This is the kind of webinar you don’t want to miss. You’ll see how to get the best out of your backup software, explore the tools and best practices that enable powerful VM protection against data loss. The data are the most precious you have. Just make sure you doing all you are able to, […]
Nakivo for Proxmox – Your safe backup solution
In the ever-evolving landscape of data protection, Nakivo has taken a significant leap forward by integrating support for Proxmox Backup. This strategic move empowers Nakivo users with advanced backup and recovery options, ensuring their virtual environments are more secure and resilient than ever. I have recently published a blog post explaining a simple security feature […]
How-to Enhance your company’s security with Role-Based Access Control in Nakivo Backup and Replication
If you’re thinking of any backup solution, think that while you working in an IT team, you need to separate the tasks and separate the roles the each of your team member have. Some team members needs to see backup jobs, other needs to have full access to backup and replication jobs. In this post […]
Hornetsecurity Cyber Security Report 2024: What to Expect in the Microsoft 365 Threat Landscape
Hornetsecurity who is a provider of cloud-based email security solutions and data protection solutions (formerly Altaro VM Backup) has recently released its annual Cyber Security Report 2024, which analyzes the Microsoft 365 (M365) threat landscape based on real-world data collected from billion of emails processed in 2023. (3.5 billion every month). The report reveals the […]
Thinking of Moving LTO archives to the cloud? Check StarWind VTL Appliance
Here is the thing. You have a regulatory requirements to keep your LTO archives for let’s say, 15 years. Imagine handling your LTOs, for let’s say 30-50 years. LTO has 30 year life expectancy but what about tape drives. But imagine that you have to maintain old equipment just in case you have to restore […]
What is StarWind Tape Redirector (FREE) and what’s the benefits?
What is StarWind Tape Redirector and how does it work? I’ll try to explain the product and its functionality in my blog post. StarWind Tape Redirector is a free tool that is part of StarWind Virtual SAN Free functionality. It is distributed without any hidden payments, additional required licenses or time bombs, no strings attached. […]
How to Make Veeam Backup and Replication 12.1 More Secure
Veeam Backup and Replication is a powerful solution for data protection and disaster recovery. It allows you to backup, replicate, and restore your virtual, physical, and cloud workloads with ease and efficiency. However, like any other software, it also requires proper security measures to prevent unauthorized access, data loss, or corruption. In this blog post, […]
Nakivo Backup and Replication 10.11 Beta release adding more features and improvements
Nakivo Backup and Replication is a powerful and reliable solution for protecting your virtual, physical, cloud, and SaaS environments. With Nakivo Backup and Replication, you can perform backup, replication, recovery, and disaster recovery for VMware, Hyper-V, Nutanix AHV, Amazon EC2, Microsoft 365, Oracle Database, and file shares. Nakivo Backup and Replication 10.11 is the latest […]
Veeam 12.1 Four-Eyes Authorization – prevent accidental deletion of backups and other operations with two different persons only
Veeam 12.1 Four-Eyes is a configuration where by using a new control mechanism, you’ll be able to approve certain operations in Veeam Backup and Replication, but only with the help of another Veeam admin. In other words, for example, you want to delete some backups. With this feature activated, you’ll need another admin who will […]
What is Inline Entropy Analysis in Veeam Backup and Replication 12.1
Veeam Backup and Replication 12.1 introduced an interesting feature. This feature is called Encryption Detection and it is an Inline entropy analysis that uses Artificial Intelligence and Machine learning (AI/ML) to detect previously unencrypted data which becomes encrypted within the processed disk images. This shows that you possibly starting to be a victim of a […]
- « Previous Page
- 1
- 2
- 3
- 4
- 5
- …
- 48
- Next Page »