Migrating to the cloud
In this cloud blog series, we’ve talked about how secure backups can be in a cloud environment and what the cost may be of not leveraging the potential of DRaaS. The next step would be to start thinking about how to migrate your infrastructure or backups/replicas to the cloud and at what scale it has to be done. We will review the main points that you need to consider and check prior to initiating your move into the world of cloud.
Read moreNano Server Creation – Part 1 of deployment series
The price of Cloud Backup and DRaaS
Cloud computing is hardly a new player of the IT world. Its ever-growing market share and popularity within the IT community derives from combining flexible prices with the Always-On Availability of infrastructure resources. It brings out a whole new world of possibilities for your business, while reducing the long-term costs of maintaining your own infrastructure. Yet, despite the obvious cost advantages of moving data to the cloud, pricing is still a top concern, as Veeam discovered from our recent 2016 cloud end-user survey (see chart below).
Read moreHow to back up and restore an Oracle database — best practices
The right way to ensure the Availability of SAP environments starts with Veeam
When it comes to ensuring the Availability of SAP environments, enterprises need to ensure their expectations are met. Recently, I collaborated with a few of my peers and experts in the industry to provide detailed, technical information on ensuring the Availability of SAP environments with Veeam. If you have SAP, it’s an important part of your business, and ensuring its Availability goes without saying.
Read moreVeeam Backup for Microsoft Office 365: Availability vs Recoverability
Veeam Backup & Replication has added a new integration – Veeam Backup for Microsoft Office 365. How can you benefit from Office 365 email backup with the Veeam’s new product? Why is cloud Availability different from cloud recoverability? In this blog, we will discuss all these topics and try to shed some light on the needs and use cases of email backups. Of course, we will demonstrate the product in action for you.
Read moreHow to protect your data from ransomware and encryption Trojans
Media coverage on the various versions of encryption Trojans are coming fast and furious. These threats are meant to extort money out of the infected and are otherwise known as ransomware.
Trojan malware like Locky, TeslaCrypt and CryptoLocker are the variations currently used to attack companies. The breach gateways are often security loopholes in web browsers and their plugins or inadvertently opened email attachments. Once inside the company, the ransomware can spread at breakneck speeds and begin to encrypt valuable data. The FBI recommends companies implement a solid ransomware backup and recovery strategy for effective protection against data loss caused by CryptoLocker or any other Trojan.
Read more