Business
|
January 11, 2024
7 min to read
It's common for businesses to store huge amounts of information from customer and financial records to emails and business-critical documents. Servers are used for almost everything, making server backups necessary for any business continuity plan. Read more
Technical
|
January 10, 2024
3 min to read
Expand Security with SIEM Integration and Backup
SIEM integration involves consolidating a variety of cybersecurity tools, including firewalls, intrusion detection systems, antivirus solutions, IAM (Identity and Access Management), Endpoint security, and Cloud security, into a unified platform. This modernization encompasses a broader range of security measures, moving beyond the older solutions. Read more
Business
|
January 8, 2024
4 min to read
Bringing IT and Security Teams together to Detect and Identify Cyber Threats
In today’s digital world, the increasing frequency and sophistication of cyberthreats is our new reality. As our reliance on technology grows, so does the potential for devastating cyberattacks that can cripple businesses, compromise sensitive data, and disrupt our interconnected world Read more
Technical
|
December 9, 2023
7 min to read
High Availability Virtualization Best Practices
High Availability (HA) involves designing systems that are always accessible and resilient to failures, rapidly recovering to minimize downtime. In today's business environments, where interruptions can have significant consequences, this is especially important. Read more
Business
|
October 4, 2023
8 min to read
Comprehensive Guide to SIEM (Security Information & Event Management)
Security Information & Event Management (SIEM) systems are an essential part of any modern cybersecurity toolbox that helps the SOC collect, detect, investigate and respond to internal and external cyber threats. This critical tool helps cybersecurity teams collect, analyze and perform security operations while maintaining and ensureing rapid, optimal incident response. We cover a lot of cloud security terminology in our , but SIEM is a complex topic worthy of its own page. Read on to learn more about the components of SIEM, best practices, use cases and trends. Read more
Business
|
September 28, 2023
3 min to read
Veeam Backup v5 for Nutanix AHV
In today’s cost-conscious world, enterprises are continually evaluating and adopting new preferred infrastructure vendors, whether it be driven by total cost of ownership, features or overall flexibility. Despite being critical in today’s datacenters, hypervisors themselves are not exempt from this either. One of the key influences when evaluating the foundational pillars of your IT environment comes down to the ecosystem. Will the solution you land on fill your requirements? Are there limitations to be aware of? And of course, do you have a solid strategy to securely and reliably protect that data? Read more
Technical
|
May 10, 2023
12 min to read
Protecting Your Unstructured Data: NAS Backup Best Practices
Unstructured data and file repositories are common in most enterprise environments. As organizations try to reduce licensing costs and maintenance overhead, Network Attached Storage (NAS) is still commonplace in many modern enterprises. The ability to store and host data directly on NAS without having to manage OS patches and other lifecycle operations is very attractive to many IT departments. Even though it isn’t suited for all workloads, unstructured data like Microsoft Office documents, JPGs, MP3s, etc. is one of the most common use cases for NAS backup. Read more
Technical
|
April 11, 2023
3 min to read
Protect Your MacOS Workloads With Veeam Agent for Mac 2.0
One of the biggest challenges that corporate IT departments face is protecting all their workloads. Teams spend significant amounts of time architecting, deploying and configuring solutions for their hypervisor and cloud workloads. Physical workloads that typically consist of enterprise databases that run on Windows, Linux or Unix get their fair share of attention too. However, an often-overlooked gap are the end users themselves. Read more
Technical
|
April 6, 2023
3 min to read
Linux Hardened Repositories: Achievable Immutability for All
It’s no secret that strong data security is one of the most critical requirements in today’s world. With networks constantly being targeted and assaulted through automated attacks, phishing expeditions or malicious insiders, your backups need to be secured. Without a trusted and secured backup, recovery becomes significantly more complicated, if not impossible. Fortunately, features like immutable backups can help strengthen your recovery plans. Read more
Technical
|
April 5, 2023
5 min to read
From Secure Backup to Cyber Resiliency
Whether you’re protecting critical data from a ransomware attack or safeguarding it against malicious actors, security plays a prominent role in achieving cyber resiliency. Of course, the best way to avoid a disaster is to prevent it from happening in the first place. But what does this look like in real-world terms? An in-depth defense strategy must be taken, coupled with a methodology that’s built around secure backups, advanced monitoring and recovery at-scale. Read more