact me with news and offers from other Future brands</label><label class="form__checkbox-label"><input
      data-hydrate="true" type="checkbox" class="form__checkbox-input form_input form__checkbox-input form__checkbox-input--inbodyContent" name="CONTACT_PARTNERS">Receive email from us on behalf of our trusted partners or sponsors</label><input
    data-hydrate="true" type="submit" class="form__submit-input form_input form__submit-input form__submit-input--inbodyContent" required="" value="Sign me up"></form>

Text Content

Skip to main content

Open menu Close menu
ITPro IT Pro
Search
Search IT Pro
Subscribe
RSS
US Edition



US


Australia


UK

 * 
 * Business
 * Cloud
 * Hardware
 * Infrastructure
 * Security
 * More
   * Zero Trust
   * Software
   * Technology
   * Resources
   * ITPro newsletter

Cloud Pro
Channel Pro
Technology Magazines
Why subscribe?
 * The best tech tutorials and in-depth reviews
 * Try a single issue or save on a subscription
 * Issues delivered straight to your door or device

From€8
View Deal



Trending
 * Best cloud file sharing services for 2024
 * Artificial intelligence in business
 * The best business servers for 2024
 * Subscribe to the ITPro newsletter



 1. Security
 2. Data Protection


STORAGE'S ROLE IN ADDRESSING THE CHALLENGES OF ENSURING CYBER RESILIENCE

Whitepapers
By ITPro
published July 6, 2022

Understanding the role of data storage in cyber resiliency

 * 
 * 
 * 

When you purchase through links on our site, we may earn an affiliate
commission. Here’s how it works.


(Image credit: IBM)


In this whitepaper, ESG makes it clear that defensive measures against cyber
attacks are no longer sufficient. 63% of the organisations surveyed have
experienced ransomware attacks over the past years, partly due to growing IT
complexity which have created additional vulnerabilities.



ESG experts share a deeper look at the concept of cyber resilience, which not
only defends against cyberattacks but puts in place recovery solutions in the
event of an attack, and looks at four key components of the cyber resilience
solution, IBM Cyber Vault, alongside the important role storage plays in
resiliency.



Download now to learn more.

Provided by  IBM




GET THE ITPRO. DAILY NEWSLETTER

Receive our latest news, industry updates, featured resources and more. Sign up
today to receive our FREE report on AI cyber crime & security - newly updated
for 2024.

Contact me with news and offers from other Future brandsReceive email from us on
behalf of our trusted partners or sponsors
By submitting your information you agree to the Terms & Conditions and Privacy
Policy and are aged 16 or over.
ITPro
Social Links Navigation

ITPro is a global business technology website providing the latest news,
analysis, and business insight for IT decision-makers. Whether it's cyber
security, cloud computing, IT infrastructure, or business strategy, we aim to
equip leaders with the data they need to make informed IT investments.

For regular updates delivered to your inbox and social feeds, be sure to sign up
to our daily newsletter and follow on us LinkedIn and Twitter.

More about data protection

ICO slams Electoral Commission over security failures



Why enterprise data protection doesn't have to be a drag or drain


Latest

CrowdStrike hits back at Delta’s “public posturing” as war of words intensifies

See more latest ►




MOST POPULAR

The new imperative: Future-proof your business with hybrid cloud storage
Dell Technologies continuously modern storage
Accelerated, gen AI powered mainframe app modernization with IBM watsonx code
assistant for Z
A new era in direct store delivery AI-powered solutions for seamless business
process and profitable portfolio
The impact of generative AI on business
Magic quadrant for finance and accounting business process outsourcing 2024
Digital workers: Five best practices for a people-first approach to adoption
Rethinking endpoint security for modern work
Mac endpoint protection
Security 360: Annual Trends Report 2024
Essential guide to antivirus for Mac



RESOURCES


AI SURVEY REPORT

Posted

Whitepaper


GBS ORGANIZATIONS OF THE FUTURE ARE GROWTH ENABLERS AND RESOURCE WELLS FOR
INNOVATION

Posted

whitepaper


CONSULTING CLIENT BRIEFING

Posted

whitepaper


IBM GENERATIVE AI ASSISTANTS: THE COMPLETE 2024 BUYERS GUIDE

Posted

whitepaper
VIEW MORE WHITEPAPERS
MOST READ
 1. 1
    CrowdStrike hits back at Delta’s “public posturing” as war of words
    intensifies
 2. 2
    The UK is dealing with a chronic data skills shortage – and it’s costing the
    economy billions each year
 3. 3
    The Authy desktop app has officially reached end of life – here's what you
    need to know
 4. 4
    Infosys and ServiceNow want to ramp up enterprise transformation with AI
 5. 5
    Everything you need to know about GitHub Models, the new AI testing
    ‘playground’ for developers



IT Pro is part of Future US Inc, an international media group and leading
digital publisher. Visit our corporate site.

 * Terms and conditions
 * Contact Future's experts
 * Privacy policy
 * Cookies policy
 * Accessibility statement
 * Careers
 * About Us
 * Contact Us

© Future US, Inc. Full 7th Floor, 130 West 42nd Street, New York, NY 10036.