Top White Papers and Webcasts

  • Malware that encrypts a victim's data until the extortionist's demands are met is one of the most common forms of cybercrime. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses, indiscriminately. Ransomware attacks are pervasive and on the rise — no one is safe from them. This guide details the ransomware problem, how it works, how you can help reduce your exposure to ransomware attacks, and how cloud–based backup …

  • One of the cornerstones of Pure Storage® design principles is simplicity. This is clearly evident in how easy it is to snapshot/clone databases on a Pure Storage Array. This document was written to help storage administrators, SAP system administrators, and data center architects find out more about this feature for a very common use case backup and recovery of a database instance. The database in this case is SAP HANA®. This paper covers the necessary steps to take a snapshot of a SAP HANA® instance for …