A strong data retention policy and scheduled backups are important to maintain the security of data and ongoing commercial operations.
Backup
Cybersecurity Guide for Cloud Data Management
Not only must companies protect edge-facing and core-facing infrastructure technologies, they must protect all data at all times, and in all locations.
Next Level Backup Protection
Physical and logical security are two important factors when considering backup files. Modern restore capabilities allow for entire virtual machines and systems to be brought back online from a backup very quickly, assuming that a local/on-premises version is...
Veeam Availability Suite v10 has impressive new capabilities
Veeam Backup & Replication v11 is Here! The V11 update was released in March 2021. As usual, the list of new features is extensive. Click through for a post in which we focus on the new capabilities that are important to Global Data Vault, our partners, and our...
Cloud Mobility – Buzz Words or Pain Point?
Do an internet search on “cloud mobility,” and you will get a TON of results. The definition(s) can be confusing, but basically it describes the ability to avoid locking in workloads to a specific cloud vendor. Diversification of resources between private and public...
The Air Gap Controversy
In a previous blog post, we talked about the 3-2-1-1 data protection concept as well as “air gaps.” We’ve also discovered that viruses can corrupt files that are written to air-gapped technologies, such as tape, rendering them useless, and the same can happen to other...
Gartner Magic Quadrant for Data Center Backup and Recovery
Veeam Software is an unusual participant in the Gartner Magic Quadrant given that they entered it in the visionary section, and were the first company to do so with only a virtualization offering.
What is Global Data Vault’s Enhanced Data Protection?
In Veeam Backup and Replication 9.5 Update 3, Veeam introduced a feature called “Insider Protection,” and updated it for the most recent release of Update 4. Insider Protection is a method used to combat the malicious or intentional (and perhaps even accidental)...
Adding an Air Gap to the 3-2-1 Backup Rule
It’s not a matter of IF your business will succumb to hackers, a natural disaster, employee theft or other mismanagement of data. It’s a matter of WHEN. Naturally, it’s become common practice to keep safe backups of anything business essential, but how companies keep those backups varies considerably.
Worst Cybersecurity Breaches – VPNFilter
More and more, our business environments are connected to the cloud. The transmission of data and the speed to which it can be accessed is critical to business intelligence and competitive advantage. When that data becomes attractive to hackers, the vulnerability also...